Apr 12 21:59:52.578317 kernel: microcode: microcode updated early to revision 0xf4, date = 2022-07-31 Apr 12 21:59:52.578332 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 21:59:52.578338 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 21:59:52.578359 kernel: BIOS-provided physical RAM map: Apr 12 21:59:52.578362 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Apr 12 21:59:52.578380 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Apr 12 21:59:52.578385 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Apr 12 21:59:52.578390 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Apr 12 21:59:52.578394 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Apr 12 21:59:52.578397 kernel: BIOS-e820: [mem 0x0000000040400000-0x000000006df22fff] usable Apr 12 21:59:52.578401 kernel: BIOS-e820: [mem 0x000000006df23000-0x000000006df23fff] ACPI NVS Apr 12 21:59:52.578405 kernel: BIOS-e820: [mem 0x000000006df24000-0x000000006df24fff] reserved Apr 12 21:59:52.578409 kernel: BIOS-e820: [mem 0x000000006df25000-0x0000000077fc4fff] usable Apr 12 21:59:52.578413 kernel: BIOS-e820: [mem 0x0000000077fc5000-0x00000000790a7fff] reserved Apr 12 21:59:52.578418 kernel: BIOS-e820: [mem 0x00000000790a8000-0x0000000079230fff] usable Apr 12 21:59:52.578423 kernel: BIOS-e820: [mem 0x0000000079231000-0x0000000079662fff] ACPI NVS Apr 12 21:59:52.578427 kernel: BIOS-e820: [mem 0x0000000079663000-0x000000007befefff] reserved Apr 12 21:59:52.578431 kernel: BIOS-e820: [mem 0x000000007beff000-0x000000007befffff] usable Apr 12 21:59:52.578436 kernel: BIOS-e820: [mem 0x000000007bf00000-0x000000007f7fffff] reserved Apr 12 21:59:52.578440 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Apr 12 21:59:52.578444 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Apr 12 21:59:52.578448 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Apr 12 21:59:52.578452 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Apr 12 21:59:52.578457 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Apr 12 21:59:52.578461 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000087f7fffff] usable Apr 12 21:59:52.578466 kernel: NX (Execute Disable) protection: active Apr 12 21:59:52.578470 kernel: SMBIOS 3.2.1 present. Apr 12 21:59:52.578474 kernel: DMI: Supermicro PIO-519C-MR-PH004/X11SCH-F, BIOS 1.5 11/17/2020 Apr 12 21:59:52.578478 kernel: tsc: Detected 3400.000 MHz processor Apr 12 21:59:52.578482 kernel: tsc: Detected 3399.906 MHz TSC Apr 12 21:59:52.578486 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 21:59:52.578491 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 21:59:52.578496 kernel: last_pfn = 0x87f800 max_arch_pfn = 0x400000000 Apr 12 21:59:52.578500 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 21:59:52.578505 kernel: last_pfn = 0x7bf00 max_arch_pfn = 0x400000000 Apr 12 21:59:52.578510 kernel: Using GB pages for direct mapping Apr 12 21:59:52.578514 kernel: ACPI: Early table checksum verification disabled Apr 12 21:59:52.578518 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Apr 12 21:59:52.578522 kernel: ACPI: XSDT 0x00000000795440C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Apr 12 21:59:52.578527 kernel: ACPI: FACP 0x0000000079580620 000114 (v06 01072009 AMI 00010013) Apr 12 21:59:52.578533 kernel: ACPI: DSDT 0x0000000079544268 03C3B7 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Apr 12 21:59:52.578539 kernel: ACPI: FACS 0x0000000079662F80 000040 Apr 12 21:59:52.578543 kernel: ACPI: APIC 0x0000000079580738 00012C (v04 01072009 AMI 00010013) Apr 12 21:59:52.578548 kernel: ACPI: FPDT 0x0000000079580868 000044 (v01 01072009 AMI 00010013) Apr 12 21:59:52.578553 kernel: ACPI: FIDT 0x00000000795808B0 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Apr 12 21:59:52.578558 kernel: ACPI: MCFG 0x0000000079580950 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Apr 12 21:59:52.578562 kernel: ACPI: SPMI 0x0000000079580990 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Apr 12 21:59:52.578568 kernel: ACPI: SSDT 0x00000000795809D8 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Apr 12 21:59:52.578573 kernel: ACPI: SSDT 0x00000000795824F8 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Apr 12 21:59:52.578577 kernel: ACPI: SSDT 0x00000000795856C0 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Apr 12 21:59:52.578582 kernel: ACPI: HPET 0x00000000795879F0 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 21:59:52.578587 kernel: ACPI: SSDT 0x0000000079587A28 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Apr 12 21:59:52.578591 kernel: ACPI: SSDT 0x00000000795889D8 0008F7 (v02 INTEL xh_mossb 00000000 INTL 20160527) Apr 12 21:59:52.578596 kernel: ACPI: UEFI 0x00000000795892D0 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 21:59:52.578601 kernel: ACPI: LPIT 0x0000000079589318 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 21:59:52.578605 kernel: ACPI: SSDT 0x00000000795893B0 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Apr 12 21:59:52.578611 kernel: ACPI: SSDT 0x000000007958BB90 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Apr 12 21:59:52.578615 kernel: ACPI: DBGP 0x000000007958D078 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 21:59:52.578620 kernel: ACPI: DBG2 0x000000007958D0B0 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Apr 12 21:59:52.578625 kernel: ACPI: SSDT 0x000000007958D108 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Apr 12 21:59:52.578629 kernel: ACPI: DMAR 0x000000007958EC70 0000A8 (v01 INTEL EDK2 00000002 01000013) Apr 12 21:59:52.578634 kernel: ACPI: SSDT 0x000000007958ED18 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Apr 12 21:59:52.578639 kernel: ACPI: TPM2 0x000000007958EE60 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Apr 12 21:59:52.578643 kernel: ACPI: SSDT 0x000000007958EE98 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Apr 12 21:59:52.578648 kernel: ACPI: WSMT 0x000000007958FC28 000028 (v01 \xebm 01072009 AMI 00010013) Apr 12 21:59:52.578654 kernel: ACPI: EINJ 0x000000007958FC50 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Apr 12 21:59:52.578659 kernel: ACPI: ERST 0x000000007958FD80 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Apr 12 21:59:52.578663 kernel: ACPI: BERT 0x000000007958FFB0 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Apr 12 21:59:52.578668 kernel: ACPI: HEST 0x000000007958FFE0 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Apr 12 21:59:52.578673 kernel: ACPI: SSDT 0x0000000079590260 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Apr 12 21:59:52.578677 kernel: ACPI: Reserving FACP table memory at [mem 0x79580620-0x79580733] Apr 12 21:59:52.578682 kernel: ACPI: Reserving DSDT table memory at [mem 0x79544268-0x7958061e] Apr 12 21:59:52.578687 kernel: ACPI: Reserving FACS table memory at [mem 0x79662f80-0x79662fbf] Apr 12 21:59:52.578692 kernel: ACPI: Reserving APIC table memory at [mem 0x79580738-0x79580863] Apr 12 21:59:52.578697 kernel: ACPI: Reserving FPDT table memory at [mem 0x79580868-0x795808ab] Apr 12 21:59:52.578701 kernel: ACPI: Reserving FIDT table memory at [mem 0x795808b0-0x7958094b] Apr 12 21:59:52.578706 kernel: ACPI: Reserving MCFG table memory at [mem 0x79580950-0x7958098b] Apr 12 21:59:52.578711 kernel: ACPI: Reserving SPMI table memory at [mem 0x79580990-0x795809d0] Apr 12 21:59:52.578715 kernel: ACPI: Reserving SSDT table memory at [mem 0x795809d8-0x795824f3] Apr 12 21:59:52.578720 kernel: ACPI: Reserving SSDT table memory at [mem 0x795824f8-0x795856bd] Apr 12 21:59:52.578725 kernel: ACPI: Reserving SSDT table memory at [mem 0x795856c0-0x795879ea] Apr 12 21:59:52.578729 kernel: ACPI: Reserving HPET table memory at [mem 0x795879f0-0x79587a27] Apr 12 21:59:52.578735 kernel: ACPI: Reserving SSDT table memory at [mem 0x79587a28-0x795889d5] Apr 12 21:59:52.578739 kernel: ACPI: Reserving SSDT table memory at [mem 0x795889d8-0x795892ce] Apr 12 21:59:52.578744 kernel: ACPI: Reserving UEFI table memory at [mem 0x795892d0-0x79589311] Apr 12 21:59:52.578749 kernel: ACPI: Reserving LPIT table memory at [mem 0x79589318-0x795893ab] Apr 12 21:59:52.578753 kernel: ACPI: Reserving SSDT table memory at [mem 0x795893b0-0x7958bb8d] Apr 12 21:59:52.578758 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958bb90-0x7958d071] Apr 12 21:59:52.578762 kernel: ACPI: Reserving DBGP table memory at [mem 0x7958d078-0x7958d0ab] Apr 12 21:59:52.578767 kernel: ACPI: Reserving DBG2 table memory at [mem 0x7958d0b0-0x7958d103] Apr 12 21:59:52.578772 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958d108-0x7958ec6e] Apr 12 21:59:52.578777 kernel: ACPI: Reserving DMAR table memory at [mem 0x7958ec70-0x7958ed17] Apr 12 21:59:52.578782 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958ed18-0x7958ee5b] Apr 12 21:59:52.578786 kernel: ACPI: Reserving TPM2 table memory at [mem 0x7958ee60-0x7958ee93] Apr 12 21:59:52.578791 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958ee98-0x7958fc26] Apr 12 21:59:52.578796 kernel: ACPI: Reserving WSMT table memory at [mem 0x7958fc28-0x7958fc4f] Apr 12 21:59:52.578800 kernel: ACPI: Reserving EINJ table memory at [mem 0x7958fc50-0x7958fd7f] Apr 12 21:59:52.578805 kernel: ACPI: Reserving ERST table memory at [mem 0x7958fd80-0x7958ffaf] Apr 12 21:59:52.578810 kernel: ACPI: Reserving BERT table memory at [mem 0x7958ffb0-0x7958ffdf] Apr 12 21:59:52.578814 kernel: ACPI: Reserving HEST table memory at [mem 0x7958ffe0-0x7959025b] Apr 12 21:59:52.578820 kernel: ACPI: Reserving SSDT table memory at [mem 0x79590260-0x795903c1] Apr 12 21:59:52.578824 kernel: No NUMA configuration found Apr 12 21:59:52.578829 kernel: Faking a node at [mem 0x0000000000000000-0x000000087f7fffff] Apr 12 21:59:52.578834 kernel: NODE_DATA(0) allocated [mem 0x87f7fa000-0x87f7fffff] Apr 12 21:59:52.578838 kernel: Zone ranges: Apr 12 21:59:52.578843 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 21:59:52.578848 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Apr 12 21:59:52.578852 kernel: Normal [mem 0x0000000100000000-0x000000087f7fffff] Apr 12 21:59:52.578857 kernel: Movable zone start for each node Apr 12 21:59:52.578863 kernel: Early memory node ranges Apr 12 21:59:52.578867 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Apr 12 21:59:52.578872 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Apr 12 21:59:52.578876 kernel: node 0: [mem 0x0000000040400000-0x000000006df22fff] Apr 12 21:59:52.578881 kernel: node 0: [mem 0x000000006df25000-0x0000000077fc4fff] Apr 12 21:59:52.578886 kernel: node 0: [mem 0x00000000790a8000-0x0000000079230fff] Apr 12 21:59:52.578891 kernel: node 0: [mem 0x000000007beff000-0x000000007befffff] Apr 12 21:59:52.578895 kernel: node 0: [mem 0x0000000100000000-0x000000087f7fffff] Apr 12 21:59:52.578900 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000087f7fffff] Apr 12 21:59:52.578909 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 21:59:52.578914 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Apr 12 21:59:52.578919 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Apr 12 21:59:52.578925 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Apr 12 21:59:52.578930 kernel: On node 0, zone DMA32: 4323 pages in unavailable ranges Apr 12 21:59:52.578935 kernel: On node 0, zone DMA32: 11470 pages in unavailable ranges Apr 12 21:59:52.578940 kernel: On node 0, zone Normal: 16640 pages in unavailable ranges Apr 12 21:59:52.578945 kernel: On node 0, zone Normal: 2048 pages in unavailable ranges Apr 12 21:59:52.578951 kernel: ACPI: PM-Timer IO Port: 0x1808 Apr 12 21:59:52.578956 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Apr 12 21:59:52.578961 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Apr 12 21:59:52.578966 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Apr 12 21:59:52.578971 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Apr 12 21:59:52.578976 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Apr 12 21:59:52.578981 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Apr 12 21:59:52.578986 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Apr 12 21:59:52.578991 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Apr 12 21:59:52.578997 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Apr 12 21:59:52.579001 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Apr 12 21:59:52.579006 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Apr 12 21:59:52.579011 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Apr 12 21:59:52.579016 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Apr 12 21:59:52.579021 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Apr 12 21:59:52.579026 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Apr 12 21:59:52.579031 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Apr 12 21:59:52.579036 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Apr 12 21:59:52.579042 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Apr 12 21:59:52.579047 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 21:59:52.579052 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 21:59:52.579057 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Apr 12 21:59:52.579062 kernel: TSC deadline timer available Apr 12 21:59:52.579067 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Apr 12 21:59:52.579072 kernel: [mem 0x7f800000-0xdfffffff] available for PCI devices Apr 12 21:59:52.579077 kernel: Booting paravirtualized kernel on bare hardware Apr 12 21:59:52.579082 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 21:59:52.579088 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Apr 12 21:59:52.579093 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Apr 12 21:59:52.579098 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Apr 12 21:59:52.579103 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Apr 12 21:59:52.579107 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8222327 Apr 12 21:59:52.579112 kernel: Policy zone: Normal Apr 12 21:59:52.579118 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 21:59:52.579123 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 21:59:52.579129 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Apr 12 21:59:52.579134 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Apr 12 21:59:52.579139 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 21:59:52.579145 kernel: Memory: 32681612K/33411988K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 730116K reserved, 0K cma-reserved) Apr 12 21:59:52.579150 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Apr 12 21:59:52.579155 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 21:59:52.579160 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 21:59:52.579165 kernel: rcu: Hierarchical RCU implementation. Apr 12 21:59:52.579170 kernel: rcu: RCU event tracing is enabled. Apr 12 21:59:52.579175 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Apr 12 21:59:52.579181 kernel: Rude variant of Tasks RCU enabled. Apr 12 21:59:52.579186 kernel: Tracing variant of Tasks RCU enabled. Apr 12 21:59:52.579191 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 21:59:52.579196 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Apr 12 21:59:52.579201 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Apr 12 21:59:52.579206 kernel: random: crng init done Apr 12 21:59:52.579210 kernel: Console: colour dummy device 80x25 Apr 12 21:59:52.579215 kernel: printk: console [tty0] enabled Apr 12 21:59:52.579221 kernel: printk: console [ttyS1] enabled Apr 12 21:59:52.579226 kernel: ACPI: Core revision 20210730 Apr 12 21:59:52.579231 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Apr 12 21:59:52.579236 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 21:59:52.579241 kernel: DMAR: Host address width 39 Apr 12 21:59:52.579246 kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x0 Apr 12 21:59:52.579251 kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap 1c0000c40660462 ecap 19e2ff0505e Apr 12 21:59:52.579256 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Apr 12 21:59:52.579261 kernel: DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Apr 12 21:59:52.579266 kernel: DMAR: RMRR base: 0x00000079f11000 end: 0x0000007a15afff Apr 12 21:59:52.579272 kernel: DMAR: RMRR base: 0x0000007d000000 end: 0x0000007f7fffff Apr 12 21:59:52.579277 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 1 Apr 12 21:59:52.579282 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Apr 12 21:59:52.579287 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Apr 12 21:59:52.579293 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Apr 12 21:59:52.579299 kernel: x2apic enabled Apr 12 21:59:52.579304 kernel: Switched APIC routing to cluster x2apic. Apr 12 21:59:52.579330 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Apr 12 21:59:52.579335 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Apr 12 21:59:52.579341 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Apr 12 21:59:52.579360 kernel: CPU0: Thermal monitoring enabled (TM1) Apr 12 21:59:52.579365 kernel: process: using mwait in idle threads Apr 12 21:59:52.579370 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Apr 12 21:59:52.579375 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Apr 12 21:59:52.579380 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 21:59:52.579385 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Apr 12 21:59:52.579390 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Apr 12 21:59:52.579396 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Apr 12 21:59:52.579401 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Apr 12 21:59:52.579406 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 21:59:52.579411 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Apr 12 21:59:52.579416 kernel: RETBleed: Mitigation: Enhanced IBRS Apr 12 21:59:52.579421 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Apr 12 21:59:52.579427 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Apr 12 21:59:52.579432 kernel: TAA: Mitigation: TSX disabled Apr 12 21:59:52.579437 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Apr 12 21:59:52.579442 kernel: SRBDS: Mitigation: Microcode Apr 12 21:59:52.579447 kernel: GDS: Vulnerable: No microcode Apr 12 21:59:52.579452 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 12 21:59:52.579457 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 12 21:59:52.579462 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 12 21:59:52.579467 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Apr 12 21:59:52.579472 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Apr 12 21:59:52.579477 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 12 21:59:52.579482 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Apr 12 21:59:52.579488 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Apr 12 21:59:52.579493 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Apr 12 21:59:52.579498 kernel: Freeing SMP alternatives memory: 32K Apr 12 21:59:52.579503 kernel: pid_max: default: 32768 minimum: 301 Apr 12 21:59:52.579508 kernel: LSM: Security Framework initializing Apr 12 21:59:52.579513 kernel: SELinux: Initializing. Apr 12 21:59:52.579518 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 21:59:52.579523 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 21:59:52.579528 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Apr 12 21:59:52.579534 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Apr 12 21:59:52.579539 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Apr 12 21:59:52.579544 kernel: ... version: 4 Apr 12 21:59:52.579549 kernel: ... bit width: 48 Apr 12 21:59:52.579554 kernel: ... generic registers: 4 Apr 12 21:59:52.579559 kernel: ... value mask: 0000ffffffffffff Apr 12 21:59:52.579564 kernel: ... max period: 00007fffffffffff Apr 12 21:59:52.579569 kernel: ... fixed-purpose events: 3 Apr 12 21:59:52.579574 kernel: ... event mask: 000000070000000f Apr 12 21:59:52.579580 kernel: signal: max sigframe size: 2032 Apr 12 21:59:52.579585 kernel: rcu: Hierarchical SRCU implementation. Apr 12 21:59:52.579590 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Apr 12 21:59:52.579595 kernel: smp: Bringing up secondary CPUs ... Apr 12 21:59:52.579600 kernel: x86: Booting SMP configuration: Apr 12 21:59:52.579605 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Apr 12 21:59:52.579610 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Apr 12 21:59:52.579615 kernel: #9 #10 #11 #12 #13 #14 #15 Apr 12 21:59:52.579620 kernel: smp: Brought up 1 node, 16 CPUs Apr 12 21:59:52.579626 kernel: smpboot: Max logical packages: 1 Apr 12 21:59:52.579631 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Apr 12 21:59:52.579636 kernel: devtmpfs: initialized Apr 12 21:59:52.579641 kernel: x86/mm: Memory block size: 128MB Apr 12 21:59:52.579646 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x6df23000-0x6df23fff] (4096 bytes) Apr 12 21:59:52.579651 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x79231000-0x79662fff] (4399104 bytes) Apr 12 21:59:52.579657 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 21:59:52.579662 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Apr 12 21:59:52.579667 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 21:59:52.579672 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 21:59:52.579677 kernel: audit: initializing netlink subsys (disabled) Apr 12 21:59:52.579682 kernel: audit: type=2000 audit(1712959186.122:1): state=initialized audit_enabled=0 res=1 Apr 12 21:59:52.579687 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 21:59:52.579692 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 21:59:52.579697 kernel: cpuidle: using governor menu Apr 12 21:59:52.579702 kernel: ACPI: bus type PCI registered Apr 12 21:59:52.579707 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 21:59:52.579713 kernel: dca service started, version 1.12.1 Apr 12 21:59:52.579718 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Apr 12 21:59:52.579723 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Apr 12 21:59:52.579728 kernel: PCI: Using configuration type 1 for base access Apr 12 21:59:52.579733 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Apr 12 21:59:52.579738 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 21:59:52.579743 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 21:59:52.579748 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 21:59:52.579753 kernel: ACPI: Added _OSI(Module Device) Apr 12 21:59:52.579759 kernel: ACPI: Added _OSI(Processor Device) Apr 12 21:59:52.579764 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 21:59:52.579769 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 21:59:52.579774 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 21:59:52.579779 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 21:59:52.579784 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 21:59:52.579789 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Apr 12 21:59:52.579794 kernel: ACPI: Dynamic OEM Table Load: Apr 12 21:59:52.579798 kernel: ACPI: SSDT 0xFFFF93B200223900 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Apr 12 21:59:52.579804 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Apr 12 21:59:52.579809 kernel: ACPI: Dynamic OEM Table Load: Apr 12 21:59:52.579814 kernel: ACPI: SSDT 0xFFFF93B201CF2400 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Apr 12 21:59:52.579819 kernel: ACPI: Dynamic OEM Table Load: Apr 12 21:59:52.579824 kernel: ACPI: SSDT 0xFFFF93B201C62800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Apr 12 21:59:52.579829 kernel: ACPI: Dynamic OEM Table Load: Apr 12 21:59:52.579834 kernel: ACPI: SSDT 0xFFFF93B201D56800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Apr 12 21:59:52.579839 kernel: ACPI: Dynamic OEM Table Load: Apr 12 21:59:52.579844 kernel: ACPI: SSDT 0xFFFF93B200152000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Apr 12 21:59:52.579849 kernel: ACPI: Dynamic OEM Table Load: Apr 12 21:59:52.579855 kernel: ACPI: SSDT 0xFFFF93B201CF3800 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Apr 12 21:59:52.579860 kernel: ACPI: Interpreter enabled Apr 12 21:59:52.579865 kernel: ACPI: PM: (supports S0 S5) Apr 12 21:59:52.579870 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 21:59:52.579875 kernel: HEST: Enabling Firmware First mode for corrected errors. Apr 12 21:59:52.579880 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Apr 12 21:59:52.579885 kernel: HEST: Table parsing has been initialized. Apr 12 21:59:52.579890 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Apr 12 21:59:52.579895 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 21:59:52.579900 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Apr 12 21:59:52.579905 kernel: ACPI: PM: Power Resource [USBC] Apr 12 21:59:52.579911 kernel: ACPI: PM: Power Resource [V0PR] Apr 12 21:59:52.579915 kernel: ACPI: PM: Power Resource [V1PR] Apr 12 21:59:52.579920 kernel: ACPI: PM: Power Resource [V2PR] Apr 12 21:59:52.579925 kernel: ACPI: PM: Power Resource [WRST] Apr 12 21:59:52.579930 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Apr 12 21:59:52.579935 kernel: ACPI: PM: Power Resource [FN00] Apr 12 21:59:52.579940 kernel: ACPI: PM: Power Resource [FN01] Apr 12 21:59:52.579946 kernel: ACPI: PM: Power Resource [FN02] Apr 12 21:59:52.579951 kernel: ACPI: PM: Power Resource [FN03] Apr 12 21:59:52.579956 kernel: ACPI: PM: Power Resource [FN04] Apr 12 21:59:52.579961 kernel: ACPI: PM: Power Resource [PIN] Apr 12 21:59:52.579966 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Apr 12 21:59:52.580034 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 21:59:52.580080 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Apr 12 21:59:52.580124 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Apr 12 21:59:52.580133 kernel: PCI host bridge to bus 0000:00 Apr 12 21:59:52.580178 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 21:59:52.580218 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 21:59:52.580256 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 21:59:52.580297 kernel: pci_bus 0000:00: root bus resource [mem 0x7f800000-0xdfffffff window] Apr 12 21:59:52.580393 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Apr 12 21:59:52.580432 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Apr 12 21:59:52.580488 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Apr 12 21:59:52.580537 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Apr 12 21:59:52.580584 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Apr 12 21:59:52.580632 kernel: pci 0000:00:01.1: [8086:1905] type 01 class 0x060400 Apr 12 21:59:52.580677 kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold Apr 12 21:59:52.580724 kernel: pci 0000:00:02.0: [8086:3e9a] type 00 class 0x038000 Apr 12 21:59:52.580772 kernel: pci 0000:00:02.0: reg 0x10: [mem 0x94000000-0x94ffffff 64bit] Apr 12 21:59:52.580818 kernel: pci 0000:00:02.0: reg 0x18: [mem 0x80000000-0x8fffffff 64bit pref] Apr 12 21:59:52.580862 kernel: pci 0000:00:02.0: reg 0x20: [io 0x6000-0x603f] Apr 12 21:59:52.580908 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Apr 12 21:59:52.580952 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9651f000-0x9651ffff 64bit] Apr 12 21:59:52.581000 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Apr 12 21:59:52.581045 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9651e000-0x9651efff 64bit] Apr 12 21:59:52.581095 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Apr 12 21:59:52.581139 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x96500000-0x9650ffff 64bit] Apr 12 21:59:52.581183 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Apr 12 21:59:52.581231 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Apr 12 21:59:52.581273 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x96512000-0x96513fff 64bit] Apr 12 21:59:52.581348 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9651d000-0x9651dfff 64bit] Apr 12 21:59:52.581424 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Apr 12 21:59:52.581469 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 21:59:52.581516 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Apr 12 21:59:52.581560 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 21:59:52.581615 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Apr 12 21:59:52.581659 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9651a000-0x9651afff 64bit] Apr 12 21:59:52.581705 kernel: pci 0000:00:16.0: PME# supported from D3hot Apr 12 21:59:52.581751 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Apr 12 21:59:52.581797 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x96519000-0x96519fff 64bit] Apr 12 21:59:52.581839 kernel: pci 0000:00:16.1: PME# supported from D3hot Apr 12 21:59:52.581886 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Apr 12 21:59:52.581929 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x96518000-0x96518fff 64bit] Apr 12 21:59:52.581977 kernel: pci 0000:00:16.4: PME# supported from D3hot Apr 12 21:59:52.582025 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Apr 12 21:59:52.582069 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x96510000-0x96511fff] Apr 12 21:59:52.582113 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x96517000-0x965170ff] Apr 12 21:59:52.582157 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6090-0x6097] Apr 12 21:59:52.582200 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6080-0x6083] Apr 12 21:59:52.582243 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6060-0x607f] Apr 12 21:59:52.582291 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x96516000-0x965167ff] Apr 12 21:59:52.582378 kernel: pci 0000:00:17.0: PME# supported from D3hot Apr 12 21:59:52.582441 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Apr 12 21:59:52.582486 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Apr 12 21:59:52.582537 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Apr 12 21:59:52.582583 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Apr 12 21:59:52.582632 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Apr 12 21:59:52.582676 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Apr 12 21:59:52.582724 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Apr 12 21:59:52.582769 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Apr 12 21:59:52.582819 kernel: pci 0000:00:1c.1: [8086:a339] type 01 class 0x060400 Apr 12 21:59:52.582863 kernel: pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold Apr 12 21:59:52.582913 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Apr 12 21:59:52.582956 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 21:59:52.583003 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Apr 12 21:59:52.583050 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Apr 12 21:59:52.583096 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x96514000-0x965140ff 64bit] Apr 12 21:59:52.583139 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Apr 12 21:59:52.583186 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Apr 12 21:59:52.583230 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Apr 12 21:59:52.583274 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 21:59:52.583374 kernel: pci 0000:02:00.0: [15b3:1015] type 00 class 0x020000 Apr 12 21:59:52.583439 kernel: pci 0000:02:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Apr 12 21:59:52.583487 kernel: pci 0000:02:00.0: reg 0x30: [mem 0x96200000-0x962fffff pref] Apr 12 21:59:52.583532 kernel: pci 0000:02:00.0: PME# supported from D3cold Apr 12 21:59:52.583578 kernel: pci 0000:02:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Apr 12 21:59:52.583622 kernel: pci 0000:02:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 21:59:52.583671 kernel: pci 0000:02:00.1: [15b3:1015] type 00 class 0x020000 Apr 12 21:59:52.583719 kernel: pci 0000:02:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Apr 12 21:59:52.583765 kernel: pci 0000:02:00.1: reg 0x30: [mem 0x96100000-0x961fffff pref] Apr 12 21:59:52.583811 kernel: pci 0000:02:00.1: PME# supported from D3cold Apr 12 21:59:52.583858 kernel: pci 0000:02:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Apr 12 21:59:52.583902 kernel: pci 0000:02:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 21:59:52.583946 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Apr 12 21:59:52.583990 kernel: pci 0000:00:01.1: bridge window [mem 0x96100000-0x962fffff] Apr 12 21:59:52.584033 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 21:59:52.584078 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Apr 12 21:59:52.584129 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Apr 12 21:59:52.584178 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Apr 12 21:59:52.584223 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x96400000-0x9647ffff] Apr 12 21:59:52.584268 kernel: pci 0000:04:00.0: reg 0x18: [io 0x5000-0x501f] Apr 12 21:59:52.584362 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x96480000-0x96483fff] Apr 12 21:59:52.584427 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Apr 12 21:59:52.584472 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Apr 12 21:59:52.584515 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Apr 12 21:59:52.584618 kernel: pci 0000:00:1b.4: bridge window [mem 0x96400000-0x964fffff] Apr 12 21:59:52.584669 kernel: pci 0000:05:00.0: working around ROM BAR overlap defect Apr 12 21:59:52.584715 kernel: pci 0000:05:00.0: [8086:1533] type 00 class 0x020000 Apr 12 21:59:52.584760 kernel: pci 0000:05:00.0: reg 0x10: [mem 0x96300000-0x9637ffff] Apr 12 21:59:52.584806 kernel: pci 0000:05:00.0: reg 0x18: [io 0x4000-0x401f] Apr 12 21:59:52.584850 kernel: pci 0000:05:00.0: reg 0x1c: [mem 0x96380000-0x96383fff] Apr 12 21:59:52.584896 kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold Apr 12 21:59:52.584942 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Apr 12 21:59:52.584986 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Apr 12 21:59:52.585030 kernel: pci 0000:00:1b.5: bridge window [mem 0x96300000-0x963fffff] Apr 12 21:59:52.585075 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Apr 12 21:59:52.585124 kernel: pci 0000:07:00.0: [1a03:1150] type 01 class 0x060400 Apr 12 21:59:52.585169 kernel: pci 0000:07:00.0: enabling Extended Tags Apr 12 21:59:52.585215 kernel: pci 0000:07:00.0: supports D1 D2 Apr 12 21:59:52.585260 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 21:59:52.585337 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Apr 12 21:59:52.585416 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Apr 12 21:59:52.585461 kernel: pci 0000:00:1c.1: bridge window [mem 0x95000000-0x960fffff] Apr 12 21:59:52.585510 kernel: pci_bus 0000:08: extended config space not accessible Apr 12 21:59:52.585562 kernel: pci 0000:08:00.0: [1a03:2000] type 00 class 0x030000 Apr 12 21:59:52.585611 kernel: pci 0000:08:00.0: reg 0x10: [mem 0x95000000-0x95ffffff] Apr 12 21:59:52.585659 kernel: pci 0000:08:00.0: reg 0x14: [mem 0x96000000-0x9601ffff] Apr 12 21:59:52.585707 kernel: pci 0000:08:00.0: reg 0x18: [io 0x3000-0x307f] Apr 12 21:59:52.585756 kernel: pci 0000:08:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Apr 12 21:59:52.585803 kernel: pci 0000:08:00.0: supports D1 D2 Apr 12 21:59:52.585850 kernel: pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 21:59:52.585896 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Apr 12 21:59:52.585942 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Apr 12 21:59:52.585988 kernel: pci 0000:07:00.0: bridge window [mem 0x95000000-0x960fffff] Apr 12 21:59:52.585997 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Apr 12 21:59:52.586003 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Apr 12 21:59:52.586008 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Apr 12 21:59:52.586014 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Apr 12 21:59:52.586019 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Apr 12 21:59:52.586024 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Apr 12 21:59:52.586029 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Apr 12 21:59:52.586035 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Apr 12 21:59:52.586040 kernel: iommu: Default domain type: Translated Apr 12 21:59:52.586046 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 21:59:52.586093 kernel: pci 0000:08:00.0: vgaarb: setting as boot VGA device Apr 12 21:59:52.586141 kernel: pci 0000:08:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Apr 12 21:59:52.586189 kernel: pci 0000:08:00.0: vgaarb: bridge control possible Apr 12 21:59:52.586197 kernel: vgaarb: loaded Apr 12 21:59:52.586203 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 21:59:52.586208 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 21:59:52.586214 kernel: PTP clock support registered Apr 12 21:59:52.586219 kernel: PCI: Using ACPI for IRQ routing Apr 12 21:59:52.586226 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 21:59:52.586231 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Apr 12 21:59:52.586236 kernel: e820: reserve RAM buffer [mem 0x6df23000-0x6fffffff] Apr 12 21:59:52.586241 kernel: e820: reserve RAM buffer [mem 0x77fc5000-0x77ffffff] Apr 12 21:59:52.586247 kernel: e820: reserve RAM buffer [mem 0x79231000-0x7bffffff] Apr 12 21:59:52.586252 kernel: e820: reserve RAM buffer [mem 0x7bf00000-0x7bffffff] Apr 12 21:59:52.586257 kernel: e820: reserve RAM buffer [mem 0x87f800000-0x87fffffff] Apr 12 21:59:52.586263 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Apr 12 21:59:52.586268 kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Apr 12 21:59:52.586274 kernel: clocksource: Switched to clocksource tsc-early Apr 12 21:59:52.586280 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 21:59:52.586285 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 21:59:52.586292 kernel: pnp: PnP ACPI init Apr 12 21:59:52.586410 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Apr 12 21:59:52.586455 kernel: pnp 00:02: [dma 0 disabled] Apr 12 21:59:52.586500 kernel: pnp 00:03: [dma 0 disabled] Apr 12 21:59:52.586544 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Apr 12 21:59:52.586584 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Apr 12 21:59:52.586627 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Apr 12 21:59:52.586669 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Apr 12 21:59:52.586710 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Apr 12 21:59:52.586749 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Apr 12 21:59:52.586788 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Apr 12 21:59:52.586829 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Apr 12 21:59:52.586869 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Apr 12 21:59:52.586909 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Apr 12 21:59:52.586948 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Apr 12 21:59:52.586990 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Apr 12 21:59:52.587030 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Apr 12 21:59:52.587071 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Apr 12 21:59:52.587110 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Apr 12 21:59:52.587150 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Apr 12 21:59:52.587188 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Apr 12 21:59:52.587228 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Apr 12 21:59:52.587272 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Apr 12 21:59:52.587280 kernel: pnp: PnP ACPI: found 10 devices Apr 12 21:59:52.587286 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 21:59:52.587294 kernel: NET: Registered PF_INET protocol family Apr 12 21:59:52.587300 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 21:59:52.587329 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Apr 12 21:59:52.587335 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 21:59:52.587340 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 21:59:52.587346 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Apr 12 21:59:52.587371 kernel: TCP: Hash tables configured (established 262144 bind 65536) Apr 12 21:59:52.587396 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Apr 12 21:59:52.587402 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Apr 12 21:59:52.587408 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 21:59:52.587413 kernel: NET: Registered PF_XDP protocol family Apr 12 21:59:52.587459 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x7f800000-0x7f800fff 64bit] Apr 12 21:59:52.587503 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x7f801000-0x7f801fff 64bit] Apr 12 21:59:52.587546 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x7f802000-0x7f802fff 64bit] Apr 12 21:59:52.587590 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 21:59:52.587637 kernel: pci 0000:02:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Apr 12 21:59:52.587683 kernel: pci 0000:02:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Apr 12 21:59:52.587728 kernel: pci 0000:02:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Apr 12 21:59:52.587774 kernel: pci 0000:02:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Apr 12 21:59:52.587818 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Apr 12 21:59:52.587863 kernel: pci 0000:00:01.1: bridge window [mem 0x96100000-0x962fffff] Apr 12 21:59:52.587908 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 21:59:52.587953 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Apr 12 21:59:52.587997 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Apr 12 21:59:52.588042 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Apr 12 21:59:52.588086 kernel: pci 0000:00:1b.4: bridge window [mem 0x96400000-0x964fffff] Apr 12 21:59:52.588130 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Apr 12 21:59:52.588175 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Apr 12 21:59:52.588219 kernel: pci 0000:00:1b.5: bridge window [mem 0x96300000-0x963fffff] Apr 12 21:59:52.588263 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Apr 12 21:59:52.588312 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Apr 12 21:59:52.588427 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Apr 12 21:59:52.588473 kernel: pci 0000:07:00.0: bridge window [mem 0x95000000-0x960fffff] Apr 12 21:59:52.588517 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Apr 12 21:59:52.588562 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Apr 12 21:59:52.588608 kernel: pci 0000:00:1c.1: bridge window [mem 0x95000000-0x960fffff] Apr 12 21:59:52.588648 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Apr 12 21:59:52.588687 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 21:59:52.588728 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 21:59:52.588768 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 21:59:52.588806 kernel: pci_bus 0000:00: resource 7 [mem 0x7f800000-0xdfffffff window] Apr 12 21:59:52.588845 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Apr 12 21:59:52.588890 kernel: pci_bus 0000:02: resource 1 [mem 0x96100000-0x962fffff] Apr 12 21:59:52.588933 kernel: pci_bus 0000:02: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 21:59:52.588977 kernel: pci_bus 0000:04: resource 0 [io 0x5000-0x5fff] Apr 12 21:59:52.589019 kernel: pci_bus 0000:04: resource 1 [mem 0x96400000-0x964fffff] Apr 12 21:59:52.589064 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Apr 12 21:59:52.589105 kernel: pci_bus 0000:05: resource 1 [mem 0x96300000-0x963fffff] Apr 12 21:59:52.589149 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Apr 12 21:59:52.589189 kernel: pci_bus 0000:07: resource 1 [mem 0x95000000-0x960fffff] Apr 12 21:59:52.589233 kernel: pci_bus 0000:08: resource 0 [io 0x3000-0x3fff] Apr 12 21:59:52.589275 kernel: pci_bus 0000:08: resource 1 [mem 0x95000000-0x960fffff] Apr 12 21:59:52.589284 kernel: PCI: CLS 64 bytes, default 64 Apr 12 21:59:52.589292 kernel: DMAR: No ATSR found Apr 12 21:59:52.589297 kernel: DMAR: No SATC found Apr 12 21:59:52.589302 kernel: DMAR: IOMMU feature fl1gp_support inconsistent Apr 12 21:59:52.589308 kernel: DMAR: IOMMU feature pgsel_inv inconsistent Apr 12 21:59:52.589313 kernel: DMAR: IOMMU feature nwfs inconsistent Apr 12 21:59:52.589347 kernel: DMAR: IOMMU feature pasid inconsistent Apr 12 21:59:52.589353 kernel: DMAR: IOMMU feature eafs inconsistent Apr 12 21:59:52.589358 kernel: DMAR: IOMMU feature prs inconsistent Apr 12 21:59:52.589384 kernel: DMAR: IOMMU feature nest inconsistent Apr 12 21:59:52.589390 kernel: DMAR: IOMMU feature mts inconsistent Apr 12 21:59:52.589414 kernel: DMAR: IOMMU feature sc_support inconsistent Apr 12 21:59:52.589419 kernel: DMAR: IOMMU feature dev_iotlb_support inconsistent Apr 12 21:59:52.589425 kernel: DMAR: dmar0: Using Queued invalidation Apr 12 21:59:52.589430 kernel: DMAR: dmar1: Using Queued invalidation Apr 12 21:59:52.589477 kernel: pci 0000:00:00.0: Adding to iommu group 0 Apr 12 21:59:52.589522 kernel: pci 0000:00:01.0: Adding to iommu group 1 Apr 12 21:59:52.589566 kernel: pci 0000:00:01.1: Adding to iommu group 1 Apr 12 21:59:52.589612 kernel: pci 0000:00:02.0: Adding to iommu group 2 Apr 12 21:59:52.589656 kernel: pci 0000:00:08.0: Adding to iommu group 3 Apr 12 21:59:52.589701 kernel: pci 0000:00:12.0: Adding to iommu group 4 Apr 12 21:59:52.589744 kernel: pci 0000:00:14.0: Adding to iommu group 5 Apr 12 21:59:52.589788 kernel: pci 0000:00:14.2: Adding to iommu group 5 Apr 12 21:59:52.589831 kernel: pci 0000:00:15.0: Adding to iommu group 6 Apr 12 21:59:52.589874 kernel: pci 0000:00:15.1: Adding to iommu group 6 Apr 12 21:59:52.589917 kernel: pci 0000:00:16.0: Adding to iommu group 7 Apr 12 21:59:52.589961 kernel: pci 0000:00:16.1: Adding to iommu group 7 Apr 12 21:59:52.590005 kernel: pci 0000:00:16.4: Adding to iommu group 7 Apr 12 21:59:52.590048 kernel: pci 0000:00:17.0: Adding to iommu group 8 Apr 12 21:59:52.590092 kernel: pci 0000:00:1b.0: Adding to iommu group 9 Apr 12 21:59:52.590136 kernel: pci 0000:00:1b.4: Adding to iommu group 10 Apr 12 21:59:52.590180 kernel: pci 0000:00:1b.5: Adding to iommu group 11 Apr 12 21:59:52.590224 kernel: pci 0000:00:1c.0: Adding to iommu group 12 Apr 12 21:59:52.590266 kernel: pci 0000:00:1c.1: Adding to iommu group 13 Apr 12 21:59:52.590344 kernel: pci 0000:00:1e.0: Adding to iommu group 14 Apr 12 21:59:52.590429 kernel: pci 0000:00:1f.0: Adding to iommu group 15 Apr 12 21:59:52.590473 kernel: pci 0000:00:1f.4: Adding to iommu group 15 Apr 12 21:59:52.590516 kernel: pci 0000:00:1f.5: Adding to iommu group 15 Apr 12 21:59:52.590561 kernel: pci 0000:02:00.0: Adding to iommu group 1 Apr 12 21:59:52.590606 kernel: pci 0000:02:00.1: Adding to iommu group 1 Apr 12 21:59:52.590652 kernel: pci 0000:04:00.0: Adding to iommu group 16 Apr 12 21:59:52.590697 kernel: pci 0000:05:00.0: Adding to iommu group 17 Apr 12 21:59:52.590744 kernel: pci 0000:07:00.0: Adding to iommu group 18 Apr 12 21:59:52.590792 kernel: pci 0000:08:00.0: Adding to iommu group 18 Apr 12 21:59:52.590800 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Apr 12 21:59:52.590805 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Apr 12 21:59:52.590811 kernel: software IO TLB: mapped [mem 0x0000000073fc5000-0x0000000077fc5000] (64MB) Apr 12 21:59:52.590816 kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer Apr 12 21:59:52.590821 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Apr 12 21:59:52.590827 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Apr 12 21:59:52.590832 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Apr 12 21:59:52.590839 kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules Apr 12 21:59:52.590887 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Apr 12 21:59:52.590896 kernel: Initialise system trusted keyrings Apr 12 21:59:52.590901 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Apr 12 21:59:52.590906 kernel: Key type asymmetric registered Apr 12 21:59:52.590911 kernel: Asymmetric key parser 'x509' registered Apr 12 21:59:52.590917 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 21:59:52.590922 kernel: io scheduler mq-deadline registered Apr 12 21:59:52.590929 kernel: io scheduler kyber registered Apr 12 21:59:52.590934 kernel: io scheduler bfq registered Apr 12 21:59:52.590977 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 122 Apr 12 21:59:52.591021 kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 123 Apr 12 21:59:52.591066 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 124 Apr 12 21:59:52.591110 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 125 Apr 12 21:59:52.591154 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 126 Apr 12 21:59:52.591198 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 127 Apr 12 21:59:52.591243 kernel: pcieport 0000:00:1c.1: PME: Signaling with IRQ 128 Apr 12 21:59:52.591293 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Apr 12 21:59:52.591302 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Apr 12 21:59:52.591337 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Apr 12 21:59:52.591343 kernel: pstore: Registered erst as persistent store backend Apr 12 21:59:52.591348 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 21:59:52.591374 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 21:59:52.591379 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 21:59:52.591386 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Apr 12 21:59:52.591430 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Apr 12 21:59:52.591439 kernel: i8042: PNP: No PS/2 controller found. Apr 12 21:59:52.591479 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Apr 12 21:59:52.591519 kernel: rtc_cmos rtc_cmos: registered as rtc0 Apr 12 21:59:52.591560 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-04-12T21:59:51 UTC (1712959191) Apr 12 21:59:52.591600 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Apr 12 21:59:52.591608 kernel: fail to initialize ptp_kvm Apr 12 21:59:52.591614 kernel: intel_pstate: Intel P-state driver initializing Apr 12 21:59:52.591619 kernel: intel_pstate: Disabling energy efficiency optimization Apr 12 21:59:52.591625 kernel: intel_pstate: HWP enabled Apr 12 21:59:52.591630 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Apr 12 21:59:52.591635 kernel: vesafb: scrolling: redraw Apr 12 21:59:52.591641 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Apr 12 21:59:52.591646 kernel: vesafb: framebuffer at 0x95000000, mapped to 0x0000000088cdb026, using 768k, total 768k Apr 12 21:59:52.591652 kernel: Console: switching to colour frame buffer device 128x48 Apr 12 21:59:52.591658 kernel: fb0: VESA VGA frame buffer device Apr 12 21:59:52.591663 kernel: NET: Registered PF_INET6 protocol family Apr 12 21:59:52.591669 kernel: Segment Routing with IPv6 Apr 12 21:59:52.591674 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 21:59:52.591679 kernel: NET: Registered PF_PACKET protocol family Apr 12 21:59:52.591685 kernel: Key type dns_resolver registered Apr 12 21:59:52.591690 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Apr 12 21:59:52.591695 kernel: microcode: Microcode Update Driver: v2.2. Apr 12 21:59:52.591700 kernel: IPI shorthand broadcast: enabled Apr 12 21:59:52.591706 kernel: sched_clock: Marking stable (1853716645, 1355332928)->(4655707129, -1446657556) Apr 12 21:59:52.591712 kernel: registered taskstats version 1 Apr 12 21:59:52.591717 kernel: Loading compiled-in X.509 certificates Apr 12 21:59:52.591723 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 21:59:52.591728 kernel: Key type .fscrypt registered Apr 12 21:59:52.591733 kernel: Key type fscrypt-provisioning registered Apr 12 21:59:52.591739 kernel: pstore: Using crash dump compression: deflate Apr 12 21:59:52.591744 kernel: ima: Allocated hash algorithm: sha1 Apr 12 21:59:52.591749 kernel: ima: No architecture policies found Apr 12 21:59:52.591755 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 21:59:52.591761 kernel: Write protecting the kernel read-only data: 28672k Apr 12 21:59:52.591766 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 21:59:52.591771 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 21:59:52.591777 kernel: Run /init as init process Apr 12 21:59:52.591782 kernel: with arguments: Apr 12 21:59:52.591787 kernel: /init Apr 12 21:59:52.591793 kernel: with environment: Apr 12 21:59:52.591798 kernel: HOME=/ Apr 12 21:59:52.591804 kernel: TERM=linux Apr 12 21:59:52.591809 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 21:59:52.591815 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 21:59:52.591822 systemd[1]: Detected architecture x86-64. Apr 12 21:59:52.591828 systemd[1]: Running in initrd. Apr 12 21:59:52.591833 systemd[1]: No hostname configured, using default hostname. Apr 12 21:59:52.591839 systemd[1]: Hostname set to . Apr 12 21:59:52.591844 systemd[1]: Initializing machine ID from random generator. Apr 12 21:59:52.591850 systemd[1]: Queued start job for default target initrd.target. Apr 12 21:59:52.591856 systemd[1]: Started systemd-ask-password-console.path. Apr 12 21:59:52.591861 systemd[1]: Reached target cryptsetup.target. Apr 12 21:59:52.591867 systemd[1]: Reached target ignition-diskful-subsequent.target. Apr 12 21:59:52.591872 systemd[1]: Reached target paths.target. Apr 12 21:59:52.591878 systemd[1]: Reached target slices.target. Apr 12 21:59:52.591883 systemd[1]: Reached target swap.target. Apr 12 21:59:52.591888 systemd[1]: Reached target timers.target. Apr 12 21:59:52.591895 systemd[1]: Listening on iscsid.socket. Apr 12 21:59:52.591901 systemd[1]: Listening on iscsiuio.socket. Apr 12 21:59:52.591906 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 21:59:52.591912 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 21:59:52.591917 systemd[1]: Listening on systemd-journald.socket. Apr 12 21:59:52.591923 kernel: tsc: Refined TSC clocksource calibration: 3408.090 MHz Apr 12 21:59:52.591928 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 21:59:52.591935 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x3120293b7c5, max_idle_ns: 440795350774 ns Apr 12 21:59:52.591940 kernel: clocksource: Switched to clocksource tsc Apr 12 21:59:52.591945 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 21:59:52.591951 systemd[1]: Reached target sockets.target. Apr 12 21:59:52.591956 systemd[1]: Starting iscsiuio.service... Apr 12 21:59:52.591962 systemd[1]: Starting kmod-static-nodes.service... Apr 12 21:59:52.591967 kernel: SCSI subsystem initialized Apr 12 21:59:52.591973 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 21:59:52.591978 kernel: Loading iSCSI transport class v2.0-870. Apr 12 21:59:52.591984 systemd[1]: Starting systemd-journald.service... Apr 12 21:59:52.591990 systemd[1]: Starting systemd-modules-load.service... Apr 12 21:59:52.591998 systemd-journald[269]: Journal started Apr 12 21:59:52.592024 systemd-journald[269]: Runtime Journal (/run/log/journal/fd4d1a30b6604d4cb9ea90e22507c58e) is 8.0M, max 639.3M, 631.3M free. Apr 12 21:59:52.593220 systemd-modules-load[271]: Inserted module 'overlay' Apr 12 21:59:52.638387 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 21:59:52.638401 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 21:59:52.669295 kernel: Bridge firewalling registered Apr 12 21:59:52.669311 systemd[1]: Started iscsiuio.service. Apr 12 21:59:52.683397 systemd-modules-load[271]: Inserted module 'br_netfilter' Apr 12 21:59:52.813373 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 21:59:52.813384 kernel: audit: type=1130 audit(1712959192.702:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:52.813391 systemd[1]: Started systemd-journald.service. Apr 12 21:59:52.813399 kernel: device-mapper: uevent: version 1.0.3 Apr 12 21:59:52.813406 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 21:59:52.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:52.815272 systemd-modules-load[271]: Inserted module 'dm_multipath' Apr 12 21:59:52.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:52.821693 systemd[1]: Finished kmod-static-nodes.service. Apr 12 21:59:52.915063 kernel: audit: type=1130 audit(1712959192.821:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:52.915074 kernel: audit: type=1130 audit(1712959192.872:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:52.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:52.872581 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 21:59:52.966541 kernel: audit: type=1130 audit(1712959192.923:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:52.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:52.923564 systemd[1]: Finished systemd-modules-load.service. Apr 12 21:59:53.020179 kernel: audit: type=1130 audit(1712959192.975:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:52.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:52.975593 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 21:59:53.075012 kernel: audit: type=1130 audit(1712959193.028:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:53.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:53.028871 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 21:59:53.075480 systemd[1]: Starting systemd-sysctl.service... Apr 12 21:59:53.075765 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 21:59:53.078790 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 21:59:53.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:53.079435 systemd[1]: Finished systemd-sysctl.service. Apr 12 21:59:53.128501 kernel: audit: type=1130 audit(1712959193.077:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:53.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:53.140641 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 21:59:53.246021 kernel: audit: type=1130 audit(1712959193.140:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:53.246037 kernel: audit: type=1130 audit(1712959193.196:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:53.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:53.196938 systemd[1]: Starting dracut-cmdline.service... Apr 12 21:59:53.263393 kernel: iscsi: registered transport (tcp) Apr 12 21:59:53.263404 dracut-cmdline[293]: dracut-dracut-053 Apr 12 21:59:53.263404 dracut-cmdline[293]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Apr 12 21:59:53.263404 dracut-cmdline[293]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 21:59:53.347523 kernel: iscsi: registered transport (qla4xxx) Apr 12 21:59:53.347537 kernel: QLogic iSCSI HBA Driver Apr 12 21:59:53.344022 systemd[1]: Finished dracut-cmdline.service. Apr 12 21:59:53.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:53.357083 systemd[1]: Starting dracut-pre-udev.service... Apr 12 21:59:53.371720 systemd[1]: Starting iscsid.service... Apr 12 21:59:53.385488 systemd[1]: Started iscsid.service. Apr 12 21:59:53.421401 kernel: raid6: avx2x4 gen() 39333 MB/s Apr 12 21:59:53.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:53.421478 iscsid[456]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 21:59:53.421478 iscsid[456]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 21:59:53.421478 iscsid[456]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 21:59:53.421478 iscsid[456]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 21:59:53.421478 iscsid[456]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 21:59:53.421478 iscsid[456]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 21:59:53.421478 iscsid[456]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 21:59:53.587396 kernel: raid6: avx2x4 xor() 21446 MB/s Apr 12 21:59:53.587407 kernel: raid6: avx2x2 gen() 53775 MB/s Apr 12 21:59:53.587415 kernel: raid6: avx2x2 xor() 32126 MB/s Apr 12 21:59:53.587421 kernel: raid6: avx2x1 gen() 45246 MB/s Apr 12 21:59:53.587428 kernel: raid6: avx2x1 xor() 27959 MB/s Apr 12 21:59:53.629326 kernel: raid6: sse2x4 gen() 21361 MB/s Apr 12 21:59:53.664361 kernel: raid6: sse2x4 xor() 11994 MB/s Apr 12 21:59:53.698300 kernel: raid6: sse2x2 gen() 21650 MB/s Apr 12 21:59:53.732295 kernel: raid6: sse2x2 xor() 13412 MB/s Apr 12 21:59:53.766295 kernel: raid6: sse2x1 gen() 18313 MB/s Apr 12 21:59:53.818806 kernel: raid6: sse2x1 xor() 8924 MB/s Apr 12 21:59:53.818823 kernel: raid6: using algorithm avx2x2 gen() 53775 MB/s Apr 12 21:59:53.818831 kernel: raid6: .... xor() 32126 MB/s, rmw enabled Apr 12 21:59:53.837123 kernel: raid6: using avx2x2 recovery algorithm Apr 12 21:59:53.883295 kernel: xor: automatically using best checksumming function avx Apr 12 21:59:53.962325 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 21:59:53.967146 systemd[1]: Finished dracut-pre-udev.service. Apr 12 21:59:53.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:53.975000 audit: BPF prog-id=6 op=LOAD Apr 12 21:59:53.975000 audit: BPF prog-id=7 op=LOAD Apr 12 21:59:53.976371 systemd[1]: Starting systemd-udevd.service... Apr 12 21:59:53.984489 systemd-udevd[473]: Using default interface naming scheme 'v252'. Apr 12 21:59:54.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:53.989531 systemd[1]: Started systemd-udevd.service. Apr 12 21:59:54.028411 dracut-pre-trigger[485]: rd.md=0: removing MD RAID activation Apr 12 21:59:54.003965 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 21:59:54.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:54.029856 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 21:59:54.046274 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 21:59:54.097848 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 21:59:54.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:54.108191 systemd[1]: Starting dracut-initqueue.service... Apr 12 21:59:54.128299 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 21:59:54.166272 kernel: ACPI: bus type USB registered Apr 12 21:59:54.166310 kernel: usbcore: registered new interface driver usbfs Apr 12 21:59:54.166319 kernel: usbcore: registered new interface driver hub Apr 12 21:59:54.185301 kernel: usbcore: registered new device driver usb Apr 12 21:59:54.203318 kernel: libata version 3.00 loaded. Apr 12 21:59:54.225302 kernel: AVX2 version of gcm_enc/dec engaged. Apr 12 21:59:54.225339 kernel: AES CTR mode by8 optimization enabled Apr 12 21:59:54.277827 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Apr 12 21:59:54.277860 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Apr 12 21:59:54.316957 kernel: mlx5_core 0000:02:00.0: firmware version: 14.29.2002 Apr 12 21:59:54.317085 kernel: mlx5_core 0000:02:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Apr 12 21:59:54.318298 kernel: ahci 0000:00:17.0: version 3.0 Apr 12 21:59:54.329294 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Apr 12 21:59:54.329381 kernel: pps pps0: new PPS source ptp0 Apr 12 21:59:54.329452 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 8 ports 6 Gbps 0xff impl SATA mode Apr 12 21:59:54.329516 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Apr 12 21:59:54.351111 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Apr 12 21:59:54.351185 kernel: igb 0000:04:00.0: added PHC on eth0 Apr 12 21:59:54.365295 kernel: scsi host0: ahci Apr 12 21:59:54.365375 kernel: scsi host1: ahci Apr 12 21:59:54.365432 kernel: scsi host2: ahci Apr 12 21:59:54.365494 kernel: scsi host3: ahci Apr 12 21:59:54.365553 kernel: scsi host4: ahci Apr 12 21:59:54.365615 kernel: scsi host5: ahci Apr 12 21:59:54.365687 kernel: scsi host6: ahci Apr 12 21:59:54.365741 kernel: scsi host7: ahci Apr 12 21:59:54.365796 kernel: ata1: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516100 irq 134 Apr 12 21:59:54.365806 kernel: ata2: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516180 irq 134 Apr 12 21:59:54.365815 kernel: ata3: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516200 irq 134 Apr 12 21:59:54.365823 kernel: ata4: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516280 irq 134 Apr 12 21:59:54.365832 kernel: ata5: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516300 irq 134 Apr 12 21:59:54.365840 kernel: ata6: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516380 irq 134 Apr 12 21:59:54.365848 kernel: ata7: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516400 irq 134 Apr 12 21:59:54.365856 kernel: ata8: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516480 irq 134 Apr 12 21:59:54.408512 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Apr 12 21:59:54.408593 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Apr 12 21:59:54.423404 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Apr 12 21:59:54.423474 kernel: igb 0000:04:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:1b:20 Apr 12 21:59:54.436254 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Apr 12 21:59:54.436331 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Apr 12 21:59:54.460626 kernel: igb 0000:04:00.0: eth0: PBA No: 010000-000 Apr 12 21:59:54.472142 kernel: hub 1-0:1.0: USB hub found Apr 12 21:59:54.472227 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Apr 12 21:59:54.528025 kernel: pps pps1: new PPS source ptp1 Apr 12 21:59:54.528100 kernel: hub 1-0:1.0: 16 ports detected Apr 12 21:59:54.528165 kernel: igb 0000:05:00.0: added PHC on eth1 Apr 12 21:59:54.563337 kernel: hub 2-0:1.0: USB hub found Apr 12 21:59:54.563420 kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection Apr 12 21:59:54.563479 kernel: mlx5_core 0000:02:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Apr 12 21:59:54.581295 kernel: hub 2-0:1.0: 10 ports detected Apr 12 21:59:54.581374 kernel: mlx5_core 0000:02:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 21:59:54.595351 kernel: igb 0000:05:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:1b:21 Apr 12 21:59:54.689363 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Apr 12 21:59:54.689382 kernel: igb 0000:05:00.0: eth1: PBA No: 010000-000 Apr 12 21:59:54.689451 kernel: ata6: SATA link down (SStatus 0 SControl 300) Apr 12 21:59:54.715475 kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Apr 12 21:59:54.715550 kernel: ata4: SATA link down (SStatus 0 SControl 300) Apr 12 21:59:54.776331 kernel: mlx5_core 0000:02:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Apr 12 21:59:54.776415 kernel: ata8: SATA link down (SStatus 0 SControl 300) Apr 12 21:59:54.798305 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Apr 12 21:59:54.798353 kernel: mlx5_core 0000:02:00.1: firmware version: 14.29.2002 Apr 12 21:59:54.798584 kernel: mlx5_core 0000:02:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Apr 12 21:59:54.801294 kernel: ata5: SATA link down (SStatus 0 SControl 300) Apr 12 21:59:54.949341 kernel: hub 1-14:1.0: USB hub found Apr 12 21:59:54.949430 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Apr 12 21:59:54.979329 kernel: hub 1-14:1.0: 4 ports detected Apr 12 21:59:54.979409 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Apr 12 21:59:55.080336 kernel: mlx5_core 0000:02:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Apr 12 21:59:55.080425 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Apr 12 21:59:55.115298 kernel: port_module: 9 callbacks suppressed Apr 12 21:59:55.115314 kernel: mlx5_core 0000:02:00.1: Port module event: module 1, Cable plugged Apr 12 21:59:55.115383 kernel: ata3: SATA link down (SStatus 0 SControl 300) Apr 12 21:59:55.147336 kernel: mlx5_core 0000:02:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 21:59:55.147408 kernel: ata7: SATA link down (SStatus 0 SControl 300) Apr 12 21:59:55.231834 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Apr 12 21:59:55.231853 kernel: ata2.00: Features: NCQ-prio Apr 12 21:59:55.231861 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Apr 12 21:59:55.264930 kernel: ata1.00: Features: NCQ-prio Apr 12 21:59:55.285340 kernel: ata2.00: configured for UDMA/133 Apr 12 21:59:55.285355 kernel: ata1.00: configured for UDMA/133 Apr 12 21:59:55.301354 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Apr 12 21:59:55.301379 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Apr 12 21:59:55.339296 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Apr 12 21:59:55.381296 kernel: igb 0000:05:00.0 eno2: renamed from eth1 Apr 12 21:59:55.392366 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 21:59:55.392397 kernel: mlx5_core 0000:02:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Apr 12 21:59:55.392462 kernel: igb 0000:04:00.0 eno1: renamed from eth0 Apr 12 21:59:55.404192 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 21:59:55.404207 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Apr 12 21:59:55.404323 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Apr 12 21:59:55.404402 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Apr 12 21:59:55.404499 kernel: sd 1:0:0:0: [sdb] Write Protect is off Apr 12 21:59:55.404578 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Apr 12 21:59:55.404666 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Apr 12 21:59:55.404750 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 21:59:55.404757 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 21:59:55.404763 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Apr 12 21:59:55.527040 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 21:59:55.527057 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Apr 12 21:59:55.626352 kernel: sd 0:0:0:0: [sda] Write Protect is off Apr 12 21:59:55.660626 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Apr 12 21:59:55.660720 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Apr 12 21:59:55.675981 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 21:59:55.709909 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 21:59:55.709925 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 21:59:55.709932 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Apr 12 21:59:55.743300 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: renamed from eth0 Apr 12 21:59:55.773216 kernel: usbcore: registered new interface driver usbhid Apr 12 21:59:55.773233 kernel: usbhid: USB HID core driver Apr 12 21:59:55.787376 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 21:59:55.870795 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Apr 12 21:59:55.870812 kernel: BTRFS: device label OEM devid 1 transid 19 /dev/sda6 scanned by (udev-worker) (536) Apr 12 21:59:55.870820 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: renamed from eth2 Apr 12 21:59:55.870897 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Apr 12 21:59:55.854906 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 21:59:55.926708 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Apr 12 21:59:55.926729 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Apr 12 21:59:55.904423 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 21:59:55.967159 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 21:59:55.986629 systemd[1]: Finished dracut-initqueue.service. Apr 12 21:59:55.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:55.987868 systemd[1]: Reached target initrd-root-device.target. Apr 12 21:59:56.054495 kernel: audit: type=1130 audit(1712959195.986:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:56.040499 systemd[1]: Reached target remote-fs-pre.target. Apr 12 21:59:56.040607 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 21:59:56.068472 systemd[1]: Reached target remote-fs.target. Apr 12 21:59:56.068995 systemd[1]: Starting disk-uuid.service... Apr 12 21:59:56.082872 systemd[1]: Starting dracut-pre-mount.service... Apr 12 21:59:56.213668 kernel: audit: type=1130 audit(1712959196.114:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:56.213757 kernel: audit: type=1131 audit(1712959196.114:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:56.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:56.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:56.101666 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 21:59:56.269348 kernel: audit: type=1130 audit(1712959196.222:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:56.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:56.101766 systemd[1]: Finished disk-uuid.service. Apr 12 21:59:56.115845 systemd[1]: Finished dracut-pre-mount.service. Apr 12 21:59:56.222572 systemd[1]: Reached target local-fs-pre.target. Apr 12 21:59:56.277357 systemd[1]: Reached target local-fs.target. Apr 12 21:59:56.277391 systemd[1]: Reached target sysinit.target. Apr 12 21:59:56.299518 systemd[1]: Reached target basic.target. Apr 12 21:59:56.313116 systemd[1]: Starting systemd-fsck-root.service... Apr 12 21:59:56.327932 systemd[1]: Starting verity-setup.service... Apr 12 21:59:56.340223 systemd-fsck[713]: ROOT: clean, 641/553520 files, 112316/553472 blocks Apr 12 21:59:56.365348 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Apr 12 21:59:56.375084 systemd[1]: Finished systemd-fsck-root.service. Apr 12 21:59:56.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:56.386435 systemd[1]: Mounting sysroot.mount... Apr 12 21:59:56.448398 kernel: audit: type=1130 audit(1712959196.383:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:56.447026 systemd[1]: Found device dev-mapper-usr.device. Apr 12 21:59:56.457211 systemd[1]: Mounting sysusr-usr.mount... Apr 12 21:59:56.463571 systemd[1]: Finished verity-setup.service. Apr 12 21:59:56.574267 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 21:59:56.574281 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 21:59:56.574288 kernel: audit: type=1130 audit(1712959196.524:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:56.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:56.525018 systemd[1]: Mounted sysroot.mount. Apr 12 21:59:56.582381 systemd[1]: Mounted sysusr-usr.mount. Apr 12 21:59:56.594394 systemd[1]: Reached target initrd-root-fs.target. Apr 12 21:59:56.603198 systemd[1]: Mounting sysroot-usr.mount... Apr 12 21:59:56.629114 systemd[1]: Mounted sysroot-usr.mount. Apr 12 21:59:56.639028 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 21:59:56.739513 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 21:59:56.739530 kernel: BTRFS info (device sda6): using free space tree Apr 12 21:59:56.739538 kernel: BTRFS info (device sda6): has skinny extents Apr 12 21:59:56.739545 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 21:59:56.658821 systemd[1]: Starting initrd-setup-root.service... Apr 12 21:59:56.747584 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 21:59:56.765588 systemd[1]: Finished initrd-setup-root.service. Apr 12 21:59:56.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:56.784074 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 21:59:56.854544 kernel: audit: type=1130 audit(1712959196.783:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:56.844634 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 21:59:56.919293 kernel: audit: type=1130 audit(1712959196.864:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:56.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:56.919448 initrd-setup-root-after-ignition[805]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 21:59:56.864604 systemd[1]: Reached target ignition-subsequent.target. Apr 12 21:59:56.927820 systemd[1]: Starting initrd-parse-etc.service... Apr 12 21:59:56.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:56.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:56.954520 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 21:59:57.046529 kernel: audit: type=1130 audit(1712959196.964:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:56.954568 systemd[1]: Finished initrd-parse-etc.service. Apr 12 21:59:56.964881 systemd[1]: Reached target initrd-fs.target. Apr 12 21:59:57.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.031509 systemd[1]: Reached target initrd.target. Apr 12 21:59:57.031645 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 21:59:57.032003 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 21:59:57.053708 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 21:59:57.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.070280 systemd[1]: Starting initrd-cleanup.service... Apr 12 21:59:57.089060 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 21:59:57.099667 systemd[1]: Stopped target timers.target. Apr 12 21:59:57.118897 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 21:59:57.119197 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 21:59:57.136209 systemd[1]: Stopped target initrd.target. Apr 12 21:59:57.150940 systemd[1]: Stopped target basic.target. Apr 12 21:59:57.165963 systemd[1]: Stopped target ignition-subsequent.target. Apr 12 21:59:57.182964 systemd[1]: Stopped target ignition-diskful-subsequent.target. Apr 12 21:59:57.199943 systemd[1]: Stopped target initrd-root-device.target. Apr 12 21:59:57.216934 systemd[1]: Stopped target paths.target. Apr 12 21:59:57.231948 systemd[1]: Stopped target remote-fs.target. Apr 12 21:59:57.249069 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 21:59:57.264943 systemd[1]: Stopped target slices.target. Apr 12 21:59:57.279918 systemd[1]: Stopped target sockets.target. Apr 12 21:59:57.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.296948 systemd[1]: Stopped target sysinit.target. Apr 12 21:59:57.313967 systemd[1]: Stopped target local-fs.target. Apr 12 21:59:57.329951 systemd[1]: Stopped target local-fs-pre.target. Apr 12 21:59:57.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.346950 systemd[1]: Stopped target swap.target. Apr 12 21:59:57.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.361878 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 21:59:57.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.465580 iscsid[456]: iscsid shutting down. Apr 12 21:59:57.362208 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 21:59:57.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.378143 systemd[1]: Stopped target cryptsetup.target. Apr 12 21:59:57.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.393812 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 21:59:57.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.397493 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 21:59:57.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.408867 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 21:59:57.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.409193 systemd[1]: Stopped dracut-initqueue.service. Apr 12 21:59:57.426063 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 21:59:57.426415 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 21:59:57.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.443026 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 21:59:57.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.443354 systemd[1]: Stopped initrd-setup-root.service. Apr 12 21:59:57.458392 systemd[1]: Stopping iscsid.service... Apr 12 21:59:57.472525 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 21:59:57.472710 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 21:59:57.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.487689 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 21:59:57.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.487776 systemd[1]: Stopped systemd-sysctl.service. Apr 12 21:59:57.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.503795 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 21:59:57.503917 systemd[1]: Stopped systemd-modules-load.service. Apr 12 21:59:57.519820 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 21:59:57.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.520005 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 21:59:57.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.539003 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 21:59:57.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.539335 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 21:59:57.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:59:57.555390 systemd[1]: Stopping systemd-udevd.service... Apr 12 21:59:57.571083 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 21:59:57.571501 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 21:59:57.571548 systemd[1]: Stopped iscsid.service. Apr 12 21:59:57.593948 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 21:59:57.594065 systemd[1]: Stopped systemd-udevd.service. Apr 12 21:59:57.611924 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 21:59:57.612002 systemd[1]: Closed iscsid.socket. Apr 12 21:59:57.628633 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 21:59:57.628729 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 21:59:57.644638 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 21:59:57.644728 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 21:59:57.659539 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 21:59:57.659658 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 21:59:57.678866 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 21:59:57.679005 systemd[1]: Stopped dracut-cmdline.service. Apr 12 21:59:57.694849 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 21:59:57.694991 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 21:59:57.713378 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 21:59:57.726679 systemd[1]: Stopping iscsiuio.service... Apr 12 21:59:57.743541 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 21:59:57.743708 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 21:59:57.760557 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 21:59:57.760793 systemd[1]: Stopped iscsiuio.service. Apr 12 21:59:57.777046 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 21:59:57.777244 systemd[1]: Finished initrd-cleanup.service. Apr 12 21:59:57.794222 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 21:59:57.794454 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 21:59:57.814691 systemd[1]: Reached target initrd-switch-root.target. Apr 12 21:59:57.829748 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 21:59:57.829863 systemd[1]: Closed iscsiuio.socket. Apr 12 21:59:57.846383 systemd[1]: Starting initrd-switch-root.service... Apr 12 21:59:57.883614 systemd[1]: Switching root. Apr 12 21:59:57.939189 systemd-journald[269]: Journal stopped Apr 12 22:00:01.814983 systemd-journald[269]: Received SIGTERM from PID 1 (n/a). Apr 12 22:00:01.814999 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 22:00:01.815007 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 22:00:01.815013 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 22:00:01.815018 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 22:00:01.815023 kernel: SELinux: policy capability open_perms=1 Apr 12 22:00:01.815029 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 22:00:01.815036 kernel: SELinux: policy capability always_check_network=0 Apr 12 22:00:01.815041 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 22:00:01.815047 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 22:00:01.815052 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 22:00:01.815058 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 22:00:01.815064 systemd[1]: Successfully loaded SELinux policy in 304.361ms. Apr 12 22:00:01.815070 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.862ms. Apr 12 22:00:01.815079 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 22:00:01.815085 systemd[1]: Detected architecture x86-64. Apr 12 22:00:01.815091 systemd[1]: Detected first boot. Apr 12 22:00:01.815097 systemd[1]: Hostname set to . Apr 12 22:00:01.815104 systemd[1]: Initializing machine ID from random generator. Apr 12 22:00:01.815111 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 22:00:01.815117 systemd[1]: Populated /etc with preset unit settings. Apr 12 22:00:01.815123 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 22:00:01.815130 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 22:00:01.815136 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 22:00:01.815143 kernel: kauditd_printk_skb: 40 callbacks suppressed Apr 12 22:00:01.815149 kernel: audit: type=1334 audit(1712959200.362:61): prog-id=10 op=LOAD Apr 12 22:00:01.815156 kernel: audit: type=1334 audit(1712959200.362:62): prog-id=3 op=UNLOAD Apr 12 22:00:01.815162 kernel: audit: type=1334 audit(1712959200.404:63): prog-id=11 op=LOAD Apr 12 22:00:01.815186 kernel: audit: type=1334 audit(1712959200.446:64): prog-id=12 op=LOAD Apr 12 22:00:01.815193 kernel: audit: type=1334 audit(1712959200.446:65): prog-id=4 op=UNLOAD Apr 12 22:00:01.815221 kernel: audit: type=1334 audit(1712959200.446:66): prog-id=5 op=UNLOAD Apr 12 22:00:01.815230 kernel: audit: type=1334 audit(1712959200.506:67): prog-id=13 op=LOAD Apr 12 22:00:01.815240 kernel: audit: type=1334 audit(1712959200.506:68): prog-id=10 op=UNLOAD Apr 12 22:00:01.815251 kernel: audit: type=1334 audit(1712959200.545:69): prog-id=14 op=LOAD Apr 12 22:00:01.815261 kernel: audit: type=1334 audit(1712959200.564:70): prog-id=15 op=LOAD Apr 12 22:00:01.815269 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 22:00:01.815296 systemd[1]: Stopped initrd-switch-root.service. Apr 12 22:00:01.815303 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 22:00:01.815324 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 22:00:01.815331 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 22:00:01.815339 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 22:00:01.815346 systemd[1]: Created slice system-getty.slice. Apr 12 22:00:01.815353 systemd[1]: Created slice system-modprobe.slice. Apr 12 22:00:01.815359 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 22:00:01.815366 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 22:00:01.815372 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 22:00:01.815379 systemd[1]: Created slice user.slice. Apr 12 22:00:01.815386 systemd[1]: Started systemd-ask-password-console.path. Apr 12 22:00:01.815392 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 22:00:01.815399 systemd[1]: Set up automount boot.automount. Apr 12 22:00:01.815406 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 22:00:01.815413 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 22:00:01.815419 systemd[1]: Stopped target initrd-fs.target. Apr 12 22:00:01.815426 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 22:00:01.815432 systemd[1]: Reached target integritysetup.target. Apr 12 22:00:01.815439 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 22:00:01.815450 systemd[1]: Reached target remote-fs.target. Apr 12 22:00:01.815461 systemd[1]: Reached target slices.target. Apr 12 22:00:01.815472 systemd[1]: Reached target swap.target. Apr 12 22:00:01.815483 systemd[1]: Reached target torcx.target. Apr 12 22:00:01.815494 systemd[1]: Reached target veritysetup.target. Apr 12 22:00:01.815504 systemd[1]: Listening on systemd-coredump.socket. Apr 12 22:00:01.815533 systemd[1]: Listening on systemd-initctl.socket. Apr 12 22:00:01.815541 systemd[1]: Listening on systemd-networkd.socket. Apr 12 22:00:01.815550 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 22:00:01.815570 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 22:00:01.815577 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 22:00:01.815584 systemd[1]: Mounting dev-hugepages.mount... Apr 12 22:00:01.815590 systemd[1]: Mounting dev-mqueue.mount... Apr 12 22:00:01.815597 systemd[1]: Mounting media.mount... Apr 12 22:00:01.815604 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 22:00:01.815612 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 22:00:01.815618 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 22:00:01.815625 systemd[1]: Mounting tmp.mount... Apr 12 22:00:01.815632 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 22:00:01.815638 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 22:00:01.815645 systemd[1]: Starting kmod-static-nodes.service... Apr 12 22:00:01.815652 systemd[1]: Starting modprobe@configfs.service... Apr 12 22:00:01.815658 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 22:00:01.815665 systemd[1]: Starting modprobe@drm.service... Apr 12 22:00:01.815672 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 22:00:01.815679 systemd[1]: Starting modprobe@fuse.service... Apr 12 22:00:01.815685 kernel: fuse: init (API version 7.34) Apr 12 22:00:01.815692 systemd[1]: Starting modprobe@loop.service... Apr 12 22:00:01.815698 kernel: loop: module loaded Apr 12 22:00:01.815705 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 22:00:01.815712 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 22:00:01.815719 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 22:00:01.815725 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 22:00:01.815733 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 22:00:01.815740 systemd[1]: Stopped systemd-journald.service. Apr 12 22:00:01.815746 systemd[1]: Starting systemd-journald.service... Apr 12 22:00:01.815753 systemd[1]: Starting systemd-modules-load.service... Apr 12 22:00:01.815761 systemd-journald[944]: Journal started Apr 12 22:00:01.815787 systemd-journald[944]: Runtime Journal (/run/log/journal/96ec2ca12d82421b951adf18cfa62f10) is 8.0M, max 639.3M, 631.3M free. Apr 12 21:59:58.458000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 21:59:58.723000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 21:59:58.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 21:59:58.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 21:59:58.726000 audit: BPF prog-id=8 op=LOAD Apr 12 21:59:58.726000 audit: BPF prog-id=8 op=UNLOAD Apr 12 21:59:58.726000 audit: BPF prog-id=9 op=LOAD Apr 12 21:59:58.726000 audit: BPF prog-id=9 op=UNLOAD Apr 12 21:59:58.794000 audit[837]: AVC avc: denied { associate } for pid=837 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 21:59:58.794000 audit[837]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001d98a2 a1=c00015adf8 a2=c0001630c0 a3=32 items=0 ppid=820 pid=837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:59:58.794000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 21:59:58.819000 audit[837]: AVC avc: denied { associate } for pid=837 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 21:59:58.819000 audit[837]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001d9979 a2=1ed a3=0 items=2 ppid=820 pid=837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:59:58.819000 audit: CWD cwd="/" Apr 12 21:59:58.819000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:59:58.819000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:59:58.819000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 22:00:00.362000 audit: BPF prog-id=10 op=LOAD Apr 12 22:00:00.362000 audit: BPF prog-id=3 op=UNLOAD Apr 12 22:00:00.404000 audit: BPF prog-id=11 op=LOAD Apr 12 22:00:00.446000 audit: BPF prog-id=12 op=LOAD Apr 12 22:00:00.446000 audit: BPF prog-id=4 op=UNLOAD Apr 12 22:00:00.446000 audit: BPF prog-id=5 op=UNLOAD Apr 12 22:00:00.506000 audit: BPF prog-id=13 op=LOAD Apr 12 22:00:00.506000 audit: BPF prog-id=10 op=UNLOAD Apr 12 22:00:00.545000 audit: BPF prog-id=14 op=LOAD Apr 12 22:00:00.564000 audit: BPF prog-id=15 op=LOAD Apr 12 22:00:00.564000 audit: BPF prog-id=11 op=UNLOAD Apr 12 22:00:00.564000 audit: BPF prog-id=12 op=UNLOAD Apr 12 22:00:00.583000 audit: BPF prog-id=16 op=LOAD Apr 12 22:00:00.583000 audit: BPF prog-id=13 op=UNLOAD Apr 12 22:00:00.583000 audit: BPF prog-id=17 op=LOAD Apr 12 22:00:00.583000 audit: BPF prog-id=18 op=LOAD Apr 12 22:00:00.583000 audit: BPF prog-id=14 op=UNLOAD Apr 12 22:00:00.583000 audit: BPF prog-id=15 op=UNLOAD Apr 12 22:00:00.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:00.628000 audit: BPF prog-id=16 op=UNLOAD Apr 12 22:00:00.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:00.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:01.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:01.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:01.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:01.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:01.787000 audit: BPF prog-id=19 op=LOAD Apr 12 22:00:01.787000 audit: BPF prog-id=20 op=LOAD Apr 12 22:00:01.787000 audit: BPF prog-id=21 op=LOAD Apr 12 22:00:01.787000 audit: BPF prog-id=17 op=UNLOAD Apr 12 22:00:01.787000 audit: BPF prog-id=18 op=UNLOAD Apr 12 22:00:01.811000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 22:00:01.811000 audit[944]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fffaf667a90 a2=4000 a3=7fffaf667b2c items=0 ppid=1 pid=944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:01.811000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 22:00:00.362668 systemd[1]: Queued start job for default target multi-user.target. Apr 12 21:59:58.792712 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T21:59:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 22:00:00.362674 systemd[1]: Unnecessary job was removed for dev-sda6.device. Apr 12 21:59:58.793175 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T21:59:58Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 22:00:00.585302 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 21:59:58.793192 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T21:59:58Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 21:59:58.793216 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T21:59:58Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 21:59:58.793225 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T21:59:58Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 21:59:58.793249 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T21:59:58Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 21:59:58.793260 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T21:59:58Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 21:59:58.793430 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T21:59:58Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 21:59:58.793470 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T21:59:58Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 21:59:58.793481 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T21:59:58Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 21:59:58.794855 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T21:59:58Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 21:59:58.794888 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T21:59:58Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 21:59:58.794906 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T21:59:58Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 21:59:58.794919 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T21:59:58Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 21:59:58.794934 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T21:59:58Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 21:59:58.794945 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T21:59:58Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 22:00:00.001097 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T22:00:00Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 22:00:00.001444 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T22:00:00Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 22:00:00.001520 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T22:00:00Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 22:00:00.001634 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T22:00:00Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 22:00:00.001668 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T22:00:00Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 22:00:00.001704 /usr/lib/systemd/system-generators/torcx-generator[837]: time="2024-04-12T22:00:00Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 22:00:01.845497 systemd[1]: Starting systemd-network-generator.service... Apr 12 22:00:01.867334 systemd[1]: Starting systemd-remount-fs.service... Apr 12 22:00:01.889343 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 22:00:01.921795 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 22:00:01.921816 systemd[1]: Stopped verity-setup.service. Apr 12 22:00:01.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:01.956339 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 22:00:01.970326 systemd[1]: Started systemd-journald.service. Apr 12 22:00:01.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:01.978826 systemd[1]: Mounted dev-hugepages.mount. Apr 12 22:00:01.986552 systemd[1]: Mounted dev-mqueue.mount. Apr 12 22:00:01.993547 systemd[1]: Mounted media.mount. Apr 12 22:00:02.000542 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 22:00:02.009535 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 22:00:02.018542 systemd[1]: Mounted tmp.mount. Apr 12 22:00:02.025608 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 22:00:02.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.033620 systemd[1]: Finished kmod-static-nodes.service. Apr 12 22:00:02.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.042676 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 22:00:02.042783 systemd[1]: Finished modprobe@configfs.service. Apr 12 22:00:02.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.051704 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 22:00:02.051838 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 22:00:02.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.060787 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 22:00:02.060977 systemd[1]: Finished modprobe@drm.service. Apr 12 22:00:02.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.069982 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 22:00:02.070228 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 22:00:02.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.079138 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 22:00:02.079615 systemd[1]: Finished modprobe@fuse.service. Apr 12 22:00:02.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.089142 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 22:00:02.089547 systemd[1]: Finished modprobe@loop.service. Apr 12 22:00:02.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.098327 systemd[1]: Finished systemd-modules-load.service. Apr 12 22:00:02.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.108100 systemd[1]: Finished systemd-network-generator.service. Apr 12 22:00:02.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.117128 systemd[1]: Finished systemd-remount-fs.service. Apr 12 22:00:02.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.126221 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 22:00:02.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.136614 systemd[1]: Reached target network-pre.target. Apr 12 22:00:02.148345 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 22:00:02.159007 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 22:00:02.166543 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 22:00:02.167507 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 22:00:02.174901 systemd[1]: Starting systemd-journal-flush.service... Apr 12 22:00:02.178252 systemd-journald[944]: Time spent on flushing to /var/log/journal/96ec2ca12d82421b951adf18cfa62f10 is 11.204ms for 1309 entries. Apr 12 22:00:02.178252 systemd-journald[944]: System Journal (/var/log/journal/96ec2ca12d82421b951adf18cfa62f10) is 8.0M, max 195.6M, 187.6M free. Apr 12 22:00:02.215775 systemd-journald[944]: Received client request to flush runtime journal. Apr 12 22:00:02.190398 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 22:00:02.190908 systemd[1]: Starting systemd-random-seed.service... Apr 12 22:00:02.202423 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 22:00:02.202917 systemd[1]: Starting systemd-sysctl.service... Apr 12 22:00:02.209924 systemd[1]: Starting systemd-sysusers.service... Apr 12 22:00:02.216890 systemd[1]: Starting systemd-udev-settle.service... Apr 12 22:00:02.224612 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 22:00:02.232476 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 22:00:02.240540 systemd[1]: Finished systemd-journal-flush.service. Apr 12 22:00:02.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.248511 systemd[1]: Finished systemd-random-seed.service. Apr 12 22:00:02.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.256508 systemd[1]: Finished systemd-sysctl.service. Apr 12 22:00:02.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.264491 systemd[1]: Finished systemd-sysusers.service. Apr 12 22:00:02.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.273492 systemd[1]: Reached target first-boot-complete.target. Apr 12 22:00:02.281619 udevadm[960]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Apr 12 22:00:02.468565 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 22:00:02.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.477000 audit: BPF prog-id=22 op=LOAD Apr 12 22:00:02.477000 audit: BPF prog-id=23 op=LOAD Apr 12 22:00:02.477000 audit: BPF prog-id=6 op=UNLOAD Apr 12 22:00:02.477000 audit: BPF prog-id=7 op=UNLOAD Apr 12 22:00:02.478519 systemd[1]: Starting systemd-udevd.service... Apr 12 22:00:02.490517 systemd-udevd[961]: Using default interface naming scheme 'v252'. Apr 12 22:00:02.506476 systemd[1]: Started systemd-udevd.service. Apr 12 22:00:02.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.516588 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Apr 12 22:00:02.516000 audit: BPF prog-id=24 op=LOAD Apr 12 22:00:02.517851 systemd[1]: Starting systemd-networkd.service... Apr 12 22:00:02.537000 audit: BPF prog-id=25 op=LOAD Apr 12 22:00:02.552041 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Apr 12 22:00:02.552132 kernel: ACPI: button: Sleep Button [SLPB] Apr 12 22:00:02.552164 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Apr 12 22:00:02.550000 audit: BPF prog-id=26 op=LOAD Apr 12 22:00:02.550000 audit: BPF prog-id=27 op=LOAD Apr 12 22:00:02.552823 systemd[1]: Starting systemd-userdbd.service... Apr 12 22:00:02.554000 audit[968]: AVC avc: denied { confidentiality } for pid=968 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 22:00:02.575301 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 22:00:02.575344 kernel: IPMI message handler: version 39.2 Apr 12 22:00:02.575359 kernel: ACPI: button: Power Button [PWRF] Apr 12 22:00:02.598890 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 22:00:02.554000 audit[968]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558c0d4b81f0 a1=4d8bc a2=7f0e481aebc5 a3=5 items=42 ppid=961 pid=968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:02.554000 audit: CWD cwd="/" Apr 12 22:00:02.554000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=1 name=(null) inode=17749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=2 name=(null) inode=17749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=3 name=(null) inode=17750 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=4 name=(null) inode=17749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=5 name=(null) inode=17751 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=6 name=(null) inode=17749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=7 name=(null) inode=17752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=8 name=(null) inode=17752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=9 name=(null) inode=17753 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=10 name=(null) inode=17752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=11 name=(null) inode=17754 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=12 name=(null) inode=17752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=13 name=(null) inode=17755 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=14 name=(null) inode=17752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=15 name=(null) inode=17756 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=16 name=(null) inode=17752 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=17 name=(null) inode=17757 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=18 name=(null) inode=17749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=19 name=(null) inode=17758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=20 name=(null) inode=17758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=21 name=(null) inode=17759 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=22 name=(null) inode=17758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=23 name=(null) inode=17760 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=24 name=(null) inode=17758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=25 name=(null) inode=17761 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=26 name=(null) inode=17758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=27 name=(null) inode=17762 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=28 name=(null) inode=17758 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=29 name=(null) inode=17763 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=30 name=(null) inode=17749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=31 name=(null) inode=17764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=32 name=(null) inode=17764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=33 name=(null) inode=17765 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=34 name=(null) inode=17764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=35 name=(null) inode=17766 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=36 name=(null) inode=17764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=37 name=(null) inode=17767 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=38 name=(null) inode=17764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=39 name=(null) inode=17768 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=40 name=(null) inode=17764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PATH item=41 name=(null) inode=17769 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:02.554000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 22:00:02.632732 systemd[1]: Started systemd-userdbd.service. Apr 12 22:00:02.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.651303 kernel: ipmi device interface Apr 12 22:00:02.690309 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Apr 12 22:00:02.690666 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Apr 12 22:00:02.690957 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Apr 12 22:00:02.691228 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Apr 12 22:00:02.742314 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Apr 12 22:00:02.742493 kernel: ipmi_si: IPMI System Interface driver Apr 12 22:00:02.774042 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Apr 12 22:00:02.774179 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Apr 12 22:00:02.807426 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Apr 12 22:00:02.823648 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Apr 12 22:00:02.823778 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Apr 12 22:00:02.883540 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Apr 12 22:00:02.883702 kernel: ipmi_si: Adding ACPI-specified kcs state machine Apr 12 22:00:02.883723 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Apr 12 22:00:02.883737 kernel: iTCO_vendor_support: vendor-support=0 Apr 12 22:00:02.919742 systemd-networkd[1000]: bond0: netdev ready Apr 12 22:00:02.922693 systemd-networkd[1000]: lo: Link UP Apr 12 22:00:02.922697 systemd-networkd[1000]: lo: Gained carrier Apr 12 22:00:02.923131 systemd-networkd[1000]: Enumeration completed Apr 12 22:00:02.923227 systemd[1]: Started systemd-networkd.service. Apr 12 22:00:02.923513 systemd-networkd[1000]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Apr 12 22:00:02.924273 systemd-networkd[1000]: enp2s0f1np1: Configuring with /etc/systemd/network/10-04:3f:72:d9:a2:31.network. Apr 12 22:00:02.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:02.945294 kernel: iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS Apr 12 22:00:02.945378 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Apr 12 22:00:03.024610 kernel: intel_rapl_common: Found RAPL domain package Apr 12 22:00:03.024657 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b11, dev_id: 0x20) Apr 12 22:00:03.024744 kernel: intel_rapl_common: Found RAPL domain core Apr 12 22:00:03.057641 kernel: intel_rapl_common: Found RAPL domain uncore Apr 12 22:00:03.057669 kernel: intel_rapl_common: Found RAPL domain dram Apr 12 22:00:03.112299 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Apr 12 22:00:03.129297 kernel: ipmi_ssif: IPMI SSIF Interface driver Apr 12 22:00:03.151370 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Apr 12 22:00:03.175352 kernel: bond0: (slave enp2s0f1np1): Enslaving as a backup interface with an up link Apr 12 22:00:03.176903 systemd-networkd[1000]: enp2s0f0np0: Configuring with /etc/systemd/network/10-04:3f:72:d9:a2:30.network. Apr 12 22:00:03.256335 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 22:00:03.376323 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 22:00:03.602485 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Apr 12 22:00:03.627363 kernel: bond0: (slave enp2s0f0np0): Enslaving as a backup interface with an up link Apr 12 22:00:03.663372 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Apr 12 22:00:03.663409 kernel: bond0: active interface up! Apr 12 22:00:03.685371 kernel: bond0: (slave enp2s0f0np0): link status definitely up, 10000 Mbps full duplex Apr 12 22:00:03.705343 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Apr 12 22:00:03.706110 systemd-networkd[1000]: bond0: Link UP Apr 12 22:00:03.706321 systemd-networkd[1000]: enp2s0f1np1: Link UP Apr 12 22:00:03.706478 systemd-networkd[1000]: enp2s0f0np0: Link UP Apr 12 22:00:03.706704 systemd-networkd[1000]: enp2s0f1np1: Gained carrier Apr 12 22:00:03.707662 systemd-networkd[1000]: enp2s0f1np1: Reconfiguring with /etc/systemd/network/10-04:3f:72:d9:a2:30.network. Apr 12 22:00:03.726597 systemd[1]: Finished systemd-udev-settle.service. Apr 12 22:00:03.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:03.735024 systemd[1]: Starting lvm2-activation-early.service... Apr 12 22:00:03.750893 lvm[1065]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 22:00:03.783683 systemd[1]: Finished lvm2-activation-early.service. Apr 12 22:00:03.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:03.798896 systemd[1]: Reached target cryptsetup.target. Apr 12 22:00:03.811370 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 22:00:03.828006 systemd[1]: Starting lvm2-activation.service... Apr 12 22:00:03.830150 lvm[1066]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 22:00:03.834293 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 22:00:03.857293 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 22:00:03.879293 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 22:00:03.900293 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 22:00:03.908805 systemd[1]: Finished lvm2-activation.service. Apr 12 22:00:03.922359 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 22:00:03.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:03.938444 systemd[1]: Reached target local-fs-pre.target. Apr 12 22:00:03.943293 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 22:00:03.960384 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 22:00:03.960398 systemd[1]: Reached target local-fs.target. Apr 12 22:00:03.965295 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 22:00:03.981382 systemd[1]: Reached target machines.target. Apr 12 22:00:03.987293 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 22:00:04.004017 systemd[1]: Starting ldconfig.service... Apr 12 22:00:04.008293 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 22:00:04.024161 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 22:00:04.024182 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 22:00:04.024730 systemd[1]: Starting systemd-boot-update.service... Apr 12 22:00:04.028331 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 22:00:04.044783 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 22:00:04.049295 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 22:00:04.069295 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 22:00:04.085859 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 22:00:04.089178 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 22:00:04.089198 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 22:00:04.089296 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 22:00:04.089701 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 22:00:04.089917 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1069 (bootctl) Apr 12 22:00:04.090475 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 22:00:04.108301 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 22:00:04.117010 systemd-tmpfiles[1073]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 22:00:04.121231 systemd-tmpfiles[1073]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 22:00:04.126239 systemd-tmpfiles[1073]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 22:00:04.127331 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 22:00:04.128035 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 22:00:04.128361 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 22:00:04.145329 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 22:00:04.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:04.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:04.145497 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 22:00:04.165321 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 22:00:04.165728 systemd-networkd[1000]: bond0: Gained carrier Apr 12 22:00:04.165820 systemd-networkd[1000]: enp2s0f0np0: Gained carrier Apr 12 22:00:04.193052 systemd-fsck[1077]: fsck.fat 4.2 (2021-01-31) Apr 12 22:00:04.193052 systemd-fsck[1077]: /dev/sda1: 789 files, 119240/258078 clusters Apr 12 22:00:04.193933 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 22:00:04.197944 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 22:00:04.197970 kernel: bond0: (slave enp2s0f1np1): invalid new link 1 on slave Apr 12 22:00:04.200588 systemd-networkd[1000]: enp2s0f1np1: Link DOWN Apr 12 22:00:04.200591 systemd-networkd[1000]: enp2s0f1np1: Lost carrier Apr 12 22:00:04.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:04.210098 systemd[1]: Mounting boot.mount... Apr 12 22:00:04.229866 systemd[1]: Mounted boot.mount. Apr 12 22:00:04.248310 systemd[1]: Finished systemd-boot-update.service. Apr 12 22:00:04.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:04.278652 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 22:00:04.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:04.288044 systemd[1]: Starting audit-rules.service... Apr 12 22:00:04.295925 systemd[1]: Starting clean-ca-certificates.service... Apr 12 22:00:04.296577 ldconfig[1068]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 22:00:04.304930 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 22:00:04.307000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 22:00:04.307000 audit[1101]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffff3537590 a2=420 a3=0 items=0 ppid=1084 pid=1101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:04.307000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 22:00:04.309324 augenrules[1101]: No rules Apr 12 22:00:04.314327 systemd[1]: Starting systemd-resolved.service... Apr 12 22:00:04.322276 systemd[1]: Starting systemd-timesyncd.service... Apr 12 22:00:04.329861 systemd[1]: Starting systemd-update-utmp.service... Apr 12 22:00:04.336656 systemd[1]: Finished ldconfig.service. Apr 12 22:00:04.343525 systemd[1]: Finished audit-rules.service. Apr 12 22:00:04.350524 systemd[1]: Finished clean-ca-certificates.service. Apr 12 22:00:04.364501 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 22:00:04.366297 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Apr 12 22:00:04.384118 systemd[1]: Starting systemd-update-done.service... Apr 12 22:00:04.384295 kernel: bond0: (slave enp2s0f1np1): speed changed to 0 on port 1 Apr 12 22:00:04.386313 systemd-networkd[1000]: enp2s0f1np1: Link UP Apr 12 22:00:04.386465 systemd-networkd[1000]: enp2s0f1np1: Gained carrier Apr 12 22:00:04.391380 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 22:00:04.391765 systemd[1]: Finished systemd-update-done.service. Apr 12 22:00:04.401061 systemd[1]: Finished systemd-update-utmp.service. Apr 12 22:00:04.411122 systemd-resolved[1106]: Positive Trust Anchors: Apr 12 22:00:04.411131 systemd-resolved[1106]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 22:00:04.411160 systemd-resolved[1106]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 22:00:04.416446 systemd[1]: Started systemd-timesyncd.service. Apr 12 22:00:04.421334 kernel: bond0: (slave enp2s0f1np1): link status up again after 200 ms Apr 12 22:00:04.429075 systemd-resolved[1106]: Using system hostname 'ci-3510.3.3-a-a4974466e6'. Apr 12 22:00:04.437608 systemd[1]: Reached target time-set.target. Apr 12 22:00:04.440297 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Apr 12 22:00:04.447415 systemd[1]: Started systemd-resolved.service. Apr 12 22:00:04.455402 systemd[1]: Reached target network.target. Apr 12 22:00:04.463385 systemd[1]: Reached target nss-lookup.target. Apr 12 22:00:04.471388 systemd[1]: Reached target sysinit.target. Apr 12 22:00:04.479411 systemd[1]: Started motdgen.path. Apr 12 22:00:04.486381 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 22:00:04.496437 systemd[1]: Started logrotate.timer. Apr 12 22:00:04.503416 systemd[1]: Started mdadm.timer. Apr 12 22:00:04.510389 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 22:00:04.518370 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 22:00:04.518388 systemd[1]: Reached target paths.target. Apr 12 22:00:04.525372 systemd[1]: Reached target timers.target. Apr 12 22:00:04.532784 systemd[1]: Listening on dbus.socket. Apr 12 22:00:04.539928 systemd[1]: Starting docker.socket... Apr 12 22:00:04.547755 systemd[1]: Listening on sshd.socket. Apr 12 22:00:04.554444 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 22:00:04.554658 systemd[1]: Listening on docker.socket. Apr 12 22:00:04.561425 systemd[1]: Reached target sockets.target. Apr 12 22:00:04.569367 systemd[1]: Reached target basic.target. Apr 12 22:00:04.576399 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 22:00:04.576412 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 22:00:04.576840 systemd[1]: Starting containerd.service... Apr 12 22:00:04.583805 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 22:00:04.592918 systemd[1]: Starting coreos-metadata.service... Apr 12 22:00:04.599916 systemd[1]: Starting dbus.service... Apr 12 22:00:04.605872 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 22:00:04.611013 jq[1119]: false Apr 12 22:00:04.613901 systemd[1]: Starting extend-filesystems.service... Apr 12 22:00:04.620284 dbus-daemon[1118]: [system] SELinux support is enabled Apr 12 22:00:04.620380 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 22:00:04.621028 systemd[1]: Starting motdgen.service... Apr 12 22:00:04.622555 extend-filesystems[1122]: Found sda Apr 12 22:00:04.640984 extend-filesystems[1122]: Found sda1 Apr 12 22:00:04.640984 extend-filesystems[1122]: Found sda2 Apr 12 22:00:04.640984 extend-filesystems[1122]: Found sda3 Apr 12 22:00:04.640984 extend-filesystems[1122]: Found usr Apr 12 22:00:04.640984 extend-filesystems[1122]: Found sda4 Apr 12 22:00:04.640984 extend-filesystems[1122]: Found sda6 Apr 12 22:00:04.640984 extend-filesystems[1122]: Found sda7 Apr 12 22:00:04.640984 extend-filesystems[1122]: Found sda9 Apr 12 22:00:04.640984 extend-filesystems[1122]: Checking size of /dev/sda9 Apr 12 22:00:04.640984 extend-filesystems[1122]: Resized partition /dev/sda9 Apr 12 22:00:04.757330 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Apr 12 22:00:04.629041 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 22:00:04.757435 coreos-metadata[1114]: Apr 12 22:00:04.643 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 22:00:04.757551 coreos-metadata[1115]: Apr 12 22:00:04.643 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 22:00:04.757635 extend-filesystems[1136]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 22:00:04.656275 systemd[1]: Starting prepare-critools.service... Apr 12 22:00:04.663053 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 22:00:04.686813 systemd[1]: Starting sshd-keygen.service... Apr 12 22:00:04.701876 systemd[1]: Starting systemd-logind.service... Apr 12 22:00:04.718448 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 22:00:04.718930 systemd[1]: Starting tcsd.service... Apr 12 22:00:04.723490 systemd-logind[1150]: Watching system buttons on /dev/input/event3 (Power Button) Apr 12 22:00:04.773839 jq[1153]: true Apr 12 22:00:04.723500 systemd-logind[1150]: Watching system buttons on /dev/input/event2 (Sleep Button) Apr 12 22:00:04.723509 systemd-logind[1150]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Apr 12 22:00:04.723658 systemd-logind[1150]: New seat seat0. Apr 12 22:00:04.730685 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 22:00:04.731037 systemd[1]: Starting update-engine.service... Apr 12 22:00:04.750055 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 22:00:04.765769 systemd[1]: Started dbus.service. Apr 12 22:00:04.778070 update_engine[1152]: I0412 22:00:04.777554 1152 main.cc:92] Flatcar Update Engine starting Apr 12 22:00:04.781078 update_engine[1152]: I0412 22:00:04.781067 1152 update_check_scheduler.cc:74] Next update check in 3m14s Apr 12 22:00:04.782039 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 22:00:04.782129 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 22:00:04.782307 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 22:00:04.782389 systemd[1]: Finished motdgen.service. Apr 12 22:00:04.790100 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 22:00:04.790181 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 22:00:04.797466 tar[1155]: ./ Apr 12 22:00:04.797466 tar[1155]: ./loopback Apr 12 22:00:04.800952 jq[1159]: false Apr 12 22:00:04.801318 dbus-daemon[1118]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 22:00:04.802119 systemd[1]: update-ssh-keys-after-ignition.service: Skipped due to 'exec-condition'. Apr 12 22:00:04.802203 systemd[1]: Condition check resulted in update-ssh-keys-after-ignition.service being skipped. Apr 12 22:00:04.802374 tar[1156]: crictl Apr 12 22:00:04.805991 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Apr 12 22:00:04.806078 systemd[1]: Condition check resulted in tcsd.service being skipped. Apr 12 22:00:04.808753 systemd[1]: Started update-engine.service. Apr 12 22:00:04.810428 env[1160]: time="2024-04-12T22:00:04.810406150Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 22:00:04.818391 systemd[1]: Started systemd-logind.service. Apr 12 22:00:04.818566 env[1160]: time="2024-04-12T22:00:04.818552144Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 22:00:04.818625 env[1160]: time="2024-04-12T22:00:04.818616671Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 22:00:04.819287 env[1160]: time="2024-04-12T22:00:04.819272154Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 22:00:04.819318 env[1160]: time="2024-04-12T22:00:04.819287397Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 22:00:04.819403 env[1160]: time="2024-04-12T22:00:04.819393213Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 22:00:04.819425 env[1160]: time="2024-04-12T22:00:04.819403570Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 22:00:04.819425 env[1160]: time="2024-04-12T22:00:04.819413296Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 22:00:04.819425 env[1160]: time="2024-04-12T22:00:04.819419167Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 22:00:04.819468 env[1160]: time="2024-04-12T22:00:04.819459085Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 22:00:04.819589 env[1160]: time="2024-04-12T22:00:04.819581233Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 22:00:04.819659 env[1160]: time="2024-04-12T22:00:04.819649950Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 22:00:04.819685 env[1160]: time="2024-04-12T22:00:04.819659761Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 22:00:04.819703 env[1160]: time="2024-04-12T22:00:04.819685175Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 22:00:04.819703 env[1160]: time="2024-04-12T22:00:04.819693388Z" level=info msg="metadata content store policy set" policy=shared Apr 12 22:00:04.822827 tar[1155]: ./bandwidth Apr 12 22:00:04.827929 systemd[1]: Started locksmithd.service. Apr 12 22:00:04.834405 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 22:00:04.834487 systemd[1]: Reached target system-config.target. Apr 12 22:00:04.842379 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 22:00:04.842449 systemd[1]: Reached target user-config.target. Apr 12 22:00:04.863495 env[1160]: time="2024-04-12T22:00:04.863449904Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 22:00:04.863495 env[1160]: time="2024-04-12T22:00:04.863474636Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 22:00:04.863495 env[1160]: time="2024-04-12T22:00:04.863482919Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 22:00:04.863583 env[1160]: time="2024-04-12T22:00:04.863501522Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 22:00:04.863583 env[1160]: time="2024-04-12T22:00:04.863509979Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 22:00:04.863583 env[1160]: time="2024-04-12T22:00:04.863517954Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 22:00:04.863583 env[1160]: time="2024-04-12T22:00:04.863527060Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 22:00:04.863583 env[1160]: time="2024-04-12T22:00:04.863538468Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 22:00:04.863583 env[1160]: time="2024-04-12T22:00:04.863549164Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 22:00:04.863583 env[1160]: time="2024-04-12T22:00:04.863558893Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 22:00:04.863583 env[1160]: time="2024-04-12T22:00:04.863566194Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 22:00:04.863583 env[1160]: time="2024-04-12T22:00:04.863573239Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 22:00:04.863718 env[1160]: time="2024-04-12T22:00:04.863638982Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 22:00:04.863718 env[1160]: time="2024-04-12T22:00:04.863684313Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 22:00:04.863836 env[1160]: time="2024-04-12T22:00:04.863828180Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 22:00:04.863860 env[1160]: time="2024-04-12T22:00:04.863842972Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 22:00:04.863860 env[1160]: time="2024-04-12T22:00:04.863850683Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 22:00:04.863895 env[1160]: time="2024-04-12T22:00:04.863877962Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 22:00:04.863895 env[1160]: time="2024-04-12T22:00:04.863885834Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 22:00:04.863895 env[1160]: time="2024-04-12T22:00:04.863892690Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 22:00:04.863961 env[1160]: time="2024-04-12T22:00:04.863899331Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 22:00:04.863961 env[1160]: time="2024-04-12T22:00:04.863907486Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 22:00:04.863961 env[1160]: time="2024-04-12T22:00:04.863914398Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 22:00:04.863961 env[1160]: time="2024-04-12T22:00:04.863922070Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 22:00:04.863961 env[1160]: time="2024-04-12T22:00:04.863928237Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 22:00:04.863961 env[1160]: time="2024-04-12T22:00:04.863935341Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 22:00:04.864060 env[1160]: time="2024-04-12T22:00:04.863997845Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 22:00:04.864060 env[1160]: time="2024-04-12T22:00:04.864007109Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 22:00:04.864060 env[1160]: time="2024-04-12T22:00:04.864014256Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 22:00:04.864060 env[1160]: time="2024-04-12T22:00:04.864020809Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 22:00:04.864060 env[1160]: time="2024-04-12T22:00:04.864030147Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 22:00:04.864060 env[1160]: time="2024-04-12T22:00:04.864036527Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 22:00:04.864060 env[1160]: time="2024-04-12T22:00:04.864046399Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 22:00:04.864172 env[1160]: time="2024-04-12T22:00:04.864067389Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 22:00:04.864224 env[1160]: time="2024-04-12T22:00:04.864198284Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 22:00:04.867075 env[1160]: time="2024-04-12T22:00:04.864232637Z" level=info msg="Connect containerd service" Apr 12 22:00:04.867075 env[1160]: time="2024-04-12T22:00:04.864249573Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 22:00:04.867075 env[1160]: time="2024-04-12T22:00:04.864582917Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 22:00:04.867075 env[1160]: time="2024-04-12T22:00:04.864789791Z" level=info msg="Start subscribing containerd event" Apr 12 22:00:04.867075 env[1160]: time="2024-04-12T22:00:04.864904354Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 22:00:04.867075 env[1160]: time="2024-04-12T22:00:04.864910749Z" level=info msg="Start recovering state" Apr 12 22:00:04.867075 env[1160]: time="2024-04-12T22:00:04.864952498Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 22:00:04.867075 env[1160]: time="2024-04-12T22:00:04.864976690Z" level=info msg="Start event monitor" Apr 12 22:00:04.867075 env[1160]: time="2024-04-12T22:00:04.864991557Z" level=info msg="Start snapshots syncer" Apr 12 22:00:04.867075 env[1160]: time="2024-04-12T22:00:04.865010019Z" level=info msg="Start cni network conf syncer for default" Apr 12 22:00:04.867075 env[1160]: time="2024-04-12T22:00:04.865014060Z" level=info msg="containerd successfully booted in 0.054940s" Apr 12 22:00:04.867075 env[1160]: time="2024-04-12T22:00:04.865022741Z" level=info msg="Start streaming server" Apr 12 22:00:04.865023 systemd[1]: Started containerd.service. Apr 12 22:00:04.877375 tar[1155]: ./ptp Apr 12 22:00:04.906666 tar[1155]: ./vlan Apr 12 22:00:04.912730 locksmithd[1180]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 22:00:04.935207 tar[1155]: ./host-device Apr 12 22:00:04.961086 tar[1155]: ./tuning Apr 12 22:00:04.983928 tar[1155]: ./vrf Apr 12 22:00:05.010706 tar[1155]: ./sbr Apr 12 22:00:05.038016 tar[1155]: ./tap Apr 12 22:00:05.065971 tar[1155]: ./dhcp Apr 12 22:00:05.136817 tar[1155]: ./static Apr 12 22:00:05.145050 systemd[1]: Finished prepare-critools.service. Apr 12 22:00:05.156710 tar[1155]: ./firewall Apr 12 22:00:05.186727 tar[1155]: ./macvlan Apr 12 22:00:05.214215 tar[1155]: ./dummy Apr 12 22:00:05.240945 tar[1155]: ./bridge Apr 12 22:00:05.270780 tar[1155]: ./ipvlan Apr 12 22:00:05.297637 tar[1155]: ./portmap Apr 12 22:00:05.323019 tar[1155]: ./host-local Apr 12 22:00:05.349151 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 22:00:05.387654 sshd_keygen[1149]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 22:00:05.399202 systemd[1]: Finished sshd-keygen.service. Apr 12 22:00:05.407221 systemd[1]: Starting issuegen.service... Apr 12 22:00:05.415586 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 22:00:05.415658 systemd[1]: Finished issuegen.service. Apr 12 22:00:05.423058 systemd[1]: Starting systemd-user-sessions.service... Apr 12 22:00:05.432551 systemd[1]: Finished systemd-user-sessions.service. Apr 12 22:00:05.441961 systemd[1]: Started getty@tty1.service. Apr 12 22:00:05.448907 systemd[1]: Started serial-getty@ttyS1.service. Apr 12 22:00:05.457420 systemd[1]: Reached target getty.target. Apr 12 22:00:05.517578 systemd-timesyncd[1107]: Network configuration changed, trying to establish connection. Apr 12 22:00:05.580392 systemd-networkd[1000]: bond0: Gained IPv6LL Apr 12 22:00:05.580539 systemd-timesyncd[1107]: Network configuration changed, trying to establish connection. Apr 12 22:00:06.352366 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Apr 12 22:00:06.384553 extend-filesystems[1136]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Apr 12 22:00:06.384553 extend-filesystems[1136]: old_desc_blocks = 1, new_desc_blocks = 56 Apr 12 22:00:06.384553 extend-filesystems[1136]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Apr 12 22:00:06.422385 extend-filesystems[1122]: Resized filesystem in /dev/sda9 Apr 12 22:00:06.422385 extend-filesystems[1122]: Found sdb Apr 12 22:00:06.385114 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 22:00:06.385206 systemd[1]: Finished extend-filesystems.service. Apr 12 22:00:06.801463 kernel: mlx5_core 0000:02:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Apr 12 22:00:10.472274 login[1204]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 22:00:10.478822 login[1203]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 22:00:10.480659 systemd-logind[1150]: New session 1 of user core. Apr 12 22:00:10.481156 systemd[1]: Created slice user-500.slice. Apr 12 22:00:10.481768 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 22:00:10.483002 systemd-logind[1150]: New session 2 of user core. Apr 12 22:00:10.487094 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 22:00:10.487765 systemd[1]: Starting user@500.service... Apr 12 22:00:10.489775 (systemd)[1209]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:10.560629 systemd[1209]: Queued start job for default target default.target. Apr 12 22:00:10.560926 systemd[1209]: Reached target paths.target. Apr 12 22:00:10.560942 systemd[1209]: Reached target sockets.target. Apr 12 22:00:10.560956 systemd[1209]: Reached target timers.target. Apr 12 22:00:10.560968 systemd[1209]: Reached target basic.target. Apr 12 22:00:10.560995 systemd[1209]: Reached target default.target. Apr 12 22:00:10.561017 systemd[1209]: Startup finished in 68ms. Apr 12 22:00:10.561053 systemd[1]: Started user@500.service. Apr 12 22:00:10.561601 systemd[1]: Started session-1.scope. Apr 12 22:00:10.561945 systemd[1]: Started session-2.scope. Apr 12 22:00:10.829414 coreos-metadata[1115]: Apr 12 22:00:10.829 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Apr 12 22:00:10.830152 coreos-metadata[1114]: Apr 12 22:00:10.829 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Apr 12 22:00:11.523335 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:2 port 2:2 Apr 12 22:00:11.530323 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Apr 12 22:00:11.829792 coreos-metadata[1114]: Apr 12 22:00:11.829 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 22:00:11.830017 coreos-metadata[1115]: Apr 12 22:00:11.829 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 22:00:11.861061 coreos-metadata[1115]: Apr 12 22:00:11.860 INFO Fetch successful Apr 12 22:00:11.861337 coreos-metadata[1114]: Apr 12 22:00:11.860 INFO Fetch successful Apr 12 22:00:11.888326 systemd[1]: Finished coreos-metadata.service. Apr 12 22:00:11.889118 systemd[1]: Started packet-phone-home.service. Apr 12 22:00:11.889656 unknown[1114]: wrote ssh authorized keys file for user: core Apr 12 22:00:11.895523 curl[1231]: % Total % Received % Xferd Average Speed Time Time Time Current Apr 12 22:00:11.895666 curl[1231]: Dload Upload Total Spent Left Speed Apr 12 22:00:11.908247 update-ssh-keys[1232]: Updated "/home/core/.ssh/authorized_keys" Apr 12 22:00:11.908418 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 22:00:11.908581 systemd[1]: Reached target multi-user.target. Apr 12 22:00:11.909162 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 22:00:11.913205 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 22:00:11.913282 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 22:00:11.913429 systemd[1]: Startup finished in 2.019s (kernel) + 6.302s (initrd) + 13.783s (userspace) = 22.105s. Apr 12 22:00:12.070753 curl[1231]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Apr 12 22:00:12.073222 systemd[1]: packet-phone-home.service: Deactivated successfully. Apr 12 22:00:13.077336 systemd[1]: Created slice system-sshd.slice. Apr 12 22:00:13.077978 systemd[1]: Started sshd@0-145.40.90.201:22-147.75.109.163:34566.service. Apr 12 22:00:13.117804 sshd[1235]: Accepted publickey for core from 147.75.109.163 port 34566 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:00:13.118881 sshd[1235]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:13.122629 systemd-logind[1150]: New session 3 of user core. Apr 12 22:00:13.123517 systemd[1]: Started session-3.scope. Apr 12 22:00:13.180003 systemd[1]: Started sshd@1-145.40.90.201:22-147.75.109.163:34578.service. Apr 12 22:00:13.207171 sshd[1240]: Accepted publickey for core from 147.75.109.163 port 34578 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:00:13.207911 sshd[1240]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:13.210235 systemd-logind[1150]: New session 4 of user core. Apr 12 22:00:13.210786 systemd[1]: Started session-4.scope. Apr 12 22:00:13.265155 sshd[1240]: pam_unix(sshd:session): session closed for user core Apr 12 22:00:13.266642 systemd[1]: sshd@1-145.40.90.201:22-147.75.109.163:34578.service: Deactivated successfully. Apr 12 22:00:13.266953 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 22:00:13.267216 systemd-logind[1150]: Session 4 logged out. Waiting for processes to exit. Apr 12 22:00:13.267726 systemd[1]: Started sshd@2-145.40.90.201:22-147.75.109.163:34584.service. Apr 12 22:00:13.268103 systemd-logind[1150]: Removed session 4. Apr 12 22:00:13.296242 sshd[1246]: Accepted publickey for core from 147.75.109.163 port 34584 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:00:13.297278 sshd[1246]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:13.300789 systemd-logind[1150]: New session 5 of user core. Apr 12 22:00:13.301638 systemd[1]: Started session-5.scope. Apr 12 22:00:13.356754 sshd[1246]: pam_unix(sshd:session): session closed for user core Apr 12 22:00:13.358484 systemd[1]: sshd@2-145.40.90.201:22-147.75.109.163:34584.service: Deactivated successfully. Apr 12 22:00:13.358788 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 22:00:13.359138 systemd-logind[1150]: Session 5 logged out. Waiting for processes to exit. Apr 12 22:00:13.359643 systemd[1]: Started sshd@3-145.40.90.201:22-147.75.109.163:34586.service. Apr 12 22:00:13.360148 systemd-logind[1150]: Removed session 5. Apr 12 22:00:13.389267 sshd[1253]: Accepted publickey for core from 147.75.109.163 port 34586 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:00:13.392515 sshd[1253]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:13.402599 systemd-logind[1150]: New session 6 of user core. Apr 12 22:00:13.405131 systemd[1]: Started session-6.scope. Apr 12 22:00:13.487167 sshd[1253]: pam_unix(sshd:session): session closed for user core Apr 12 22:00:13.493717 systemd[1]: sshd@3-145.40.90.201:22-147.75.109.163:34586.service: Deactivated successfully. Apr 12 22:00:13.494221 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 22:00:13.494618 systemd-logind[1150]: Session 6 logged out. Waiting for processes to exit. Apr 12 22:00:13.495040 systemd[1]: Started sshd@4-145.40.90.201:22-147.75.109.163:34590.service. Apr 12 22:00:13.495479 systemd-logind[1150]: Removed session 6. Apr 12 22:00:13.523568 sshd[1259]: Accepted publickey for core from 147.75.109.163 port 34590 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:00:13.524553 sshd[1259]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:13.527923 systemd-logind[1150]: New session 7 of user core. Apr 12 22:00:13.528650 systemd[1]: Started session-7.scope. Apr 12 22:00:13.627664 sudo[1262]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 22:00:13.628549 sudo[1262]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 22:00:13.650788 dbus-daemon[1118]: \xd0\u000d0\x85DV: received setenforce notice (enforcing=673711760) Apr 12 22:00:13.655807 sudo[1262]: pam_unix(sudo:session): session closed for user root Apr 12 22:00:13.661169 sshd[1259]: pam_unix(sshd:session): session closed for user core Apr 12 22:00:13.668004 systemd[1]: sshd@4-145.40.90.201:22-147.75.109.163:34590.service: Deactivated successfully. Apr 12 22:00:13.669658 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 22:00:13.671411 systemd-logind[1150]: Session 7 logged out. Waiting for processes to exit. Apr 12 22:00:13.674068 systemd[1]: Started sshd@5-145.40.90.201:22-147.75.109.163:34594.service. Apr 12 22:00:13.676459 systemd-logind[1150]: Removed session 7. Apr 12 22:00:13.741459 sshd[1266]: Accepted publickey for core from 147.75.109.163 port 34594 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:00:13.744859 sshd[1266]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:13.755535 systemd-logind[1150]: New session 8 of user core. Apr 12 22:00:13.757909 systemd[1]: Started session-8.scope. Apr 12 22:00:13.837274 sudo[1270]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 22:00:13.838181 sudo[1270]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 22:00:13.845633 sudo[1270]: pam_unix(sudo:session): session closed for user root Apr 12 22:00:13.858228 sudo[1269]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 22:00:13.858882 sudo[1269]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 22:00:13.883230 systemd[1]: Stopping audit-rules.service... Apr 12 22:00:13.884000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 22:00:13.886627 auditctl[1273]: No rules Apr 12 22:00:13.887427 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 22:00:13.887886 systemd[1]: Stopped audit-rules.service. Apr 12 22:00:13.891661 systemd[1]: Starting audit-rules.service... Apr 12 22:00:13.892203 kernel: kauditd_printk_skb: 117 callbacks suppressed Apr 12 22:00:13.892328 kernel: audit: type=1305 audit(1712959213.884:139): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 22:00:13.884000 audit[1273]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffda7527470 a2=420 a3=0 items=0 ppid=1 pid=1273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:13.927105 augenrules[1290]: No rules Apr 12 22:00:13.927738 systemd[1]: Finished audit-rules.service. Apr 12 22:00:13.928596 sudo[1269]: pam_unix(sudo:session): session closed for user root Apr 12 22:00:13.929858 sshd[1266]: pam_unix(sshd:session): session closed for user core Apr 12 22:00:13.932245 systemd[1]: sshd@5-145.40.90.201:22-147.75.109.163:34594.service: Deactivated successfully. Apr 12 22:00:13.932811 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 22:00:13.933392 systemd-logind[1150]: Session 8 logged out. Waiting for processes to exit. Apr 12 22:00:13.934174 systemd[1]: Started sshd@6-145.40.90.201:22-147.75.109.163:34606.service. Apr 12 22:00:13.934860 systemd-logind[1150]: Removed session 8. Apr 12 22:00:13.939400 kernel: audit: type=1300 audit(1712959213.884:139): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffda7527470 a2=420 a3=0 items=0 ppid=1 pid=1273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:13.939439 kernel: audit: type=1327 audit(1712959213.884:139): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 22:00:13.884000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 22:00:13.948983 kernel: audit: type=1131 audit(1712959213.886:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:13.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:13.971371 kernel: audit: type=1130 audit(1712959213.926:141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:13.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:13.993615 sshd[1296]: Accepted publickey for core from 147.75.109.163 port 34606 ssh2: RSA SHA256:iLOzzkWMEKuYOMnNYPHJaQJQTz5pM34idpgCb8kUt6I Apr 12 22:00:13.993832 kernel: audit: type=1106 audit(1712959213.927:142): pid=1269 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 22:00:13.927000 audit[1269]: USER_END pid=1269 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 22:00:13.994935 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 22:00:13.997196 systemd-logind[1150]: New session 9 of user core. Apr 12 22:00:13.997623 systemd[1]: Started session-9.scope. Apr 12 22:00:14.019804 kernel: audit: type=1104 audit(1712959213.927:143): pid=1269 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 22:00:13.927000 audit[1269]: CRED_DISP pid=1269 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 22:00:14.043362 kernel: audit: type=1106 audit(1712959213.929:144): pid=1266 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:13.929000 audit[1266]: USER_END pid=1266 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:14.044771 sudo[1299]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 22:00:14.044884 sudo[1299]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 22:00:13.929000 audit[1266]: CRED_DISP pid=1266 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:14.101490 kernel: audit: type=1104 audit(1712959213.929:145): pid=1266 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:14.101514 kernel: audit: type=1131 audit(1712959213.931:146): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-145.40.90.201:22-147.75.109.163:34594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:13.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-145.40.90.201:22-147.75.109.163:34594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:13.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-145.40.90.201:22-147.75.109.163:34606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:13.993000 audit[1296]: USER_ACCT pid=1296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:13.993000 audit[1296]: CRED_ACQ pid=1296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:13.993000 audit[1296]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca10cb7d0 a2=3 a3=0 items=0 ppid=1 pid=1296 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:13.993000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 22:00:13.998000 audit[1296]: USER_START pid=1296 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:13.998000 audit[1298]: CRED_ACQ pid=1298 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:14.043000 audit[1299]: USER_ACCT pid=1299 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 22:00:14.043000 audit[1299]: CRED_REFR pid=1299 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 22:00:14.044000 audit[1299]: USER_START pid=1299 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 22:00:14.942387 systemd[1]: Reloading. Apr 12 22:00:14.975910 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-04-12T22:00:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 22:00:14.975927 /usr/lib/systemd/system-generators/torcx-generator[1329]: time="2024-04-12T22:00:14Z" level=info msg="torcx already run" Apr 12 22:00:15.027550 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 22:00:15.027557 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 22:00:15.038948 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit: BPF prog-id=35 op=LOAD Apr 12 22:00:15.084000 audit: BPF prog-id=30 op=UNLOAD Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit: BPF prog-id=36 op=LOAD Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.084000 audit: BPF prog-id=37 op=LOAD Apr 12 22:00:15.084000 audit: BPF prog-id=31 op=UNLOAD Apr 12 22:00:15.084000 audit: BPF prog-id=32 op=UNLOAD Apr 12 22:00:15.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.085000 audit: BPF prog-id=38 op=LOAD Apr 12 22:00:15.085000 audit: BPF prog-id=33 op=UNLOAD Apr 12 22:00:15.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.086000 audit: BPF prog-id=39 op=LOAD Apr 12 22:00:15.086000 audit: BPF prog-id=29 op=UNLOAD Apr 12 22:00:15.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.087000 audit: BPF prog-id=40 op=LOAD Apr 12 22:00:15.087000 audit: BPF prog-id=28 op=UNLOAD Apr 12 22:00:15.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.087000 audit: BPF prog-id=41 op=LOAD Apr 12 22:00:15.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.087000 audit: BPF prog-id=42 op=LOAD Apr 12 22:00:15.087000 audit: BPF prog-id=22 op=UNLOAD Apr 12 22:00:15.087000 audit: BPF prog-id=23 op=UNLOAD Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit: BPF prog-id=43 op=LOAD Apr 12 22:00:15.088000 audit: BPF prog-id=25 op=UNLOAD Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit: BPF prog-id=44 op=LOAD Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit: BPF prog-id=45 op=LOAD Apr 12 22:00:15.088000 audit: BPF prog-id=26 op=UNLOAD Apr 12 22:00:15.088000 audit: BPF prog-id=27 op=UNLOAD Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit: BPF prog-id=46 op=LOAD Apr 12 22:00:15.089000 audit: BPF prog-id=19 op=UNLOAD Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit: BPF prog-id=47 op=LOAD Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit: BPF prog-id=48 op=LOAD Apr 12 22:00:15.089000 audit: BPF prog-id=20 op=UNLOAD Apr 12 22:00:15.089000 audit: BPF prog-id=21 op=UNLOAD Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:15.089000 audit: BPF prog-id=49 op=LOAD Apr 12 22:00:15.089000 audit: BPF prog-id=24 op=UNLOAD Apr 12 22:00:15.094624 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 22:00:15.120689 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 22:00:15.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:15.121407 systemd[1]: Reached target network-online.target. Apr 12 22:00:15.123239 systemd[1]: Started kubelet.service. Apr 12 22:00:15.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:15.726002 kubelet[1385]: E0412 22:00:15.725839 1385 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 22:00:15.731836 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 22:00:15.732218 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 22:00:15.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 22:00:16.042340 systemd[1]: Stopped kubelet.service. Apr 12 22:00:16.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:16.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:16.077594 systemd[1]: Reloading. Apr 12 22:00:16.108890 /usr/lib/systemd/system-generators/torcx-generator[1487]: time="2024-04-12T22:00:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 22:00:16.108906 /usr/lib/systemd/system-generators/torcx-generator[1487]: time="2024-04-12T22:00:16Z" level=info msg="torcx already run" Apr 12 22:00:16.158555 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 22:00:16.158564 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 22:00:16.170531 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 22:00:16.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.215000 audit: BPF prog-id=50 op=LOAD Apr 12 22:00:16.215000 audit: BPF prog-id=35 op=UNLOAD Apr 12 22:00:16.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.216000 audit: BPF prog-id=51 op=LOAD Apr 12 22:00:16.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.216000 audit: BPF prog-id=52 op=LOAD Apr 12 22:00:16.216000 audit: BPF prog-id=36 op=UNLOAD Apr 12 22:00:16.216000 audit: BPF prog-id=37 op=UNLOAD Apr 12 22:00:16.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.216000 audit: BPF prog-id=53 op=LOAD Apr 12 22:00:16.217000 audit: BPF prog-id=38 op=UNLOAD Apr 12 22:00:16.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.217000 audit: BPF prog-id=54 op=LOAD Apr 12 22:00:16.217000 audit: BPF prog-id=39 op=UNLOAD Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit: BPF prog-id=55 op=LOAD Apr 12 22:00:16.218000 audit: BPF prog-id=40 op=UNLOAD Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit: BPF prog-id=56 op=LOAD Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit: BPF prog-id=57 op=LOAD Apr 12 22:00:16.219000 audit: BPF prog-id=41 op=UNLOAD Apr 12 22:00:16.219000 audit: BPF prog-id=42 op=UNLOAD Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit: BPF prog-id=58 op=LOAD Apr 12 22:00:16.219000 audit: BPF prog-id=43 op=UNLOAD Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit: BPF prog-id=59 op=LOAD Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.219000 audit: BPF prog-id=60 op=LOAD Apr 12 22:00:16.219000 audit: BPF prog-id=44 op=UNLOAD Apr 12 22:00:16.219000 audit: BPF prog-id=45 op=UNLOAD Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit: BPF prog-id=61 op=LOAD Apr 12 22:00:16.220000 audit: BPF prog-id=46 op=UNLOAD Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit: BPF prog-id=62 op=LOAD Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit: BPF prog-id=63 op=LOAD Apr 12 22:00:16.220000 audit: BPF prog-id=47 op=UNLOAD Apr 12 22:00:16.220000 audit: BPF prog-id=48 op=UNLOAD Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.220000 audit: BPF prog-id=64 op=LOAD Apr 12 22:00:16.220000 audit: BPF prog-id=49 op=UNLOAD Apr 12 22:00:16.228034 systemd[1]: Started kubelet.service. Apr 12 22:00:16.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:16.253638 kubelet[1543]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 22:00:16.253638 kubelet[1543]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 22:00:16.253638 kubelet[1543]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 22:00:16.253868 kubelet[1543]: I0412 22:00:16.253784 1543 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 22:00:16.560498 kubelet[1543]: I0412 22:00:16.560459 1543 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 22:00:16.560498 kubelet[1543]: I0412 22:00:16.560471 1543 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 22:00:16.560642 kubelet[1543]: I0412 22:00:16.560608 1543 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 22:00:16.571773 kubelet[1543]: I0412 22:00:16.571742 1543 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 22:00:16.621239 kubelet[1543]: I0412 22:00:16.621130 1543 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 22:00:16.623487 kubelet[1543]: I0412 22:00:16.623413 1543 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 22:00:16.623921 kubelet[1543]: I0412 22:00:16.623849 1543 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 22:00:16.623921 kubelet[1543]: I0412 22:00:16.623903 1543 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 22:00:16.623921 kubelet[1543]: I0412 22:00:16.623932 1543 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 22:00:16.624719 kubelet[1543]: I0412 22:00:16.624647 1543 state_mem.go:36] "Initialized new in-memory state store" Apr 12 22:00:16.628511 kubelet[1543]: I0412 22:00:16.628424 1543 kubelet.go:393] "Attempting to sync node with API server" Apr 12 22:00:16.628511 kubelet[1543]: I0412 22:00:16.628472 1543 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 22:00:16.629096 kubelet[1543]: I0412 22:00:16.629015 1543 kubelet.go:309] "Adding apiserver pod source" Apr 12 22:00:16.629096 kubelet[1543]: I0412 22:00:16.629064 1543 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 22:00:16.629476 kubelet[1543]: E0412 22:00:16.629139 1543 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:16.629476 kubelet[1543]: E0412 22:00:16.629242 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:16.635608 kubelet[1543]: I0412 22:00:16.635550 1543 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 22:00:16.638136 kubelet[1543]: W0412 22:00:16.638064 1543 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 22:00:16.639856 kubelet[1543]: I0412 22:00:16.639817 1543 server.go:1232] "Started kubelet" Apr 12 22:00:16.640526 kubelet[1543]: I0412 22:00:16.640480 1543 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 22:00:16.640710 kubelet[1543]: I0412 22:00:16.640519 1543 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 22:00:16.641135 kubelet[1543]: I0412 22:00:16.641096 1543 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 22:00:16.643247 kubelet[1543]: E0412 22:00:16.643160 1543 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 22:00:16.643516 kubelet[1543]: E0412 22:00:16.643260 1543 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 22:00:16.642000 audit[1543]: AVC avc: denied { mac_admin } for pid=1543 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.642000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 22:00:16.642000 audit[1543]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004720f0 a1=c0004ae288 a2=c0004720c0 a3=25 items=0 ppid=1 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:16.642000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 22:00:16.642000 audit[1543]: AVC avc: denied { mac_admin } for pid=1543 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.642000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 22:00:16.642000 audit[1543]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005c9f60 a1=c0004ae2a0 a2=c000472180 a3=25 items=0 ppid=1 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:16.642000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 22:00:16.645407 kubelet[1543]: I0412 22:00:16.643854 1543 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 22:00:16.645407 kubelet[1543]: I0412 22:00:16.643888 1543 server.go:462] "Adding debug handlers to kubelet server" Apr 12 22:00:16.645407 kubelet[1543]: I0412 22:00:16.643960 1543 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 22:00:16.645407 kubelet[1543]: I0412 22:00:16.644205 1543 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 22:00:16.645407 kubelet[1543]: I0412 22:00:16.644375 1543 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 22:00:16.645407 kubelet[1543]: I0412 22:00:16.644528 1543 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 22:00:16.645407 kubelet[1543]: I0412 22:00:16.644711 1543 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 22:00:16.651007 kubelet[1543]: E0412 22:00:16.650966 1543 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.67.80.7\" not found" node="10.67.80.7" Apr 12 22:00:16.658401 kubelet[1543]: I0412 22:00:16.658361 1543 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 22:00:16.658401 kubelet[1543]: I0412 22:00:16.658369 1543 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 22:00:16.658401 kubelet[1543]: I0412 22:00:16.658382 1543 state_mem.go:36] "Initialized new in-memory state store" Apr 12 22:00:16.659353 kubelet[1543]: I0412 22:00:16.659304 1543 policy_none.go:49] "None policy: Start" Apr 12 22:00:16.659588 kubelet[1543]: I0412 22:00:16.659547 1543 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 22:00:16.659588 kubelet[1543]: I0412 22:00:16.659562 1543 state_mem.go:35] "Initializing new in-memory state store" Apr 12 22:00:16.663926 systemd[1]: Created slice kubepods.slice. Apr 12 22:00:16.666024 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 22:00:16.667372 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 22:00:16.668000 audit[1569]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1569 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:16.668000 audit[1569]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdb05310d0 a2=0 a3=7ffdb05310bc items=0 ppid=1543 pid=1569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:16.668000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 22:00:16.668000 audit[1575]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1575 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:16.668000 audit[1575]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe5f279d20 a2=0 a3=7ffe5f279d0c items=0 ppid=1543 pid=1575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:16.668000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 22:00:16.685000 audit[1543]: AVC avc: denied { mac_admin } for pid=1543 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:16.685000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 22:00:16.685000 audit[1543]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0014db350 a1=c000eb1440 a2=c0014db320 a3=25 items=0 ppid=1 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:16.685000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 22:00:16.686297 kubelet[1543]: I0412 22:00:16.686152 1543 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 22:00:16.686297 kubelet[1543]: I0412 22:00:16.686182 1543 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 22:00:16.686453 kubelet[1543]: I0412 22:00:16.686445 1543 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 22:00:16.686500 kubelet[1543]: E0412 22:00:16.686493 1543 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.80.7\" not found" Apr 12 22:00:16.669000 audit[1577]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1577 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:16.669000 audit[1577]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffccc0a9ea0 a2=0 a3=7ffccc0a9e8c items=0 ppid=1543 pid=1577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:16.669000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 22:00:16.718000 audit[1582]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1582 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:16.718000 audit[1582]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffddc96d9c0 a2=0 a3=7ffddc96d9ac items=0 ppid=1543 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:16.718000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 22:00:16.745143 kubelet[1543]: I0412 22:00:16.745121 1543 kubelet_node_status.go:70] "Attempting to register node" node="10.67.80.7" Apr 12 22:00:16.751203 kubelet[1543]: I0412 22:00:16.751182 1543 kubelet_node_status.go:73] "Successfully registered node" node="10.67.80.7" Apr 12 22:00:16.761186 kubelet[1543]: I0412 22:00:16.761165 1543 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Apr 12 22:00:16.761505 env[1160]: time="2024-04-12T22:00:16.761469400Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 22:00:16.761784 kubelet[1543]: I0412 22:00:16.761652 1543 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Apr 12 22:00:16.771000 audit[1587]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1587 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:16.771000 audit[1587]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe4ae57af0 a2=0 a3=7ffe4ae57adc items=0 ppid=1543 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:16.771000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 22:00:16.773061 kubelet[1543]: I0412 22:00:16.772985 1543 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 22:00:16.772000 audit[1588]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1588 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:16.772000 audit[1588]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcde6a9ee0 a2=0 a3=7ffcde6a9ecc items=0 ppid=1543 pid=1588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:16.772000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 22:00:16.772000 audit[1589]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1589 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:16.772000 audit[1589]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8d2038f0 a2=0 a3=7ffe8d2038dc items=0 ppid=1543 pid=1589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:16.772000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 22:00:16.773869 kubelet[1543]: I0412 22:00:16.773682 1543 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 22:00:16.773869 kubelet[1543]: I0412 22:00:16.773703 1543 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 22:00:16.773869 kubelet[1543]: I0412 22:00:16.773717 1543 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 22:00:16.773869 kubelet[1543]: E0412 22:00:16.773746 1543 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Apr 12 22:00:16.773000 audit[1590]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1590 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:16.773000 audit[1590]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0808beb0 a2=0 a3=7ffe0808be9c items=0 ppid=1543 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:16.773000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 22:00:16.773000 audit[1591]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1591 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:16.773000 audit[1591]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffca82f6ee0 a2=0 a3=7ffca82f6ecc items=0 ppid=1543 pid=1591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:16.773000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 22:00:16.773000 audit[1592]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1592 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:16.773000 audit[1592]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc8c68a300 a2=0 a3=7ffc8c68a2ec items=0 ppid=1543 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:16.773000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 22:00:16.773000 audit[1593]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1593 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:16.773000 audit[1593]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd44b486e0 a2=0 a3=7ffd44b486cc items=0 ppid=1543 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:16.773000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 22:00:16.774000 audit[1594]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1594 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:16.774000 audit[1594]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe9027b9f0 a2=0 a3=7ffe9027b9dc items=0 ppid=1543 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:16.774000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 22:00:17.561583 kubelet[1543]: I0412 22:00:17.561461 1543 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Apr 12 22:00:17.562478 kubelet[1543]: W0412 22:00:17.561902 1543 reflector.go:458] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.Service ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:150: Unexpected watch close - watch lasted less than a second and no items received Apr 12 22:00:17.562478 kubelet[1543]: W0412 22:00:17.561962 1543 reflector.go:458] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:150: Unexpected watch close - watch lasted less than a second and no items received Apr 12 22:00:17.562478 kubelet[1543]: W0412 22:00:17.561963 1543 reflector.go:458] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.CSIDriver ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:150: Unexpected watch close - watch lasted less than a second and no items received Apr 12 22:00:17.629741 kubelet[1543]: I0412 22:00:17.629625 1543 apiserver.go:52] "Watching apiserver" Apr 12 22:00:17.629741 kubelet[1543]: E0412 22:00:17.629707 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:17.636125 kubelet[1543]: I0412 22:00:17.636018 1543 topology_manager.go:215] "Topology Admit Handler" podUID="5ce67197-f61d-4b0f-a72b-e1864c44b401" podNamespace="kube-system" podName="kube-proxy-pqf44" Apr 12 22:00:17.636410 kubelet[1543]: I0412 22:00:17.636257 1543 topology_manager.go:215] "Topology Admit Handler" podUID="4cf96647-d844-445e-a5d3-8247b5f33d6b" podNamespace="calico-system" podName="calico-node-2vqfk" Apr 12 22:00:17.636783 kubelet[1543]: I0412 22:00:17.636696 1543 topology_manager.go:215] "Topology Admit Handler" podUID="a095c897-f494-4339-b464-5f055f671010" podNamespace="calico-system" podName="csi-node-driver-r6cqh" Apr 12 22:00:17.637314 kubelet[1543]: E0412 22:00:17.637233 1543 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r6cqh" podUID="a095c897-f494-4339-b464-5f055f671010" Apr 12 22:00:17.646316 kubelet[1543]: I0412 22:00:17.646307 1543 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 22:00:17.646823 systemd[1]: Created slice kubepods-besteffort-pod4cf96647_d844_445e_a5d3_8247b5f33d6b.slice. Apr 12 22:00:17.649509 kubelet[1543]: I0412 22:00:17.649496 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/a095c897-f494-4339-b464-5f055f671010-registration-dir\") pod \"csi-node-driver-r6cqh\" (UID: \"a095c897-f494-4339-b464-5f055f671010\") " pod="calico-system/csi-node-driver-r6cqh" Apr 12 22:00:17.649566 kubelet[1543]: I0412 22:00:17.649522 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4cf96647-d844-445e-a5d3-8247b5f33d6b-lib-modules\") pod \"calico-node-2vqfk\" (UID: \"4cf96647-d844-445e-a5d3-8247b5f33d6b\") " pod="calico-system/calico-node-2vqfk" Apr 12 22:00:17.649566 kubelet[1543]: I0412 22:00:17.649544 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4cf96647-d844-445e-a5d3-8247b5f33d6b-tigera-ca-bundle\") pod \"calico-node-2vqfk\" (UID: \"4cf96647-d844-445e-a5d3-8247b5f33d6b\") " pod="calico-system/calico-node-2vqfk" Apr 12 22:00:17.649625 kubelet[1543]: I0412 22:00:17.649569 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4cf96647-d844-445e-a5d3-8247b5f33d6b-xtables-lock\") pod \"calico-node-2vqfk\" (UID: \"4cf96647-d844-445e-a5d3-8247b5f33d6b\") " pod="calico-system/calico-node-2vqfk" Apr 12 22:00:17.649625 kubelet[1543]: I0412 22:00:17.649599 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4cf96647-d844-445e-a5d3-8247b5f33d6b-node-certs\") pod \"calico-node-2vqfk\" (UID: \"4cf96647-d844-445e-a5d3-8247b5f33d6b\") " pod="calico-system/calico-node-2vqfk" Apr 12 22:00:17.649686 kubelet[1543]: I0412 22:00:17.649623 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4cf96647-d844-445e-a5d3-8247b5f33d6b-var-run-calico\") pod \"calico-node-2vqfk\" (UID: \"4cf96647-d844-445e-a5d3-8247b5f33d6b\") " pod="calico-system/calico-node-2vqfk" Apr 12 22:00:17.649686 kubelet[1543]: I0412 22:00:17.649643 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4cf96647-d844-445e-a5d3-8247b5f33d6b-var-lib-calico\") pod \"calico-node-2vqfk\" (UID: \"4cf96647-d844-445e-a5d3-8247b5f33d6b\") " pod="calico-system/calico-node-2vqfk" Apr 12 22:00:17.649686 kubelet[1543]: I0412 22:00:17.649658 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/a095c897-f494-4339-b464-5f055f671010-varrun\") pod \"csi-node-driver-r6cqh\" (UID: \"a095c897-f494-4339-b464-5f055f671010\") " pod="calico-system/csi-node-driver-r6cqh" Apr 12 22:00:17.649767 kubelet[1543]: I0412 22:00:17.649691 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/a095c897-f494-4339-b464-5f055f671010-kubelet-dir\") pod \"csi-node-driver-r6cqh\" (UID: \"a095c897-f494-4339-b464-5f055f671010\") " pod="calico-system/csi-node-driver-r6cqh" Apr 12 22:00:17.649767 kubelet[1543]: I0412 22:00:17.649714 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/5ce67197-f61d-4b0f-a72b-e1864c44b401-kube-proxy\") pod \"kube-proxy-pqf44\" (UID: \"5ce67197-f61d-4b0f-a72b-e1864c44b401\") " pod="kube-system/kube-proxy-pqf44" Apr 12 22:00:17.649767 kubelet[1543]: I0412 22:00:17.649741 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5ce67197-f61d-4b0f-a72b-e1864c44b401-lib-modules\") pod \"kube-proxy-pqf44\" (UID: \"5ce67197-f61d-4b0f-a72b-e1864c44b401\") " pod="kube-system/kube-proxy-pqf44" Apr 12 22:00:17.649860 kubelet[1543]: I0412 22:00:17.649774 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/a095c897-f494-4339-b464-5f055f671010-socket-dir\") pod \"csi-node-driver-r6cqh\" (UID: \"a095c897-f494-4339-b464-5f055f671010\") " pod="calico-system/csi-node-driver-r6cqh" Apr 12 22:00:17.649860 kubelet[1543]: I0412 22:00:17.649806 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4cf96647-d844-445e-a5d3-8247b5f33d6b-cni-bin-dir\") pod \"calico-node-2vqfk\" (UID: \"4cf96647-d844-445e-a5d3-8247b5f33d6b\") " pod="calico-system/calico-node-2vqfk" Apr 12 22:00:17.649860 kubelet[1543]: I0412 22:00:17.649829 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4cf96647-d844-445e-a5d3-8247b5f33d6b-flexvol-driver-host\") pod \"calico-node-2vqfk\" (UID: \"4cf96647-d844-445e-a5d3-8247b5f33d6b\") " pod="calico-system/calico-node-2vqfk" Apr 12 22:00:17.649860 kubelet[1543]: I0412 22:00:17.649857 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cnwd4\" (UniqueName: \"kubernetes.io/projected/a095c897-f494-4339-b464-5f055f671010-kube-api-access-cnwd4\") pod \"csi-node-driver-r6cqh\" (UID: \"a095c897-f494-4339-b464-5f055f671010\") " pod="calico-system/csi-node-driver-r6cqh" Apr 12 22:00:17.649940 kubelet[1543]: I0412 22:00:17.649894 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5ce67197-f61d-4b0f-a72b-e1864c44b401-xtables-lock\") pod \"kube-proxy-pqf44\" (UID: \"5ce67197-f61d-4b0f-a72b-e1864c44b401\") " pod="kube-system/kube-proxy-pqf44" Apr 12 22:00:17.649940 kubelet[1543]: I0412 22:00:17.649913 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4cf96647-d844-445e-a5d3-8247b5f33d6b-policysync\") pod \"calico-node-2vqfk\" (UID: \"4cf96647-d844-445e-a5d3-8247b5f33d6b\") " pod="calico-system/calico-node-2vqfk" Apr 12 22:00:17.649940 kubelet[1543]: I0412 22:00:17.649925 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4cf96647-d844-445e-a5d3-8247b5f33d6b-cni-log-dir\") pod \"calico-node-2vqfk\" (UID: \"4cf96647-d844-445e-a5d3-8247b5f33d6b\") " pod="calico-system/calico-node-2vqfk" Apr 12 22:00:17.650006 kubelet[1543]: I0412 22:00:17.649952 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xgb89\" (UniqueName: \"kubernetes.io/projected/4cf96647-d844-445e-a5d3-8247b5f33d6b-kube-api-access-xgb89\") pod \"calico-node-2vqfk\" (UID: \"4cf96647-d844-445e-a5d3-8247b5f33d6b\") " pod="calico-system/calico-node-2vqfk" Apr 12 22:00:17.650006 kubelet[1543]: I0412 22:00:17.649973 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h4cjn\" (UniqueName: \"kubernetes.io/projected/5ce67197-f61d-4b0f-a72b-e1864c44b401-kube-api-access-h4cjn\") pod \"kube-proxy-pqf44\" (UID: \"5ce67197-f61d-4b0f-a72b-e1864c44b401\") " pod="kube-system/kube-proxy-pqf44" Apr 12 22:00:17.650006 kubelet[1543]: I0412 22:00:17.649990 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4cf96647-d844-445e-a5d3-8247b5f33d6b-cni-net-dir\") pod \"calico-node-2vqfk\" (UID: \"4cf96647-d844-445e-a5d3-8247b5f33d6b\") " pod="calico-system/calico-node-2vqfk" Apr 12 22:00:17.668888 systemd[1]: Created slice kubepods-besteffort-pod5ce67197_f61d_4b0f_a72b_e1864c44b401.slice. Apr 12 22:00:17.753740 kubelet[1543]: E0412 22:00:17.753635 1543 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 22:00:17.753740 kubelet[1543]: W0412 22:00:17.753687 1543 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 22:00:17.754094 kubelet[1543]: E0412 22:00:17.753797 1543 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 22:00:17.754536 kubelet[1543]: E0412 22:00:17.754461 1543 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 22:00:17.754536 kubelet[1543]: W0412 22:00:17.754500 1543 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 22:00:17.754860 kubelet[1543]: E0412 22:00:17.754558 1543 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 22:00:17.759863 kubelet[1543]: E0412 22:00:17.759785 1543 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 22:00:17.759863 kubelet[1543]: W0412 22:00:17.759822 1543 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 22:00:17.759863 kubelet[1543]: E0412 22:00:17.759868 1543 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 22:00:17.765130 kubelet[1543]: E0412 22:00:17.765119 1543 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 22:00:17.765130 kubelet[1543]: W0412 22:00:17.765127 1543 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 22:00:17.765205 kubelet[1543]: E0412 22:00:17.765138 1543 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 22:00:17.765231 kubelet[1543]: E0412 22:00:17.765225 1543 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 22:00:17.765252 kubelet[1543]: W0412 22:00:17.765231 1543 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 22:00:17.765252 kubelet[1543]: E0412 22:00:17.765239 1543 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 22:00:17.765433 kubelet[1543]: E0412 22:00:17.765425 1543 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 22:00:17.765433 kubelet[1543]: W0412 22:00:17.765431 1543 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 22:00:17.765497 kubelet[1543]: E0412 22:00:17.765439 1543 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 22:00:17.766281 sudo[1299]: pam_unix(sudo:session): session closed for user root Apr 12 22:00:17.765000 audit[1299]: USER_END pid=1299 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 22:00:17.765000 audit[1299]: CRED_DISP pid=1299 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 22:00:17.766995 sshd[1296]: pam_unix(sshd:session): session closed for user core Apr 12 22:00:17.766000 audit[1296]: USER_END pid=1296 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:17.766000 audit[1296]: CRED_DISP pid=1296 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 22:00:17.768490 systemd[1]: sshd@6-145.40.90.201:22-147.75.109.163:34606.service: Deactivated successfully. Apr 12 22:00:17.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-145.40.90.201:22-147.75.109.163:34606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 22:00:17.768867 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 22:00:17.769138 systemd-logind[1150]: Session 9 logged out. Waiting for processes to exit. Apr 12 22:00:17.769513 systemd-logind[1150]: Removed session 9. Apr 12 22:00:17.970441 env[1160]: time="2024-04-12T22:00:17.970166184Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-2vqfk,Uid:4cf96647-d844-445e-a5d3-8247b5f33d6b,Namespace:calico-system,Attempt:0,}" Apr 12 22:00:17.972707 env[1160]: time="2024-04-12T22:00:17.972596443Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pqf44,Uid:5ce67197-f61d-4b0f-a72b-e1864c44b401,Namespace:kube-system,Attempt:0,}" Apr 12 22:00:18.630479 kubelet[1543]: E0412 22:00:18.630363 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:18.765037 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount192951641.mount: Deactivated successfully. Apr 12 22:00:18.766703 env[1160]: time="2024-04-12T22:00:18.766647522Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:18.767678 env[1160]: time="2024-04-12T22:00:18.767663172Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:18.768450 env[1160]: time="2024-04-12T22:00:18.768435408Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:18.769173 env[1160]: time="2024-04-12T22:00:18.769152439Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:18.770432 env[1160]: time="2024-04-12T22:00:18.770419310Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:18.771115 env[1160]: time="2024-04-12T22:00:18.771100926Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:18.771970 env[1160]: time="2024-04-12T22:00:18.771955520Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:18.772574 env[1160]: time="2024-04-12T22:00:18.772548108Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:18.774324 kubelet[1543]: E0412 22:00:18.774286 1543 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r6cqh" podUID="a095c897-f494-4339-b464-5f055f671010" Apr 12 22:00:18.778246 env[1160]: time="2024-04-12T22:00:18.778209176Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 22:00:18.778246 env[1160]: time="2024-04-12T22:00:18.778235723Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 22:00:18.778246 env[1160]: time="2024-04-12T22:00:18.778225144Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 22:00:18.778246 env[1160]: time="2024-04-12T22:00:18.778242819Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 22:00:18.778246 env[1160]: time="2024-04-12T22:00:18.778242862Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 22:00:18.778438 env[1160]: time="2024-04-12T22:00:18.778249553Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 22:00:18.778438 env[1160]: time="2024-04-12T22:00:18.778330250Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a758363ffd56c94d88a0447eb73926e6d918f3d9354a983a39a87fc07e722c16 pid=1623 runtime=io.containerd.runc.v2 Apr 12 22:00:18.778438 env[1160]: time="2024-04-12T22:00:18.778328082Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c68412bce883ff6536bf27c9c1e6997ff6e73895b67e9778bf635dc7eb404677 pid=1622 runtime=io.containerd.runc.v2 Apr 12 22:00:18.784409 systemd[1]: Started cri-containerd-a758363ffd56c94d88a0447eb73926e6d918f3d9354a983a39a87fc07e722c16.scope. Apr 12 22:00:18.785088 systemd[1]: Started cri-containerd-c68412bce883ff6536bf27c9c1e6997ff6e73895b67e9778bf635dc7eb404677.scope. Apr 12 22:00:18.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit: BPF prog-id=65 op=LOAD Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1623 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:18.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353833363366666435366339346438386130343437656237333932 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1623 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:18.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353833363366666435366339346438386130343437656237333932 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit: BPF prog-id=66 op=LOAD Apr 12 22:00:18.789000 audit[1641]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000247dc0 items=0 ppid=1623 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:18.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353833363366666435366339346438386130343437656237333932 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit: BPF prog-id=67 op=LOAD Apr 12 22:00:18.789000 audit[1641]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000247e08 items=0 ppid=1623 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:18.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353833363366666435366339346438386130343437656237333932 Apr 12 22:00:18.789000 audit: BPF prog-id=67 op=UNLOAD Apr 12 22:00:18.789000 audit: BPF prog-id=66 op=UNLOAD Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit: BPF prog-id=68 op=LOAD Apr 12 22:00:18.789000 audit[1641]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000394218 items=0 ppid=1623 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:18.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353833363366666435366339346438386130343437656237333932 Apr 12 22:00:18.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit: BPF prog-id=69 op=LOAD Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=1622 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:18.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336383431326263653838336666363533366266323763396331653639 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=1622 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:18.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336383431326263653838336666363533366266323763396331653639 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit: BPF prog-id=70 op=LOAD Apr 12 22:00:18.790000 audit[1640]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0002bddc0 items=0 ppid=1622 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:18.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336383431326263653838336666363533366266323763396331653639 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit: BPF prog-id=71 op=LOAD Apr 12 22:00:18.790000 audit[1640]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0002bde08 items=0 ppid=1622 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:18.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336383431326263653838336666363533366266323763396331653639 Apr 12 22:00:18.790000 audit: BPF prog-id=71 op=UNLOAD Apr 12 22:00:18.790000 audit: BPF prog-id=70 op=UNLOAD Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { perfmon } for pid=1640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit[1640]: AVC avc: denied { bpf } for pid=1640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:18.790000 audit: BPF prog-id=72 op=LOAD Apr 12 22:00:18.790000 audit[1640]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c00040c218 items=0 ppid=1622 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:18.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336383431326263653838336666363533366266323763396331653639 Apr 12 22:00:18.796126 env[1160]: time="2024-04-12T22:00:18.796081361Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-2vqfk,Uid:4cf96647-d844-445e-a5d3-8247b5f33d6b,Namespace:calico-system,Attempt:0,} returns sandbox id \"a758363ffd56c94d88a0447eb73926e6d918f3d9354a983a39a87fc07e722c16\"" Apr 12 22:00:18.796762 env[1160]: time="2024-04-12T22:00:18.796746851Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pqf44,Uid:5ce67197-f61d-4b0f-a72b-e1864c44b401,Namespace:kube-system,Attempt:0,} returns sandbox id \"c68412bce883ff6536bf27c9c1e6997ff6e73895b67e9778bf635dc7eb404677\"" Apr 12 22:00:18.801830 env[1160]: time="2024-04-12T22:00:18.801773957Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 22:00:19.630652 kubelet[1543]: E0412 22:00:19.630584 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:20.209179 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4175281078.mount: Deactivated successfully. Apr 12 22:00:20.632070 kubelet[1543]: E0412 22:00:20.631841 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:20.774455 kubelet[1543]: E0412 22:00:20.774390 1543 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r6cqh" podUID="a095c897-f494-4339-b464-5f055f671010" Apr 12 22:00:21.618488 env[1160]: time="2024-04-12T22:00:21.618430161Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:21.619109 env[1160]: time="2024-04-12T22:00:21.619061526Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:21.620540 env[1160]: time="2024-04-12T22:00:21.620491488Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:21.621642 env[1160]: time="2024-04-12T22:00:21.621597445Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:21.623134 env[1160]: time="2024-04-12T22:00:21.623084589Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\"" Apr 12 22:00:21.623557 env[1160]: time="2024-04-12T22:00:21.623525398Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\"" Apr 12 22:00:21.624757 env[1160]: time="2024-04-12T22:00:21.624700306Z" level=info msg="CreateContainer within sandbox \"a758363ffd56c94d88a0447eb73926e6d918f3d9354a983a39a87fc07e722c16\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 22:00:21.630822 env[1160]: time="2024-04-12T22:00:21.630779588Z" level=info msg="CreateContainer within sandbox \"a758363ffd56c94d88a0447eb73926e6d918f3d9354a983a39a87fc07e722c16\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"416a97b9260e228fb6fc289225fa7e3a08980d50d30982c997c3320f65b732a7\"" Apr 12 22:00:21.631177 env[1160]: time="2024-04-12T22:00:21.631162898Z" level=info msg="StartContainer for \"416a97b9260e228fb6fc289225fa7e3a08980d50d30982c997c3320f65b732a7\"" Apr 12 22:00:21.632245 kubelet[1543]: E0412 22:00:21.632234 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:21.640535 systemd[1]: Started cri-containerd-416a97b9260e228fb6fc289225fa7e3a08980d50d30982c997c3320f65b732a7.scope. Apr 12 22:00:21.646000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.653540 kernel: kauditd_printk_skb: 528 callbacks suppressed Apr 12 22:00:21.653591 kernel: audit: type=1400 audit(1712959221.646:562): avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.646000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7ff0db6219f8 items=0 ppid=1623 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:21.742049 kernel: audit: type=1300 audit(1712959221.646:562): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7ff0db6219f8 items=0 ppid=1623 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:21.742087 kernel: audit: type=1327 audit(1712959221.646:562): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431366139376239323630653232386662366663323839323235666137 Apr 12 22:00:21.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431366139376239323630653232386662366663323839323235666137 Apr 12 22:00:21.822366 kernel: audit: type=1400 audit(1712959221.646:563): avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.646000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.878360 kernel: audit: type=1400 audit(1712959221.646:563): avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.646000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.936007 kernel: audit: type=1400 audit(1712959221.646:563): avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.646000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.995329 kernel: audit: type=1400 audit(1712959221.646:563): avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.646000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.056376 kernel: audit: type=1400 audit(1712959221.646:563): avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.646000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.061718 env[1160]: time="2024-04-12T22:00:22.061669764Z" level=info msg="StartContainer for \"416a97b9260e228fb6fc289225fa7e3a08980d50d30982c997c3320f65b732a7\" returns successfully" Apr 12 22:00:22.118642 kernel: audit: type=1400 audit(1712959221.646:563): avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.646000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.118859 systemd[1]: cri-containerd-416a97b9260e228fb6fc289225fa7e3a08980d50d30982c997c3320f65b732a7.scope: Deactivated successfully. Apr 12 22:00:22.128934 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-416a97b9260e228fb6fc289225fa7e3a08980d50d30982c997c3320f65b732a7-rootfs.mount: Deactivated successfully. Apr 12 22:00:22.181573 kernel: audit: type=1400 audit(1712959221.646:563): avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.646000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.646000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.646000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.646000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.646000 audit: BPF prog-id=73 op=LOAD Apr 12 22:00:21.646000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001f5ba8 items=0 ppid=1623 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:21.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431366139376239323630653232386662366663323839323235666137 Apr 12 22:00:21.740000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.740000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.740000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.740000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.740000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.740000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.740000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.740000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.740000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.740000 audit: BPF prog-id=74 op=LOAD Apr 12 22:00:21.740000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001f5bf8 items=0 ppid=1623 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:21.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431366139376239323630653232386662366663323839323235666137 Apr 12 22:00:21.877000 audit: BPF prog-id=74 op=UNLOAD Apr 12 22:00:21.877000 audit: BPF prog-id=73 op=UNLOAD Apr 12 22:00:21.877000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.877000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.877000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.877000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.877000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.877000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.877000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.877000 audit[1695]: AVC avc: denied { perfmon } for pid=1695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.877000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.877000 audit[1695]: AVC avc: denied { bpf } for pid=1695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:21.877000 audit: BPF prog-id=75 op=LOAD Apr 12 22:00:21.877000 audit[1695]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001f5c88 items=0 ppid=1623 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:21.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431366139376239323630653232386662366663323839323235666137 Apr 12 22:00:22.253000 audit: BPF prog-id=75 op=UNLOAD Apr 12 22:00:22.282744 env[1160]: time="2024-04-12T22:00:22.282719349Z" level=info msg="shim disconnected" id=416a97b9260e228fb6fc289225fa7e3a08980d50d30982c997c3320f65b732a7 Apr 12 22:00:22.282812 env[1160]: time="2024-04-12T22:00:22.282744818Z" level=warning msg="cleaning up after shim disconnected" id=416a97b9260e228fb6fc289225fa7e3a08980d50d30982c997c3320f65b732a7 namespace=k8s.io Apr 12 22:00:22.282812 env[1160]: time="2024-04-12T22:00:22.282751115Z" level=info msg="cleaning up dead shim" Apr 12 22:00:22.286194 env[1160]: time="2024-04-12T22:00:22.286177850Z" level=warning msg="cleanup warnings time=\"2024-04-12T22:00:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1733 runtime=io.containerd.runc.v2\n" Apr 12 22:00:22.633211 kubelet[1543]: E0412 22:00:22.633198 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:22.773984 kubelet[1543]: E0412 22:00:22.773966 1543 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r6cqh" podUID="a095c897-f494-4339-b464-5f055f671010" Apr 12 22:00:22.885815 env[1160]: time="2024-04-12T22:00:22.885734647Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:22.886349 env[1160]: time="2024-04-12T22:00:22.886333874Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5ce97277076c6f5c87d43fec5e3eacad030c82c81b2756d2bba4569d22fc65dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:22.886953 env[1160]: time="2024-04-12T22:00:22.886911980Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:22.887593 env[1160]: time="2024-04-12T22:00:22.887551567Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9e9dd46799712c58e1a49f973374ffa9ad4e5a6175896e5d805a8738bf5c5865,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:22.888122 env[1160]: time="2024-04-12T22:00:22.888106683Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\" returns image reference \"sha256:5ce97277076c6f5c87d43fec5e3eacad030c82c81b2756d2bba4569d22fc65dc\"" Apr 12 22:00:22.888424 env[1160]: time="2024-04-12T22:00:22.888413795Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 22:00:22.889073 env[1160]: time="2024-04-12T22:00:22.889059339Z" level=info msg="CreateContainer within sandbox \"c68412bce883ff6536bf27c9c1e6997ff6e73895b67e9778bf635dc7eb404677\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 22:00:22.895138 env[1160]: time="2024-04-12T22:00:22.895092746Z" level=info msg="CreateContainer within sandbox \"c68412bce883ff6536bf27c9c1e6997ff6e73895b67e9778bf635dc7eb404677\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"bbddea1acea36f8e04da4143d5cfe3596196e96fe3548dd344d6c87af8583685\"" Apr 12 22:00:22.895259 env[1160]: time="2024-04-12T22:00:22.895246962Z" level=info msg="StartContainer for \"bbddea1acea36f8e04da4143d5cfe3596196e96fe3548dd344d6c87af8583685\"" Apr 12 22:00:22.903717 systemd[1]: Started cri-containerd-bbddea1acea36f8e04da4143d5cfe3596196e96fe3548dd344d6c87af8583685.scope. Apr 12 22:00:22.909000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.909000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f79da0a6f78 items=0 ppid=1622 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:22.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262646465613161636561333666386530346461343134336435636665 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit: BPF prog-id=76 op=LOAD Apr 12 22:00:22.910000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003d2198 items=0 ppid=1622 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:22.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262646465613161636561333666386530346461343134336435636665 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit: BPF prog-id=77 op=LOAD Apr 12 22:00:22.910000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003d21e8 items=0 ppid=1622 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:22.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262646465613161636561333666386530346461343134336435636665 Apr 12 22:00:22.910000 audit: BPF prog-id=77 op=UNLOAD Apr 12 22:00:22.910000 audit: BPF prog-id=76 op=UNLOAD Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:22.910000 audit: BPF prog-id=78 op=LOAD Apr 12 22:00:22.910000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003d2278 items=0 ppid=1622 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:22.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262646465613161636561333666386530346461343134336435636665 Apr 12 22:00:22.917282 env[1160]: time="2024-04-12T22:00:22.917234252Z" level=info msg="StartContainer for \"bbddea1acea36f8e04da4143d5cfe3596196e96fe3548dd344d6c87af8583685\" returns successfully" Apr 12 22:00:22.958000 audit[1819]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1819 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:22.958000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef32b8c30 a2=0 a3=7ffef32b8c1c items=0 ppid=1767 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:22.958000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 22:00:22.958000 audit[1820]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:22.958000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd32ced5a0 a2=0 a3=6cb1b349a6f06d32 items=0 ppid=1767 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:22.958000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 22:00:22.959000 audit[1822]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1822 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:22.959000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf0fe8720 a2=0 a3=7ffcf0fe870c items=0 ppid=1767 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:22.959000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 22:00:22.959000 audit[1821]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1821 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:22.959000 audit[1821]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee6b62230 a2=0 a3=fc16724ca2860a77 items=0 ppid=1767 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:22.959000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 22:00:22.960000 audit[1823]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:22.960000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2fc77d90 a2=0 a3=7ffc2fc77d7c items=0 ppid=1767 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:22.960000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 22:00:22.960000 audit[1824]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:22.960000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd302f47b0 a2=0 a3=7ffd302f479c items=0 ppid=1767 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:22.960000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 22:00:23.062000 audit[1825]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1825 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:23.062000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd7e4b3ef0 a2=0 a3=7ffd7e4b3edc items=0 ppid=1767 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.062000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 22:00:23.068000 audit[1827]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1827 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:23.068000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd545d9ca0 a2=0 a3=7ffd545d9c8c items=0 ppid=1767 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.068000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 22:00:23.077000 audit[1830]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1830 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:23.077000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc9d8d4f10 a2=0 a3=7ffc9d8d4efc items=0 ppid=1767 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.077000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 22:00:23.080000 audit[1831]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1831 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:23.080000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb509bbc0 a2=0 a3=7ffeb509bbac items=0 ppid=1767 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.080000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 22:00:23.086000 audit[1833]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1833 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:23.086000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc0c2ec540 a2=0 a3=7ffc0c2ec52c items=0 ppid=1767 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.086000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 22:00:23.088000 audit[1834]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1834 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:23.088000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff17bec4f0 a2=0 a3=7fff17bec4dc items=0 ppid=1767 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.088000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 22:00:23.095000 audit[1836]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:23.095000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe2c15b5b0 a2=0 a3=7ffe2c15b59c items=0 ppid=1767 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.095000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 22:00:23.103000 audit[1839]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1839 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:23.103000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd8d5d6d10 a2=0 a3=7ffd8d5d6cfc items=0 ppid=1767 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.103000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 22:00:23.106000 audit[1840]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1840 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:23.106000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebc7bfca0 a2=0 a3=7ffebc7bfc8c items=0 ppid=1767 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 22:00:23.112000 audit[1842]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1842 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:23.112000 audit[1842]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff6a08fe30 a2=0 a3=7fff6a08fe1c items=0 ppid=1767 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 22:00:23.115000 audit[1843]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:23.115000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed0b395c0 a2=0 a3=7ffed0b395ac items=0 ppid=1767 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.115000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 22:00:23.121000 audit[1845]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1845 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:23.121000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd22e4b480 a2=0 a3=7ffd22e4b46c items=0 ppid=1767 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.121000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 22:00:23.130000 audit[1848]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1848 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:23.130000 audit[1848]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd25aef610 a2=0 a3=7ffd25aef5fc items=0 ppid=1767 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.130000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 22:00:23.139000 audit[1851]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1851 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:23.139000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc2f770e00 a2=0 a3=7ffc2f770dec items=0 ppid=1767 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.139000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 22:00:23.142000 audit[1852]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1852 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:23.142000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdd503df30 a2=0 a3=7ffdd503df1c items=0 ppid=1767 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.142000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 22:00:23.147000 audit[1854]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1854 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:23.147000 audit[1854]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdf4e9b8f0 a2=0 a3=7ffdf4e9b8dc items=0 ppid=1767 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.147000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 22:00:23.208000 audit[1860]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1860 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:23.208000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc5c20d720 a2=0 a3=7ffc5c20d70c items=0 ppid=1767 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.208000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 22:00:23.209000 audit[1861]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:23.209000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff74e3c030 a2=0 a3=7fff74e3c01c items=0 ppid=1767 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.209000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 22:00:23.212000 audit[1863]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1863 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 22:00:23.212000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc3585bcd0 a2=0 a3=7ffc3585bcbc items=0 ppid=1767 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.212000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 22:00:23.225000 audit[1869]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1869 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:00:23.225000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffde64b8290 a2=0 a3=7ffde64b827c items=0 ppid=1767 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.225000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:00:23.252000 audit[1869]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1869 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:00:23.252000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffde64b8290 a2=0 a3=7ffde64b827c items=0 ppid=1767 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.252000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:00:23.271000 audit[1877]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1877 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.271000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc0b58ef90 a2=0 a3=7ffc0b58ef7c items=0 ppid=1767 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.271000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 22:00:23.274000 audit[1879]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1879 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.274000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe47cb60e0 a2=0 a3=7ffe47cb60cc items=0 ppid=1767 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.274000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 22:00:23.279000 audit[1882]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1882 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.279000 audit[1882]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc2c8d2d20 a2=0 a3=7ffc2c8d2d0c items=0 ppid=1767 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.279000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 22:00:23.281000 audit[1883]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1883 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.281000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc21c59a00 a2=0 a3=7ffc21c599ec items=0 ppid=1767 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.281000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 22:00:23.284000 audit[1885]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1885 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.284000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc08b3cb80 a2=0 a3=7ffc08b3cb6c items=0 ppid=1767 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.284000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 22:00:23.285000 audit[1886]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1886 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.285000 audit[1886]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff19a64580 a2=0 a3=7fff19a6456c items=0 ppid=1767 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.285000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 22:00:23.288000 audit[1888]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1888 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.288000 audit[1888]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff6aaec4c0 a2=0 a3=7fff6aaec4ac items=0 ppid=1767 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.288000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 22:00:23.292000 audit[1891]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1891 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.292000 audit[1891]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffbb6113b0 a2=0 a3=7fffbb61139c items=0 ppid=1767 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.292000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 22:00:23.294000 audit[1892]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1892 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.294000 audit[1892]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd627bf5e0 a2=0 a3=7ffd627bf5cc items=0 ppid=1767 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.294000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 22:00:23.297000 audit[1894]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1894 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.297000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdd7af5540 a2=0 a3=7ffdd7af552c items=0 ppid=1767 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.297000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 22:00:23.298000 audit[1895]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1895 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.298000 audit[1895]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffccc2b77f0 a2=0 a3=7ffccc2b77dc items=0 ppid=1767 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.298000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 22:00:23.301000 audit[1897]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1897 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.301000 audit[1897]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf293afc0 a2=0 a3=7ffdf293afac items=0 ppid=1767 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.301000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 22:00:23.307000 audit[1900]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1900 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.307000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd3ff3cdc0 a2=0 a3=7ffd3ff3cdac items=0 ppid=1767 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.307000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 22:00:23.315000 audit[1903]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1903 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.315000 audit[1903]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffea803b390 a2=0 a3=7ffea803b37c items=0 ppid=1767 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 22:00:23.318000 audit[1904]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1904 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.318000 audit[1904]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff13d48bf0 a2=0 a3=7fff13d48bdc items=0 ppid=1767 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.318000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 22:00:23.324000 audit[1906]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1906 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.324000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffff69f3140 a2=0 a3=7ffff69f312c items=0 ppid=1767 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 22:00:23.332000 audit[1909]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1909 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.332000 audit[1909]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffddc847420 a2=0 a3=7ffddc84740c items=0 ppid=1767 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.332000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 22:00:23.335000 audit[1910]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1910 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.335000 audit[1910]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff89460330 a2=0 a3=7fff8946031c items=0 ppid=1767 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.335000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 22:00:23.340000 audit[1912]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1912 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.340000 audit[1912]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff6d78a320 a2=0 a3=7fff6d78a30c items=0 ppid=1767 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.340000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 22:00:23.343000 audit[1913]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1913 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.343000 audit[1913]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8b1f07e0 a2=0 a3=7ffd8b1f07cc items=0 ppid=1767 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.343000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 22:00:23.349000 audit[1915]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1915 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.349000 audit[1915]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff88d2ae20 a2=0 a3=7fff88d2ae0c items=0 ppid=1767 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.349000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 22:00:23.357000 audit[1918]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1918 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 22:00:23.357000 audit[1918]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdeeb3fa80 a2=0 a3=7ffdeeb3fa6c items=0 ppid=1767 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.357000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 22:00:23.364000 audit[1920]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1920 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 22:00:23.364000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffdb4e47b20 a2=0 a3=7ffdb4e47b0c items=0 ppid=1767 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.364000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:00:23.365000 audit[1920]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1920 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 22:00:23.365000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffdb4e47b20 a2=0 a3=7ffdb4e47b0c items=0 ppid=1767 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:23.365000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:00:23.634131 kubelet[1543]: E0412 22:00:23.633926 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:23.801512 kubelet[1543]: I0412 22:00:23.801413 1543 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-pqf44" podStartSLOduration=3.710047759 podCreationTimestamp="2024-04-12 22:00:16 +0000 UTC" firstStartedPulling="2024-04-12 22:00:18.797063047 +0000 UTC m=+2.567100825" lastFinishedPulling="2024-04-12 22:00:22.888292849 +0000 UTC m=+6.658330628" observedRunningTime="2024-04-12 22:00:23.80103949 +0000 UTC m=+7.571077342" watchObservedRunningTime="2024-04-12 22:00:23.801277562 +0000 UTC m=+7.571315387" Apr 12 22:00:24.303688 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4220596754.mount: Deactivated successfully. Apr 12 22:00:24.635316 kubelet[1543]: E0412 22:00:24.635072 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:24.775514 kubelet[1543]: E0412 22:00:24.775446 1543 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r6cqh" podUID="a095c897-f494-4339-b464-5f055f671010" Apr 12 22:00:25.635875 kubelet[1543]: E0412 22:00:25.635840 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:26.636580 kubelet[1543]: E0412 22:00:26.636536 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:26.774242 kubelet[1543]: E0412 22:00:26.774195 1543 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r6cqh" podUID="a095c897-f494-4339-b464-5f055f671010" Apr 12 22:00:27.637230 kubelet[1543]: E0412 22:00:27.637191 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:27.709241 env[1160]: time="2024-04-12T22:00:27.709217974Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:27.709948 env[1160]: time="2024-04-12T22:00:27.709935385Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:27.710995 env[1160]: time="2024-04-12T22:00:27.710984029Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:27.712353 env[1160]: time="2024-04-12T22:00:27.712339882Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:27.712690 env[1160]: time="2024-04-12T22:00:27.712677568Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\"" Apr 12 22:00:27.713694 env[1160]: time="2024-04-12T22:00:27.713651800Z" level=info msg="CreateContainer within sandbox \"a758363ffd56c94d88a0447eb73926e6d918f3d9354a983a39a87fc07e722c16\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 22:00:27.718437 env[1160]: time="2024-04-12T22:00:27.718422137Z" level=info msg="CreateContainer within sandbox \"a758363ffd56c94d88a0447eb73926e6d918f3d9354a983a39a87fc07e722c16\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"404b73cc65479155138a81f7e6a854168f224d8ab5637eb3ae54c0563b70fc38\"" Apr 12 22:00:27.718619 env[1160]: time="2024-04-12T22:00:27.718599417Z" level=info msg="StartContainer for \"404b73cc65479155138a81f7e6a854168f224d8ab5637eb3ae54c0563b70fc38\"" Apr 12 22:00:27.729392 systemd[1]: Started cri-containerd-404b73cc65479155138a81f7e6a854168f224d8ab5637eb3ae54c0563b70fc38.scope. Apr 12 22:00:27.734000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.763654 kernel: kauditd_printk_skb: 230 callbacks suppressed Apr 12 22:00:27.763707 kernel: audit: type=1400 audit(1712959227.734:626): avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.734000 audit[1928]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe0489a11c8 items=0 ppid=1623 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:27.829357 kernel: audit: type=1300 audit(1712959227.734:626): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe0489a11c8 items=0 ppid=1623 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:27.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430346237336363363534373931353531333861383166376536613835 Apr 12 22:00:28.018374 kernel: audit: type=1327 audit(1712959227.734:626): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430346237336363363534373931353531333861383166376536613835 Apr 12 22:00:28.018403 kernel: audit: type=1400 audit(1712959227.734:627): avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.734000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:28.081548 kernel: audit: type=1400 audit(1712959227.734:627): avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.734000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:28.144742 kernel: audit: type=1400 audit(1712959227.734:627): avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.734000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:28.207954 kernel: audit: type=1400 audit(1712959227.734:627): avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.734000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:28.271544 kernel: audit: type=1400 audit(1712959227.734:627): avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.734000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:28.277023 env[1160]: time="2024-04-12T22:00:28.276997882Z" level=info msg="StartContainer for \"404b73cc65479155138a81f7e6a854168f224d8ab5637eb3ae54c0563b70fc38\" returns successfully" Apr 12 22:00:28.335137 kernel: audit: type=1400 audit(1712959227.734:627): avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.734000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:28.398699 kernel: audit: type=1400 audit(1712959227.734:627): avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.734000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.734000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.734000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.734000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.734000 audit: BPF prog-id=79 op=LOAD Apr 12 22:00:27.734000 audit[1928]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000376648 items=0 ppid=1623 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:27.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430346237336363363534373931353531333861383166376536613835 Apr 12 22:00:27.923000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.923000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.923000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.923000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.923000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.923000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.923000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.923000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.923000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:27.923000 audit: BPF prog-id=80 op=LOAD Apr 12 22:00:27.923000 audit[1928]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000376698 items=0 ppid=1623 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:27.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430346237336363363534373931353531333861383166376536613835 Apr 12 22:00:28.080000 audit: BPF prog-id=80 op=UNLOAD Apr 12 22:00:28.080000 audit: BPF prog-id=79 op=UNLOAD Apr 12 22:00:28.080000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:28.080000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:28.080000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:28.080000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:28.080000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:28.080000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:28.080000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:28.080000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:28.080000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:28.080000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:28.080000 audit: BPF prog-id=81 op=LOAD Apr 12 22:00:28.080000 audit[1928]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000376728 items=0 ppid=1623 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:28.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430346237336363363534373931353531333861383166376536613835 Apr 12 22:00:28.638233 kubelet[1543]: E0412 22:00:28.638003 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:28.774544 kubelet[1543]: E0412 22:00:28.774441 1543 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r6cqh" podUID="a095c897-f494-4339-b464-5f055f671010" Apr 12 22:00:28.823962 env[1160]: time="2024-04-12T22:00:28.823860288Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 22:00:28.827092 systemd[1]: cri-containerd-404b73cc65479155138a81f7e6a854168f224d8ab5637eb3ae54c0563b70fc38.scope: Deactivated successfully. Apr 12 22:00:28.844000 audit: BPF prog-id=81 op=UNLOAD Apr 12 22:00:28.864769 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-404b73cc65479155138a81f7e6a854168f224d8ab5637eb3ae54c0563b70fc38-rootfs.mount: Deactivated successfully. Apr 12 22:00:28.925412 kubelet[1543]: I0412 22:00:28.925235 1543 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 22:00:29.504256 env[1160]: time="2024-04-12T22:00:29.504132686Z" level=info msg="shim disconnected" id=404b73cc65479155138a81f7e6a854168f224d8ab5637eb3ae54c0563b70fc38 Apr 12 22:00:29.504256 env[1160]: time="2024-04-12T22:00:29.504235939Z" level=warning msg="cleaning up after shim disconnected" id=404b73cc65479155138a81f7e6a854168f224d8ab5637eb3ae54c0563b70fc38 namespace=k8s.io Apr 12 22:00:29.504256 env[1160]: time="2024-04-12T22:00:29.504263789Z" level=info msg="cleaning up dead shim" Apr 12 22:00:29.519494 env[1160]: time="2024-04-12T22:00:29.519383475Z" level=warning msg="cleanup warnings time=\"2024-04-12T22:00:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1981 runtime=io.containerd.runc.v2\n" Apr 12 22:00:29.638746 kubelet[1543]: E0412 22:00:29.638640 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:29.815591 env[1160]: time="2024-04-12T22:00:29.815380548Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 22:00:30.639666 kubelet[1543]: E0412 22:00:30.639559 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:30.788492 systemd[1]: Created slice kubepods-besteffort-poda095c897_f494_4339_b464_5f055f671010.slice. Apr 12 22:00:30.793251 env[1160]: time="2024-04-12T22:00:30.793170590Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r6cqh,Uid:a095c897-f494-4339-b464-5f055f671010,Namespace:calico-system,Attempt:0,}" Apr 12 22:00:30.831597 env[1160]: time="2024-04-12T22:00:30.831553439Z" level=error msg="Failed to destroy network for sandbox \"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 22:00:30.831812 env[1160]: time="2024-04-12T22:00:30.831791870Z" level=error msg="encountered an error cleaning up failed sandbox \"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 22:00:30.831847 env[1160]: time="2024-04-12T22:00:30.831829913Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r6cqh,Uid:a095c897-f494-4339-b464-5f055f671010,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 22:00:30.832058 kubelet[1543]: E0412 22:00:30.832047 1543 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 22:00:30.832087 kubelet[1543]: E0412 22:00:30.832083 1543 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-r6cqh" Apr 12 22:00:30.832108 kubelet[1543]: E0412 22:00:30.832095 1543 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-r6cqh" Apr 12 22:00:30.832131 kubelet[1543]: E0412 22:00:30.832126 1543 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-r6cqh_calico-system(a095c897-f494-4339-b464-5f055f671010)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-r6cqh_calico-system(a095c897-f494-4339-b464-5f055f671010)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-r6cqh" podUID="a095c897-f494-4339-b464-5f055f671010" Apr 12 22:00:30.832525 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1-shm.mount: Deactivated successfully. Apr 12 22:00:31.640470 kubelet[1543]: E0412 22:00:31.640395 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:31.816645 kubelet[1543]: I0412 22:00:31.816578 1543 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Apr 12 22:00:31.824174 env[1160]: time="2024-04-12T22:00:31.824091119Z" level=info msg="StopPodSandbox for \"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\"" Apr 12 22:00:31.845273 env[1160]: time="2024-04-12T22:00:31.845233370Z" level=error msg="StopPodSandbox for \"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\" failed" error="failed to destroy network for sandbox \"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 22:00:31.845536 kubelet[1543]: E0412 22:00:31.845497 1543 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Apr 12 22:00:31.845578 kubelet[1543]: E0412 22:00:31.845539 1543 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1"} Apr 12 22:00:31.845578 kubelet[1543]: E0412 22:00:31.845574 1543 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a095c897-f494-4339-b464-5f055f671010\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 22:00:31.845640 kubelet[1543]: E0412 22:00:31.845596 1543 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a095c897-f494-4339-b464-5f055f671010\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-r6cqh" podUID="a095c897-f494-4339-b464-5f055f671010" Apr 12 22:00:32.641012 kubelet[1543]: E0412 22:00:32.640961 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:33.642060 kubelet[1543]: E0412 22:00:33.641948 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:34.385145 kubelet[1543]: I0412 22:00:34.385103 1543 topology_manager.go:215] "Topology Admit Handler" podUID="5d10b781-2cb7-48ad-8603-e0eed309a7b0" podNamespace="default" podName="nginx-deployment-6d5f899847-hwj6q" Apr 12 22:00:34.388709 systemd[1]: Created slice kubepods-besteffort-pod5d10b781_2cb7_48ad_8603_e0eed309a7b0.slice. Apr 12 22:00:34.472107 kubelet[1543]: I0412 22:00:34.472094 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qrgc5\" (UniqueName: \"kubernetes.io/projected/5d10b781-2cb7-48ad-8603-e0eed309a7b0-kube-api-access-qrgc5\") pod \"nginx-deployment-6d5f899847-hwj6q\" (UID: \"5d10b781-2cb7-48ad-8603-e0eed309a7b0\") " pod="default/nginx-deployment-6d5f899847-hwj6q" Apr 12 22:00:34.642560 kubelet[1543]: E0412 22:00:34.642486 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:34.690438 env[1160]: time="2024-04-12T22:00:34.690381668Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-hwj6q,Uid:5d10b781-2cb7-48ad-8603-e0eed309a7b0,Namespace:default,Attempt:0,}" Apr 12 22:00:34.722792 env[1160]: time="2024-04-12T22:00:34.722728336Z" level=error msg="Failed to destroy network for sandbox \"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 22:00:34.722959 env[1160]: time="2024-04-12T22:00:34.722915806Z" level=error msg="encountered an error cleaning up failed sandbox \"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 22:00:34.722959 env[1160]: time="2024-04-12T22:00:34.722943616Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-hwj6q,Uid:5d10b781-2cb7-48ad-8603-e0eed309a7b0,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 22:00:34.723228 kubelet[1543]: E0412 22:00:34.723197 1543 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 22:00:34.723258 kubelet[1543]: E0412 22:00:34.723248 1543 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-hwj6q" Apr 12 22:00:34.723280 kubelet[1543]: E0412 22:00:34.723261 1543 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-hwj6q" Apr 12 22:00:34.723327 kubelet[1543]: E0412 22:00:34.723301 1543 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-hwj6q_default(5d10b781-2cb7-48ad-8603-e0eed309a7b0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-hwj6q_default(5d10b781-2cb7-48ad-8603-e0eed309a7b0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-hwj6q" podUID="5d10b781-2cb7-48ad-8603-e0eed309a7b0" Apr 12 22:00:34.723955 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324-shm.mount: Deactivated successfully. Apr 12 22:00:34.819316 kubelet[1543]: I0412 22:00:34.819299 1543 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Apr 12 22:00:34.819575 env[1160]: time="2024-04-12T22:00:34.819553561Z" level=info msg="StopPodSandbox for \"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\"" Apr 12 22:00:34.836077 env[1160]: time="2024-04-12T22:00:34.836037085Z" level=error msg="StopPodSandbox for \"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\" failed" error="failed to destroy network for sandbox \"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 22:00:34.836234 kubelet[1543]: E0412 22:00:34.836224 1543 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Apr 12 22:00:34.836274 kubelet[1543]: E0412 22:00:34.836252 1543 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324"} Apr 12 22:00:34.836274 kubelet[1543]: E0412 22:00:34.836274 1543 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5d10b781-2cb7-48ad-8603-e0eed309a7b0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 22:00:34.836340 kubelet[1543]: E0412 22:00:34.836297 1543 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5d10b781-2cb7-48ad-8603-e0eed309a7b0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-hwj6q" podUID="5d10b781-2cb7-48ad-8603-e0eed309a7b0" Apr 12 22:00:35.643394 kubelet[1543]: E0412 22:00:35.643350 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:35.823872 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount692021688.mount: Deactivated successfully. Apr 12 22:00:35.844202 env[1160]: time="2024-04-12T22:00:35.844184296Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:35.844797 env[1160]: time="2024-04-12T22:00:35.844783731Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:35.845522 env[1160]: time="2024-04-12T22:00:35.845510961Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:35.846279 env[1160]: time="2024-04-12T22:00:35.846266566Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:35.846590 env[1160]: time="2024-04-12T22:00:35.846574981Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\"" Apr 12 22:00:35.850717 env[1160]: time="2024-04-12T22:00:35.850659462Z" level=info msg="CreateContainer within sandbox \"a758363ffd56c94d88a0447eb73926e6d918f3d9354a983a39a87fc07e722c16\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 22:00:35.857020 env[1160]: time="2024-04-12T22:00:35.857000225Z" level=info msg="CreateContainer within sandbox \"a758363ffd56c94d88a0447eb73926e6d918f3d9354a983a39a87fc07e722c16\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"8d15c22cb264889022ca60b348889cd6f4f94bed525d522beded00efa3ca4d5d\"" Apr 12 22:00:35.857261 env[1160]: time="2024-04-12T22:00:35.857248607Z" level=info msg="StartContainer for \"8d15c22cb264889022ca60b348889cd6f4f94bed525d522beded00efa3ca4d5d\"" Apr 12 22:00:35.865459 systemd[1]: Started cri-containerd-8d15c22cb264889022ca60b348889cd6f4f94bed525d522beded00efa3ca4d5d.scope. Apr 12 22:00:35.873000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.901579 kernel: kauditd_printk_skb: 34 callbacks suppressed Apr 12 22:00:35.901684 kernel: audit: type=1400 audit(1712959235.873:633): avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.873000 audit[2156]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f2158723228 items=0 ppid=1623 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:36.063135 kernel: audit: type=1300 audit(1712959235.873:633): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f2158723228 items=0 ppid=1623 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:36.063167 kernel: audit: type=1327 audit(1712959235.873:633): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864313563323263623236343838393032326361363062333438383839 Apr 12 22:00:35.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864313563323263623236343838393032326361363062333438383839 Apr 12 22:00:36.156366 kernel: audit: type=1400 audit(1712959235.873:634): avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.873000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:36.219880 kernel: audit: type=1400 audit(1712959235.873:634): avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.873000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:36.283457 kernel: audit: type=1400 audit(1712959235.873:634): avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.873000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.850624 systemd-resolved[1106]: Clock change detected. Flushing caches. Apr 12 22:00:35.899400 systemd-journald[944]: Time jumped backwards, rotating. Apr 12 22:00:35.899440 kernel: audit: type=1400 audit(1712959235.873:634): avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.873000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.899481 env[1160]: time="2024-04-12T22:00:35.864956984Z" level=info msg="StartContainer for \"8d15c22cb264889022ca60b348889cd6f4f94bed525d522beded00efa3ca4d5d\" returns successfully" Apr 12 22:00:35.850673 systemd-timesyncd[1107]: Contacted time server [2602:f9ba:69::210]:123 (2.flatcar.pool.ntp.org). Apr 12 22:00:35.850699 systemd-timesyncd[1107]: Initial clock synchronization to Fri 2024-04-12 22:00:35.850575 UTC. Apr 12 22:00:35.873000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:36.014440 kernel: audit: type=1400 audit(1712959235.873:634): avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:36.014462 kernel: audit: type=1400 audit(1712959235.873:634): avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.873000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:36.078036 kernel: audit: type=1400 audit(1712959235.873:634): avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.873000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.873000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.873000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.873000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.873000 audit: BPF prog-id=82 op=LOAD Apr 12 22:00:35.873000 audit[2156]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0002c5c88 items=0 ppid=1623 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:35.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864313563323263623236343838393032326361363062333438383839 Apr 12 22:00:35.964000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.964000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.964000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.964000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.964000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.964000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.964000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.964000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.964000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:35.964000 audit: BPF prog-id=83 op=LOAD Apr 12 22:00:35.964000 audit[2156]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0002c5cd8 items=0 ppid=1623 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:35.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864313563323263623236343838393032326361363062333438383839 Apr 12 22:00:36.155000 audit: BPF prog-id=83 op=UNLOAD Apr 12 22:00:36.155000 audit: BPF prog-id=82 op=UNLOAD Apr 12 22:00:36.155000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:36.155000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:36.155000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:36.155000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:36.155000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:36.155000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:36.155000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:36.155000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:36.155000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:36.155000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:36.155000 audit: BPF prog-id=84 op=LOAD Apr 12 22:00:36.155000 audit[2156]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002c5d68 items=0 ppid=1623 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:36.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864313563323263623236343838393032326361363062333438383839 Apr 12 22:00:36.142314 kubelet[1543]: E0412 22:00:36.142250 1543 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:36.156396 kubelet[1543]: E0412 22:00:36.156387 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:36.225072 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 22:00:36.225107 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 22:00:36.370688 kubelet[1543]: I0412 22:00:36.370594 1543 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-2vqfk" podStartSLOduration=3.320603922 podCreationTimestamp="2024-04-12 22:00:16 +0000 UTC" firstStartedPulling="2024-04-12 22:00:18.796827287 +0000 UTC m=+2.566865066" lastFinishedPulling="2024-04-12 22:00:35.84674157 +0000 UTC m=+19.616779352" observedRunningTime="2024-04-12 22:00:36.370126361 +0000 UTC m=+20.627749758" watchObservedRunningTime="2024-04-12 22:00:36.370518208 +0000 UTC m=+20.628141571" Apr 12 22:00:37.157055 kubelet[1543]: E0412 22:00:37.156990 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:37.474000 audit[2333]: AVC avc: denied { write } for pid=2333 comm="tee" name="fd" dev="proc" ino=27419 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 22:00:37.474000 audit[2333]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe46188970 a2=241 a3=1b6 items=1 ppid=2300 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.474000 audit[2338]: AVC avc: denied { write } for pid=2338 comm="tee" name="fd" dev="proc" ino=30724 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 22:00:37.474000 audit[2335]: AVC avc: denied { write } for pid=2335 comm="tee" name="fd" dev="proc" ino=9169 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 22:00:37.474000 audit[2332]: AVC avc: denied { write } for pid=2332 comm="tee" name="fd" dev="proc" ino=22195 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 22:00:37.474000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 22:00:37.474000 audit: PATH item=0 name="/dev/fd/63" inode=19241 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:37.474000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 22:00:37.474000 audit[2332]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc815b96f a2=241 a3=1b6 items=1 ppid=2296 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.474000 audit[2338]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc0dd797f a2=241 a3=1b6 items=1 ppid=2295 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.474000 audit[2335]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb941a97f a2=241 a3=1b6 items=1 ppid=2298 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.474000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 22:00:37.474000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 22:00:37.474000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 22:00:37.474000 audit: PATH item=0 name="/dev/fd/63" inode=22192 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:37.474000 audit: PATH item=0 name="/dev/fd/63" inode=18187 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:37.474000 audit: PATH item=0 name="/dev/fd/63" inode=9166 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:37.474000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 22:00:37.474000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 22:00:37.474000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 22:00:37.474000 audit[2331]: AVC avc: denied { write } for pid=2331 comm="tee" name="fd" dev="proc" ino=18190 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 22:00:37.474000 audit[2340]: AVC avc: denied { write } for pid=2340 comm="tee" name="fd" dev="proc" ino=28941 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 22:00:37.474000 audit[2340]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd7059b980 a2=241 a3=1b6 items=1 ppid=2294 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.474000 audit[2331]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf09c997f a2=241 a3=1b6 items=1 ppid=2299 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.474000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 22:00:37.474000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 22:00:37.474000 audit: PATH item=0 name="/dev/fd/63" inode=26574 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:37.474000 audit: PATH item=0 name="/dev/fd/63" inode=28938 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:37.474000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 22:00:37.474000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 22:00:37.475000 audit[2341]: AVC avc: denied { write } for pid=2341 comm="tee" name="fd" dev="proc" ino=16693 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 22:00:37.475000 audit[2341]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec6a24981 a2=241 a3=1b6 items=1 ppid=2301 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.475000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 22:00:37.475000 audit: PATH item=0 name="/dev/fd/63" inode=27416 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:00:37.475000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 22:00:37.573779 kernel: Initializing XFRM netlink socket Apr 12 22:00:37.620000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.620000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.620000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.620000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.620000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.620000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.620000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.620000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.620000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.620000 audit: BPF prog-id=85 op=LOAD Apr 12 22:00:37.620000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff80204d10 a2=70 a3=7f0e808c0000 items=0 ppid=2307 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.620000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 22:00:37.620000 audit: BPF prog-id=85 op=UNLOAD Apr 12 22:00:37.620000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.620000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.620000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.620000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.620000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.620000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.620000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.620000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.620000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.620000 audit: BPF prog-id=86 op=LOAD Apr 12 22:00:37.620000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff80204d10 a2=70 a3=6f items=0 ppid=2307 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.620000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 22:00:37.621000 audit: BPF prog-id=86 op=UNLOAD Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff80204cc0 a2=70 a3=7fff80204d10 items=0 ppid=2307 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.621000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit: BPF prog-id=87 op=LOAD Apr 12 22:00:37.621000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff80204ca0 a2=70 a3=7fff80204d10 items=0 ppid=2307 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.621000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 22:00:37.621000 audit: BPF prog-id=87 op=UNLOAD Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff80204d80 a2=70 a3=0 items=0 ppid=2307 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.621000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff80204d70 a2=70 a3=0 items=0 ppid=2307 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.621000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff80204ce0 a2=70 a3=0 items=0 ppid=2307 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.621000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff80204db0 a2=70 a3=12cbe10 items=0 ppid=2307 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.621000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff80204db0 a2=70 a3=12c8880 items=0 ppid=2307 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.621000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { perfmon } for pid=2482 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit[2482]: AVC avc: denied { bpf } for pid=2482 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.621000 audit: BPF prog-id=88 op=LOAD Apr 12 22:00:37.621000 audit[2482]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff80204cd0 a2=70 a3=0 items=0 ppid=2307 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.621000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 22:00:37.622000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.622000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffea35e1b00 a2=70 a3=fff80800 items=0 ppid=2307 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 22:00:37.622000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:37.622000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffea35e19d0 a2=70 a3=3 items=0 ppid=2307 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 22:00:37.647000 audit: BPF prog-id=88 op=UNLOAD Apr 12 22:00:37.778000 audit[2541]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2541 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 22:00:37.778000 audit[2541]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe16ccf760 a2=0 a3=7ffe16ccf74c items=0 ppid=2307 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.778000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 22:00:37.788000 audit[2539]: NETFILTER_CFG table=raw:66 family=2 entries=19 op=nft_register_chain pid=2539 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 22:00:37.788000 audit[2539]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffc2732fca0 a2=0 a3=7ffc2732fc8c items=0 ppid=2307 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.788000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 22:00:37.791000 audit[2540]: NETFILTER_CFG table=nat:67 family=2 entries=15 op=nft_register_chain pid=2540 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 22:00:37.791000 audit[2540]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffcfdef5990 a2=0 a3=7ffcfdef597c items=0 ppid=2307 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.791000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 22:00:37.796000 audit[2546]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2546 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 22:00:37.796000 audit[2546]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffca8dd28c0 a2=0 a3=7ffca8dd28ac items=0 ppid=2307 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:37.796000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 22:00:38.157422 kubelet[1543]: E0412 22:00:38.157221 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:38.593540 systemd-networkd[1000]: vxlan.calico: Link UP Apr 12 22:00:38.593544 systemd-networkd[1000]: vxlan.calico: Gained carrier Apr 12 22:00:39.158461 kubelet[1543]: E0412 22:00:39.158338 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:39.973225 systemd-networkd[1000]: vxlan.calico: Gained IPv6LL Apr 12 22:00:40.159099 kubelet[1543]: E0412 22:00:40.158993 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:41.159349 kubelet[1543]: E0412 22:00:41.159237 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:42.159574 kubelet[1543]: E0412 22:00:42.159453 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:42.288669 env[1160]: time="2024-04-12T22:00:42.288565909Z" level=info msg="StopPodSandbox for \"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\"" Apr 12 22:00:42.363601 env[1160]: 2024-04-12 22:00:42.329 [INFO][2571] k8s.go 585: Cleaning up netns ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Apr 12 22:00:42.363601 env[1160]: 2024-04-12 22:00:42.329 [INFO][2571] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" iface="eth0" netns="/var/run/netns/cni-882d9f1e-3ba5-0daf-eb69-469e7e39ed62" Apr 12 22:00:42.363601 env[1160]: 2024-04-12 22:00:42.330 [INFO][2571] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" iface="eth0" netns="/var/run/netns/cni-882d9f1e-3ba5-0daf-eb69-469e7e39ed62" Apr 12 22:00:42.363601 env[1160]: 2024-04-12 22:00:42.330 [INFO][2571] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" iface="eth0" netns="/var/run/netns/cni-882d9f1e-3ba5-0daf-eb69-469e7e39ed62" Apr 12 22:00:42.363601 env[1160]: 2024-04-12 22:00:42.330 [INFO][2571] k8s.go 592: Releasing IP address(es) ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Apr 12 22:00:42.363601 env[1160]: 2024-04-12 22:00:42.330 [INFO][2571] utils.go 188: Calico CNI releasing IP address ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Apr 12 22:00:42.363601 env[1160]: 2024-04-12 22:00:42.346 [INFO][2586] ipam_plugin.go 415: Releasing address using handleID ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" HandleID="k8s-pod-network.0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Workload="10.67.80.7-k8s-csi--node--driver--r6cqh-eth0" Apr 12 22:00:42.363601 env[1160]: 2024-04-12 22:00:42.346 [INFO][2586] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 22:00:42.363601 env[1160]: 2024-04-12 22:00:42.346 [INFO][2586] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 22:00:42.363601 env[1160]: 2024-04-12 22:00:42.354 [WARNING][2586] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" HandleID="k8s-pod-network.0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Workload="10.67.80.7-k8s-csi--node--driver--r6cqh-eth0" Apr 12 22:00:42.363601 env[1160]: 2024-04-12 22:00:42.354 [INFO][2586] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" HandleID="k8s-pod-network.0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Workload="10.67.80.7-k8s-csi--node--driver--r6cqh-eth0" Apr 12 22:00:42.363601 env[1160]: 2024-04-12 22:00:42.357 [INFO][2586] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 22:00:42.363601 env[1160]: 2024-04-12 22:00:42.360 [INFO][2571] k8s.go 598: Teardown processing complete. ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Apr 12 22:00:42.364896 env[1160]: time="2024-04-12T22:00:42.363889971Z" level=info msg="TearDown network for sandbox \"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\" successfully" Apr 12 22:00:42.364896 env[1160]: time="2024-04-12T22:00:42.363969938Z" level=info msg="StopPodSandbox for \"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\" returns successfully" Apr 12 22:00:42.365265 env[1160]: time="2024-04-12T22:00:42.365150864Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r6cqh,Uid:a095c897-f494-4339-b464-5f055f671010,Namespace:calico-system,Attempt:1,}" Apr 12 22:00:42.368727 systemd[1]: run-netns-cni\x2d882d9f1e\x2d3ba5\x2d0daf\x2deb69\x2d469e7e39ed62.mount: Deactivated successfully. Apr 12 22:00:42.502023 systemd-networkd[1000]: cali4cfa71e4038: Link UP Apr 12 22:00:42.557347 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 22:00:42.557375 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4cfa71e4038: link becomes ready Apr 12 22:00:42.557339 systemd-networkd[1000]: cali4cfa71e4038: Gained carrier Apr 12 22:00:42.574408 env[1160]: 2024-04-12 22:00:42.392 [INFO][2603] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.7-k8s-csi--node--driver--r6cqh-eth0 csi-node-driver- calico-system a095c897-f494-4339-b464-5f055f671010 2455 0 2024-04-12 22:00:16 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.7 csi-node-driver-r6cqh eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali4cfa71e4038 [] []}} ContainerID="96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee" Namespace="calico-system" Pod="csi-node-driver-r6cqh" WorkloadEndpoint="10.67.80.7-k8s-csi--node--driver--r6cqh-" Apr 12 22:00:42.574408 env[1160]: 2024-04-12 22:00:42.392 [INFO][2603] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee" Namespace="calico-system" Pod="csi-node-driver-r6cqh" WorkloadEndpoint="10.67.80.7-k8s-csi--node--driver--r6cqh-eth0" Apr 12 22:00:42.574408 env[1160]: 2024-04-12 22:00:42.410 [INFO][2621] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee" HandleID="k8s-pod-network.96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee" Workload="10.67.80.7-k8s-csi--node--driver--r6cqh-eth0" Apr 12 22:00:42.574408 env[1160]: 2024-04-12 22:00:42.433 [INFO][2621] ipam_plugin.go 268: Auto assigning IP ContainerID="96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee" HandleID="k8s-pod-network.96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee" Workload="10.67.80.7-k8s-csi--node--driver--r6cqh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00079cff0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.80.7", "pod":"csi-node-driver-r6cqh", "timestamp":"2024-04-12 22:00:42.410511481 +0000 UTC"}, Hostname:"10.67.80.7", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 22:00:42.574408 env[1160]: 2024-04-12 22:00:42.434 [INFO][2621] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 22:00:42.574408 env[1160]: 2024-04-12 22:00:42.434 [INFO][2621] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 22:00:42.574408 env[1160]: 2024-04-12 22:00:42.434 [INFO][2621] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.7' Apr 12 22:00:42.574408 env[1160]: 2024-04-12 22:00:42.438 [INFO][2621] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee" host="10.67.80.7" Apr 12 22:00:42.574408 env[1160]: 2024-04-12 22:00:42.447 [INFO][2621] ipam.go 372: Looking up existing affinities for host host="10.67.80.7" Apr 12 22:00:42.574408 env[1160]: 2024-04-12 22:00:42.458 [INFO][2621] ipam.go 489: Trying affinity for 192.168.30.0/26 host="10.67.80.7" Apr 12 22:00:42.574408 env[1160]: 2024-04-12 22:00:42.462 [INFO][2621] ipam.go 155: Attempting to load block cidr=192.168.30.0/26 host="10.67.80.7" Apr 12 22:00:42.574408 env[1160]: 2024-04-12 22:00:42.468 [INFO][2621] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.30.0/26 host="10.67.80.7" Apr 12 22:00:42.574408 env[1160]: 2024-04-12 22:00:42.468 [INFO][2621] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.30.0/26 handle="k8s-pod-network.96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee" host="10.67.80.7" Apr 12 22:00:42.574408 env[1160]: 2024-04-12 22:00:42.472 [INFO][2621] ipam.go 1682: Creating new handle: k8s-pod-network.96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee Apr 12 22:00:42.574408 env[1160]: 2024-04-12 22:00:42.480 [INFO][2621] ipam.go 1203: Writing block in order to claim IPs block=192.168.30.0/26 handle="k8s-pod-network.96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee" host="10.67.80.7" Apr 12 22:00:42.574408 env[1160]: 2024-04-12 22:00:42.490 [INFO][2621] ipam.go 1216: Successfully claimed IPs: [192.168.30.1/26] block=192.168.30.0/26 handle="k8s-pod-network.96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee" host="10.67.80.7" Apr 12 22:00:42.574408 env[1160]: 2024-04-12 22:00:42.491 [INFO][2621] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.30.1/26] handle="k8s-pod-network.96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee" host="10.67.80.7" Apr 12 22:00:42.574408 env[1160]: 2024-04-12 22:00:42.491 [INFO][2621] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 22:00:42.574408 env[1160]: 2024-04-12 22:00:42.491 [INFO][2621] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.30.1/26] IPv6=[] ContainerID="96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee" HandleID="k8s-pod-network.96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee" Workload="10.67.80.7-k8s-csi--node--driver--r6cqh-eth0" Apr 12 22:00:42.574769 env[1160]: 2024-04-12 22:00:42.498 [INFO][2603] k8s.go 385: Populated endpoint ContainerID="96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee" Namespace="calico-system" Pod="csi-node-driver-r6cqh" WorkloadEndpoint="10.67.80.7-k8s-csi--node--driver--r6cqh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.7-k8s-csi--node--driver--r6cqh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a095c897-f494-4339-b464-5f055f671010", ResourceVersion:"2455", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 22, 0, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.7", ContainerID:"", Pod:"csi-node-driver-r6cqh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.30.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali4cfa71e4038", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 22:00:42.574769 env[1160]: 2024-04-12 22:00:42.499 [INFO][2603] k8s.go 386: Calico CNI using IPs: [192.168.30.1/32] ContainerID="96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee" Namespace="calico-system" Pod="csi-node-driver-r6cqh" WorkloadEndpoint="10.67.80.7-k8s-csi--node--driver--r6cqh-eth0" Apr 12 22:00:42.574769 env[1160]: 2024-04-12 22:00:42.499 [INFO][2603] dataplane_linux.go 68: Setting the host side veth name to cali4cfa71e4038 ContainerID="96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee" Namespace="calico-system" Pod="csi-node-driver-r6cqh" WorkloadEndpoint="10.67.80.7-k8s-csi--node--driver--r6cqh-eth0" Apr 12 22:00:42.574769 env[1160]: 2024-04-12 22:00:42.557 [INFO][2603] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee" Namespace="calico-system" Pod="csi-node-driver-r6cqh" WorkloadEndpoint="10.67.80.7-k8s-csi--node--driver--r6cqh-eth0" Apr 12 22:00:42.574769 env[1160]: 2024-04-12 22:00:42.557 [INFO][2603] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee" Namespace="calico-system" Pod="csi-node-driver-r6cqh" WorkloadEndpoint="10.67.80.7-k8s-csi--node--driver--r6cqh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.7-k8s-csi--node--driver--r6cqh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a095c897-f494-4339-b464-5f055f671010", ResourceVersion:"2455", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 22, 0, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.7", ContainerID:"96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee", Pod:"csi-node-driver-r6cqh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.30.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali4cfa71e4038", MAC:"96:d6:a3:d3:ba:98", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 22:00:42.574769 env[1160]: 2024-04-12 22:00:42.573 [INFO][2603] k8s.go 498: Wrote updated endpoint to datastore ContainerID="96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee" Namespace="calico-system" Pod="csi-node-driver-r6cqh" WorkloadEndpoint="10.67.80.7-k8s-csi--node--driver--r6cqh-eth0" Apr 12 22:00:42.580196 env[1160]: time="2024-04-12T22:00:42.580161123Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 22:00:42.580196 env[1160]: time="2024-04-12T22:00:42.580183510Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 22:00:42.580196 env[1160]: time="2024-04-12T22:00:42.580193407Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 22:00:42.580306 env[1160]: time="2024-04-12T22:00:42.580255561Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee pid=2666 runtime=io.containerd.runc.v2 Apr 12 22:00:42.580000 audit[2671]: NETFILTER_CFG table=filter:69 family=2 entries=36 op=nft_register_chain pid=2671 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 22:00:42.586129 systemd[1]: Started cri-containerd-96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee.scope. Apr 12 22:00:42.606869 kernel: kauditd_printk_skb: 157 callbacks suppressed Apr 12 22:00:42.606898 kernel: audit: type=1325 audit(1712959242.580:666): table=filter:69 family=2 entries=36 op=nft_register_chain pid=2671 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 22:00:42.580000 audit[2671]: SYSCALL arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7ffc767f5b80 a2=0 a3=7ffc767f5b6c items=0 ppid=2307 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:42.758567 kernel: audit: type=1300 audit(1712959242.580:666): arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7ffc767f5b80 a2=0 a3=7ffc767f5b6c items=0 ppid=2307 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:42.758609 kernel: audit: type=1327 audit(1712959242.580:666): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 22:00:42.580000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 22:00:42.818440 kernel: audit: type=1400 audit(1712959242.670:667): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.879868 kernel: audit: type=1400 audit(1712959242.670:668): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.941322 kernel: audit: type=1400 audit(1712959242.670:669): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.002717 kernel: audit: type=1400 audit(1712959242.670:670): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.064466 kernel: audit: type=1400 audit(1712959242.670:671): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.126235 kernel: audit: type=1400 audit(1712959242.670:672): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.159910 kubelet[1543]: E0412 22:00:43.159870 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:43.188204 kernel: audit: type=1400 audit(1712959242.670:673): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.879000 audit: BPF prog-id=89 op=LOAD Apr 12 22:00:42.879000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.879000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2666 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:42.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936666361316161663934316563303963386464626265613638363638 Apr 12 22:00:42.879000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.879000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2666 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:42.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936666361316161663934316563303963386464626265613638363638 Apr 12 22:00:42.879000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.879000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.879000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.879000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.879000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.879000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.879000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.879000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.879000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.879000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:42.879000 audit: BPF prog-id=90 op=LOAD Apr 12 22:00:42.879000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003b6260 items=0 ppid=2666 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:42.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936666361316161663934316563303963386464626265613638363638 Apr 12 22:00:43.063000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.063000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.063000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.063000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.063000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.063000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.063000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.063000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.063000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.063000 audit: BPF prog-id=91 op=LOAD Apr 12 22:00:43.063000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003b62a8 items=0 ppid=2666 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:43.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936666361316161663934316563303963386464626265613638363638 Apr 12 22:00:43.187000 audit: BPF prog-id=91 op=UNLOAD Apr 12 22:00:43.187000 audit: BPF prog-id=90 op=UNLOAD Apr 12 22:00:43.187000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.187000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.187000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.187000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.187000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.187000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.187000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.187000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.187000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.187000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:43.187000 audit: BPF prog-id=92 op=LOAD Apr 12 22:00:43.187000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b66b8 items=0 ppid=2666 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:43.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936666361316161663934316563303963386464626265613638363638 Apr 12 22:00:43.254741 env[1160]: time="2024-04-12T22:00:43.254717134Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r6cqh,Uid:a095c897-f494-4339-b464-5f055f671010,Namespace:calico-system,Attempt:1,} returns sandbox id \"96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee\"" Apr 12 22:00:43.255336 env[1160]: time="2024-04-12T22:00:43.255325104Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 22:00:44.160496 kubelet[1543]: E0412 22:00:44.160391 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:44.580956 systemd-networkd[1000]: cali4cfa71e4038: Gained IPv6LL Apr 12 22:00:44.651120 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount177056214.mount: Deactivated successfully. Apr 12 22:00:45.160736 kubelet[1543]: E0412 22:00:45.160678 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:45.170330 env[1160]: time="2024-04-12T22:00:45.170269763Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:45.170916 env[1160]: time="2024-04-12T22:00:45.170871949Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:45.171697 env[1160]: time="2024-04-12T22:00:45.171685597Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:45.172636 env[1160]: time="2024-04-12T22:00:45.172622553Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:45.172995 env[1160]: time="2024-04-12T22:00:45.172964967Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\"" Apr 12 22:00:45.174073 env[1160]: time="2024-04-12T22:00:45.174058729Z" level=info msg="CreateContainer within sandbox \"96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 22:00:45.179503 env[1160]: time="2024-04-12T22:00:45.179467993Z" level=info msg="CreateContainer within sandbox \"96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"d5ad8b5db5515bea52290eb31f9a9e9668933bee7d0aa5e5ccbb93f1c66cbfe2\"" Apr 12 22:00:45.179808 env[1160]: time="2024-04-12T22:00:45.179768007Z" level=info msg="StartContainer for \"d5ad8b5db5515bea52290eb31f9a9e9668933bee7d0aa5e5ccbb93f1c66cbfe2\"" Apr 12 22:00:45.188402 systemd[1]: Started cri-containerd-d5ad8b5db5515bea52290eb31f9a9e9668933bee7d0aa5e5ccbb93f1c66cbfe2.scope. Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa8d4714d58 items=0 ppid=2666 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:45.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435616438623564623535313562656135323239306562333166396139 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit: BPF prog-id=93 op=LOAD Apr 12 22:00:45.195000 audit[2714]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002f3c58 items=0 ppid=2666 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:45.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435616438623564623535313562656135323239306562333166396139 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit: BPF prog-id=94 op=LOAD Apr 12 22:00:45.195000 audit[2714]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002f3ca8 items=0 ppid=2666 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:45.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435616438623564623535313562656135323239306562333166396139 Apr 12 22:00:45.195000 audit: BPF prog-id=94 op=UNLOAD Apr 12 22:00:45.195000 audit: BPF prog-id=93 op=UNLOAD Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:45.195000 audit: BPF prog-id=95 op=LOAD Apr 12 22:00:45.195000 audit[2714]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002f3d38 items=0 ppid=2666 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:45.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435616438623564623535313562656135323239306562333166396139 Apr 12 22:00:45.201968 env[1160]: time="2024-04-12T22:00:45.201915264Z" level=info msg="StartContainer for \"d5ad8b5db5515bea52290eb31f9a9e9668933bee7d0aa5e5ccbb93f1c66cbfe2\" returns successfully" Apr 12 22:00:45.202536 env[1160]: time="2024-04-12T22:00:45.202496416Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 22:00:46.160889 kubelet[1543]: E0412 22:00:46.160793 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:47.131540 env[1160]: time="2024-04-12T22:00:47.131477194Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:47.132179 env[1160]: time="2024-04-12T22:00:47.132144950Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:47.132830 env[1160]: time="2024-04-12T22:00:47.132782524Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:47.133572 env[1160]: time="2024-04-12T22:00:47.133532685Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:47.133957 env[1160]: time="2024-04-12T22:00:47.133906010Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\"" Apr 12 22:00:47.134905 env[1160]: time="2024-04-12T22:00:47.134870513Z" level=info msg="CreateContainer within sandbox \"96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 22:00:47.140880 env[1160]: time="2024-04-12T22:00:47.140834954Z" level=info msg="CreateContainer within sandbox \"96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"b43b26d8b138677f4f09e31613f08530961a39b489d00f914dc1fa78400e24d3\"" Apr 12 22:00:47.141140 env[1160]: time="2024-04-12T22:00:47.141124467Z" level=info msg="StartContainer for \"b43b26d8b138677f4f09e31613f08530961a39b489d00f914dc1fa78400e24d3\"" Apr 12 22:00:47.150917 systemd[1]: Started cri-containerd-b43b26d8b138677f4f09e31613f08530961a39b489d00f914dc1fa78400e24d3.scope. Apr 12 22:00:47.157000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.157000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f20dfacfaa8 items=0 ppid=2666 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:47.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234336232366438623133383637376634663039653331363133663038 Apr 12 22:00:47.157000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.157000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.157000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.157000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.157000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.157000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.157000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.157000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.157000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.157000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.157000 audit: BPF prog-id=96 op=LOAD Apr 12 22:00:47.157000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d7ba8 items=0 ppid=2666 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:47.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234336232366438623133383637376634663039653331363133663038 Apr 12 22:00:47.157000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.157000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.157000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.157000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.157000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.157000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.157000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.157000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.157000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.157000 audit: BPF prog-id=97 op=LOAD Apr 12 22:00:47.157000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d7bf8 items=0 ppid=2666 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:47.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234336232366438623133383637376634663039653331363133663038 Apr 12 22:00:47.157000 audit: BPF prog-id=97 op=UNLOAD Apr 12 22:00:47.158000 audit: BPF prog-id=96 op=UNLOAD Apr 12 22:00:47.158000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.158000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.158000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.158000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.158000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.158000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.158000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.158000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.158000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.158000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.158000 audit: BPF prog-id=98 op=LOAD Apr 12 22:00:47.158000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000d7c88 items=0 ppid=2666 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:47.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234336232366438623133383637376634663039653331363133663038 Apr 12 22:00:47.160968 kubelet[1543]: E0412 22:00:47.160957 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:47.164432 env[1160]: time="2024-04-12T22:00:47.164399501Z" level=info msg="StartContainer for \"b43b26d8b138677f4f09e31613f08530961a39b489d00f914dc1fa78400e24d3\" returns successfully" Apr 12 22:00:47.219370 kubelet[1543]: I0412 22:00:47.219349 1543 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 22:00:47.219370 kubelet[1543]: I0412 22:00:47.219374 1543 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 22:00:47.288514 env[1160]: time="2024-04-12T22:00:47.288411292Z" level=info msg="StopPodSandbox for \"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\"" Apr 12 22:00:47.371286 env[1160]: 2024-04-12 22:00:47.342 [INFO][2794] k8s.go 585: Cleaning up netns ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Apr 12 22:00:47.371286 env[1160]: 2024-04-12 22:00:47.343 [INFO][2794] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" iface="eth0" netns="/var/run/netns/cni-ae4767c0-e1db-513c-cb27-be989ee490f0" Apr 12 22:00:47.371286 env[1160]: 2024-04-12 22:00:47.343 [INFO][2794] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" iface="eth0" netns="/var/run/netns/cni-ae4767c0-e1db-513c-cb27-be989ee490f0" Apr 12 22:00:47.371286 env[1160]: 2024-04-12 22:00:47.343 [INFO][2794] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" iface="eth0" netns="/var/run/netns/cni-ae4767c0-e1db-513c-cb27-be989ee490f0" Apr 12 22:00:47.371286 env[1160]: 2024-04-12 22:00:47.344 [INFO][2794] k8s.go 592: Releasing IP address(es) ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Apr 12 22:00:47.371286 env[1160]: 2024-04-12 22:00:47.344 [INFO][2794] utils.go 188: Calico CNI releasing IP address ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Apr 12 22:00:47.371286 env[1160]: 2024-04-12 22:00:47.359 [INFO][2809] ipam_plugin.go 415: Releasing address using handleID ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" HandleID="k8s-pod-network.b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Workload="10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0" Apr 12 22:00:47.371286 env[1160]: 2024-04-12 22:00:47.359 [INFO][2809] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 22:00:47.371286 env[1160]: 2024-04-12 22:00:47.359 [INFO][2809] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 22:00:47.371286 env[1160]: 2024-04-12 22:00:47.368 [WARNING][2809] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" HandleID="k8s-pod-network.b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Workload="10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0" Apr 12 22:00:47.371286 env[1160]: 2024-04-12 22:00:47.368 [INFO][2809] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" HandleID="k8s-pod-network.b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Workload="10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0" Apr 12 22:00:47.371286 env[1160]: 2024-04-12 22:00:47.369 [INFO][2809] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 22:00:47.371286 env[1160]: 2024-04-12 22:00:47.370 [INFO][2794] k8s.go 598: Teardown processing complete. ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Apr 12 22:00:47.371637 env[1160]: time="2024-04-12T22:00:47.371383789Z" level=info msg="TearDown network for sandbox \"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\" successfully" Apr 12 22:00:47.371637 env[1160]: time="2024-04-12T22:00:47.371409876Z" level=info msg="StopPodSandbox for \"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\" returns successfully" Apr 12 22:00:47.371897 env[1160]: time="2024-04-12T22:00:47.371849253Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-hwj6q,Uid:5d10b781-2cb7-48ad-8603-e0eed309a7b0,Namespace:default,Attempt:1,}" Apr 12 22:00:47.372637 systemd[1]: run-netns-cni\x2dae4767c0\x2de1db\x2d513c\x2dcb27\x2dbe989ee490f0.mount: Deactivated successfully. Apr 12 22:00:47.385543 kubelet[1543]: I0412 22:00:47.385465 1543 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-r6cqh" podStartSLOduration=27.506536457 podCreationTimestamp="2024-04-12 22:00:16 +0000 UTC" firstStartedPulling="2024-04-12 22:00:43.255207853 +0000 UTC m=+27.512831172" lastFinishedPulling="2024-04-12 22:00:47.134115373 +0000 UTC m=+31.391738696" observedRunningTime="2024-04-12 22:00:47.385179622 +0000 UTC m=+31.642802944" watchObservedRunningTime="2024-04-12 22:00:47.385443981 +0000 UTC m=+31.643067300" Apr 12 22:00:47.488235 systemd-networkd[1000]: cali3690a681b5d: Link UP Apr 12 22:00:47.554192 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 22:00:47.554235 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3690a681b5d: link becomes ready Apr 12 22:00:47.554250 systemd-networkd[1000]: cali3690a681b5d: Gained carrier Apr 12 22:00:47.564984 env[1160]: 2024-04-12 22:00:47.396 [INFO][2823] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0 nginx-deployment-6d5f899847- default 5d10b781-2cb7-48ad-8603-e0eed309a7b0 2480 0 2024-04-12 22:00:33 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.7 nginx-deployment-6d5f899847-hwj6q eth0 default [] [] [kns.default ksa.default.default] cali3690a681b5d [] []}} ContainerID="fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694" Namespace="default" Pod="nginx-deployment-6d5f899847-hwj6q" WorkloadEndpoint="10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-" Apr 12 22:00:47.564984 env[1160]: 2024-04-12 22:00:47.396 [INFO][2823] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694" Namespace="default" Pod="nginx-deployment-6d5f899847-hwj6q" WorkloadEndpoint="10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0" Apr 12 22:00:47.564984 env[1160]: 2024-04-12 22:00:47.411 [INFO][2844] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694" HandleID="k8s-pod-network.fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694" Workload="10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0" Apr 12 22:00:47.564984 env[1160]: 2024-04-12 22:00:47.422 [INFO][2844] ipam_plugin.go 268: Auto assigning IP ContainerID="fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694" HandleID="k8s-pod-network.fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694" Workload="10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bd5b0), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.7", "pod":"nginx-deployment-6d5f899847-hwj6q", "timestamp":"2024-04-12 22:00:47.411848842 +0000 UTC"}, Hostname:"10.67.80.7", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 22:00:47.564984 env[1160]: 2024-04-12 22:00:47.422 [INFO][2844] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 22:00:47.564984 env[1160]: 2024-04-12 22:00:47.422 [INFO][2844] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 22:00:47.564984 env[1160]: 2024-04-12 22:00:47.422 [INFO][2844] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.7' Apr 12 22:00:47.564984 env[1160]: 2024-04-12 22:00:47.426 [INFO][2844] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694" host="10.67.80.7" Apr 12 22:00:47.564984 env[1160]: 2024-04-12 22:00:47.435 [INFO][2844] ipam.go 372: Looking up existing affinities for host host="10.67.80.7" Apr 12 22:00:47.564984 env[1160]: 2024-04-12 22:00:47.446 [INFO][2844] ipam.go 489: Trying affinity for 192.168.30.0/26 host="10.67.80.7" Apr 12 22:00:47.564984 env[1160]: 2024-04-12 22:00:47.450 [INFO][2844] ipam.go 155: Attempting to load block cidr=192.168.30.0/26 host="10.67.80.7" Apr 12 22:00:47.564984 env[1160]: 2024-04-12 22:00:47.456 [INFO][2844] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.30.0/26 host="10.67.80.7" Apr 12 22:00:47.564984 env[1160]: 2024-04-12 22:00:47.456 [INFO][2844] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.30.0/26 handle="k8s-pod-network.fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694" host="10.67.80.7" Apr 12 22:00:47.564984 env[1160]: 2024-04-12 22:00:47.460 [INFO][2844] ipam.go 1682: Creating new handle: k8s-pod-network.fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694 Apr 12 22:00:47.564984 env[1160]: 2024-04-12 22:00:47.469 [INFO][2844] ipam.go 1203: Writing block in order to claim IPs block=192.168.30.0/26 handle="k8s-pod-network.fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694" host="10.67.80.7" Apr 12 22:00:47.564984 env[1160]: 2024-04-12 22:00:47.480 [INFO][2844] ipam.go 1216: Successfully claimed IPs: [192.168.30.2/26] block=192.168.30.0/26 handle="k8s-pod-network.fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694" host="10.67.80.7" Apr 12 22:00:47.564984 env[1160]: 2024-04-12 22:00:47.481 [INFO][2844] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.30.2/26] handle="k8s-pod-network.fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694" host="10.67.80.7" Apr 12 22:00:47.564984 env[1160]: 2024-04-12 22:00:47.481 [INFO][2844] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 22:00:47.564984 env[1160]: 2024-04-12 22:00:47.481 [INFO][2844] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.30.2/26] IPv6=[] ContainerID="fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694" HandleID="k8s-pod-network.fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694" Workload="10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0" Apr 12 22:00:47.565622 env[1160]: 2024-04-12 22:00:47.484 [INFO][2823] k8s.go 385: Populated endpoint ContainerID="fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694" Namespace="default" Pod="nginx-deployment-6d5f899847-hwj6q" WorkloadEndpoint="10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"5d10b781-2cb7-48ad-8603-e0eed309a7b0", ResourceVersion:"2480", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 22, 0, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.7", ContainerID:"", Pod:"nginx-deployment-6d5f899847-hwj6q", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.30.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3690a681b5d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 22:00:47.565622 env[1160]: 2024-04-12 22:00:47.484 [INFO][2823] k8s.go 386: Calico CNI using IPs: [192.168.30.2/32] ContainerID="fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694" Namespace="default" Pod="nginx-deployment-6d5f899847-hwj6q" WorkloadEndpoint="10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0" Apr 12 22:00:47.565622 env[1160]: 2024-04-12 22:00:47.485 [INFO][2823] dataplane_linux.go 68: Setting the host side veth name to cali3690a681b5d ContainerID="fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694" Namespace="default" Pod="nginx-deployment-6d5f899847-hwj6q" WorkloadEndpoint="10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0" Apr 12 22:00:47.565622 env[1160]: 2024-04-12 22:00:47.554 [INFO][2823] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694" Namespace="default" Pod="nginx-deployment-6d5f899847-hwj6q" WorkloadEndpoint="10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0" Apr 12 22:00:47.565622 env[1160]: 2024-04-12 22:00:47.554 [INFO][2823] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694" Namespace="default" Pod="nginx-deployment-6d5f899847-hwj6q" WorkloadEndpoint="10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"5d10b781-2cb7-48ad-8603-e0eed309a7b0", ResourceVersion:"2480", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 22, 0, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.7", ContainerID:"fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694", Pod:"nginx-deployment-6d5f899847-hwj6q", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.30.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3690a681b5d", MAC:"4e:07:2f:ca:ee:8b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 22:00:47.565622 env[1160]: 2024-04-12 22:00:47.564 [INFO][2823] k8s.go 498: Wrote updated endpoint to datastore ContainerID="fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694" Namespace="default" Pod="nginx-deployment-6d5f899847-hwj6q" WorkloadEndpoint="10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0" Apr 12 22:00:47.570675 env[1160]: time="2024-04-12T22:00:47.570642263Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 22:00:47.570675 env[1160]: time="2024-04-12T22:00:47.570662705Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 22:00:47.570675 env[1160]: time="2024-04-12T22:00:47.570669501Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 22:00:47.570788 env[1160]: time="2024-04-12T22:00:47.570740665Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694 pid=2881 runtime=io.containerd.runc.v2 Apr 12 22:00:47.572000 audit[2892]: NETFILTER_CFG table=filter:70 family=2 entries=40 op=nft_register_chain pid=2892 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 22:00:47.572000 audit[2892]: SYSCALL arch=c000003e syscall=46 success=yes exit=21560 a0=3 a1=7ffdb812c720 a2=0 a3=7ffdb812c70c items=0 ppid=2307 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:47.572000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 22:00:47.576199 systemd[1]: Started cri-containerd-fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694.scope. Apr 12 22:00:47.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.607296 kernel: kauditd_printk_skb: 139 callbacks suppressed Apr 12 22:00:47.607330 kernel: audit: type=1400 audit(1712959247.581:698): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.728310 kernel: audit: type=1400 audit(1712959247.581:699): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.728347 kernel: audit: type=1400 audit(1712959247.581:700): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.788788 kernel: audit: type=1400 audit(1712959247.581:701): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.849636 kernel: audit: type=1400 audit(1712959247.581:702): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.910719 kernel: audit: type=1400 audit(1712959247.581:703): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:48.032951 kernel: audit: type=1400 audit(1712959247.581:704): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:48.032982 kernel: audit: type=1400 audit(1712959247.581:705): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:48.093991 kernel: audit: type=1400 audit(1712959247.581:706): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:48.154794 kernel: audit: type=1400 audit(1712959247.667:707): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:48.161954 kubelet[1543]: E0412 22:00:48.161942 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:47.667000 audit: BPF prog-id=99 op=LOAD Apr 12 22:00:47.667000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.667000 audit[2891]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2881 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:47.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661366361326166353538323035356538363834383336313066303866 Apr 12 22:00:47.667000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.667000 audit[2891]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2881 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:47.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661366361326166353538323035356538363834383336313066303866 Apr 12 22:00:47.667000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.667000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.667000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.667000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.667000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.667000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.667000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.667000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.667000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.667000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.667000 audit: BPF prog-id=100 op=LOAD Apr 12 22:00:47.667000 audit[2891]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001f9d90 items=0 ppid=2881 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:47.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661366361326166353538323035356538363834383336313066303866 Apr 12 22:00:47.787000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.787000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.787000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.787000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.787000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.787000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.787000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.787000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.787000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.787000 audit: BPF prog-id=101 op=LOAD Apr 12 22:00:47.787000 audit[2891]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001f9dd8 items=0 ppid=2881 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:47.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661366361326166353538323035356538363834383336313066303866 Apr 12 22:00:47.910000 audit: BPF prog-id=101 op=UNLOAD Apr 12 22:00:47.910000 audit: BPF prog-id=100 op=UNLOAD Apr 12 22:00:47.910000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.910000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.910000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.910000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.910000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.910000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.910000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.910000 audit[2891]: AVC avc: denied { perfmon } for pid=2891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.910000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.910000 audit[2891]: AVC avc: denied { bpf } for pid=2891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:47.910000 audit: BPF prog-id=102 op=LOAD Apr 12 22:00:47.910000 audit[2891]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003ee1e8 items=0 ppid=2881 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:47.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661366361326166353538323035356538363834383336313066303866 Apr 12 22:00:48.231452 env[1160]: time="2024-04-12T22:00:48.231424737Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-hwj6q,Uid:5d10b781-2cb7-48ad-8603-e0eed309a7b0,Namespace:default,Attempt:1,} returns sandbox id \"fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694\"" Apr 12 22:00:48.232090 env[1160]: time="2024-04-12T22:00:48.232078363Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 22:00:49.162528 kubelet[1543]: E0412 22:00:49.162415 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:49.322184 update_engine[1152]: I0412 22:00:49.322073 1152 update_attempter.cc:509] Updating boot flags... Apr 12 22:00:49.509032 systemd-networkd[1000]: cali3690a681b5d: Gained IPv6LL Apr 12 22:00:50.162820 kubelet[1543]: E0412 22:00:50.162798 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:50.993525 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2001851338.mount: Deactivated successfully. Apr 12 22:00:51.163942 kubelet[1543]: E0412 22:00:51.163892 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:51.520234 env[1160]: time="2024-04-12T22:00:51.520187676Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:51.520837 env[1160]: time="2024-04-12T22:00:51.520800269Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:51.521804 env[1160]: time="2024-04-12T22:00:51.521761513Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:51.522768 env[1160]: time="2024-04-12T22:00:51.522729420Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:00:51.523149 env[1160]: time="2024-04-12T22:00:51.523104728Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83\"" Apr 12 22:00:51.524304 env[1160]: time="2024-04-12T22:00:51.524288572Z" level=info msg="CreateContainer within sandbox \"fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Apr 12 22:00:51.528844 env[1160]: time="2024-04-12T22:00:51.528826611Z" level=info msg="CreateContainer within sandbox \"fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"b79d70921af75258280d56c3384e84830088e28a4a47fb914725a79a229bbd44\"" Apr 12 22:00:51.529205 env[1160]: time="2024-04-12T22:00:51.529133823Z" level=info msg="StartContainer for \"b79d70921af75258280d56c3384e84830088e28a4a47fb914725a79a229bbd44\"" Apr 12 22:00:51.538520 systemd[1]: Started cri-containerd-b79d70921af75258280d56c3384e84830088e28a4a47fb914725a79a229bbd44.scope. Apr 12 22:00:51.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit: BPF prog-id=103 op=LOAD Apr 12 22:00:51.542000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit[2950]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2881 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:51.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237396437303932316166373532353832383064353663333338346538 Apr 12 22:00:51.542000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit[2950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2881 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:51.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237396437303932316166373532353832383064353663333338346538 Apr 12 22:00:51.542000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.542000 audit: BPF prog-id=104 op=LOAD Apr 12 22:00:51.542000 audit[2950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d20d0 items=0 ppid=2881 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:51.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237396437303932316166373532353832383064353663333338346538 Apr 12 22:00:51.543000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.543000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.543000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.543000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.543000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.543000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.543000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.543000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.543000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.543000 audit: BPF prog-id=105 op=LOAD Apr 12 22:00:51.543000 audit[2950]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d2118 items=0 ppid=2881 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:51.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237396437303932316166373532353832383064353663333338346538 Apr 12 22:00:51.543000 audit: BPF prog-id=105 op=UNLOAD Apr 12 22:00:51.543000 audit: BPF prog-id=104 op=UNLOAD Apr 12 22:00:51.543000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.543000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.543000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.543000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.543000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.543000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.543000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.543000 audit[2950]: AVC avc: denied { perfmon } for pid=2950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.543000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.543000 audit[2950]: AVC avc: denied { bpf } for pid=2950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:51.543000 audit: BPF prog-id=106 op=LOAD Apr 12 22:00:51.543000 audit[2950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d2528 items=0 ppid=2881 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:51.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237396437303932316166373532353832383064353663333338346538 Apr 12 22:00:51.550688 env[1160]: time="2024-04-12T22:00:51.550667773Z" level=info msg="StartContainer for \"b79d70921af75258280d56c3384e84830088e28a4a47fb914725a79a229bbd44\" returns successfully" Apr 12 22:00:52.164599 kubelet[1543]: E0412 22:00:52.164492 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:52.410103 kubelet[1543]: I0412 22:00:52.410011 1543 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-hwj6q" podStartSLOduration=16.118617591 podCreationTimestamp="2024-04-12 22:00:33 +0000 UTC" firstStartedPulling="2024-04-12 22:00:48.231961599 +0000 UTC m=+32.489584921" lastFinishedPulling="2024-04-12 22:00:51.52327967 +0000 UTC m=+35.780902992" observedRunningTime="2024-04-12 22:00:52.409475896 +0000 UTC m=+36.667099285" watchObservedRunningTime="2024-04-12 22:00:52.409935662 +0000 UTC m=+36.667559029" Apr 12 22:00:53.164947 kubelet[1543]: E0412 22:00:53.164833 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:54.165607 kubelet[1543]: E0412 22:00:54.165493 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:55.166245 kubelet[1543]: E0412 22:00:55.166132 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:56.142400 kubelet[1543]: E0412 22:00:56.142294 1543 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:56.167260 kubelet[1543]: E0412 22:00:56.167150 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:56.368000 audit[3040]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=3040 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:00:56.373556 kubelet[1543]: I0412 22:00:56.373543 1543 topology_manager.go:215] "Topology Admit Handler" podUID="3b1dc64f-c0e6-4697-8926-7b7ad5a33fff" podNamespace="default" podName="nfs-server-provisioner-0" Apr 12 22:00:56.377047 systemd[1]: Created slice kubepods-besteffort-pod3b1dc64f_c0e6_4697_8926_7b7ad5a33fff.slice. Apr 12 22:00:56.395302 kernel: kauditd_printk_skb: 104 callbacks suppressed Apr 12 22:00:56.395346 kernel: audit: type=1325 audit(1712959256.368:734): table=filter:71 family=2 entries=20 op=nft_register_rule pid=3040 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:00:56.446436 kubelet[1543]: I0412 22:00:56.446399 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/3b1dc64f-c0e6-4697-8926-7b7ad5a33fff-data\") pod \"nfs-server-provisioner-0\" (UID: \"3b1dc64f-c0e6-4697-8926-7b7ad5a33fff\") " pod="default/nfs-server-provisioner-0" Apr 12 22:00:56.446436 kubelet[1543]: I0412 22:00:56.446419 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2xkhg\" (UniqueName: \"kubernetes.io/projected/3b1dc64f-c0e6-4697-8926-7b7ad5a33fff-kube-api-access-2xkhg\") pod \"nfs-server-provisioner-0\" (UID: \"3b1dc64f-c0e6-4697-8926-7b7ad5a33fff\") " pod="default/nfs-server-provisioner-0" Apr 12 22:00:56.368000 audit[3040]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff1d561150 a2=0 a3=7fff1d56113c items=0 ppid=1767 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:56.551398 kernel: audit: type=1300 audit(1712959256.368:734): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff1d561150 a2=0 a3=7fff1d56113c items=0 ppid=1767 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:56.551427 kernel: audit: type=1327 audit(1712959256.368:734): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:00:56.368000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:00:56.614000 audit[3040]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=3040 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:00:56.614000 audit[3040]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff1d561150 a2=0 a3=0 items=0 ppid=1767 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:56.679144 env[1160]: time="2024-04-12T22:00:56.679079646Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:3b1dc64f-c0e6-4697-8926-7b7ad5a33fff,Namespace:default,Attempt:0,}" Apr 12 22:00:56.750120 systemd-networkd[1000]: cali60e51b789ff: Link UP Apr 12 22:00:56.769177 kernel: audit: type=1325 audit(1712959256.614:735): table=nat:72 family=2 entries=22 op=nft_register_rule pid=3040 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:00:56.769210 kernel: audit: type=1300 audit(1712959256.614:735): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff1d561150 a2=0 a3=0 items=0 ppid=1767 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:56.769229 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 22:00:56.769242 kernel: audit: type=1327 audit(1712959256.614:735): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:00:56.614000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:00:56.796479 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Apr 12 22:00:56.882357 systemd-networkd[1000]: cali60e51b789ff: Gained carrier Apr 12 22:00:56.886000 audit[3084]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=3084 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:00:56.888901 env[1160]: 2024-04-12 22:00:56.700 [INFO][3044] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.7-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 3b1dc64f-c0e6-4697-8926-7b7ad5a33fff 2534 0 2024-04-12 22:00:56 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.80.7 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.7-k8s-nfs--server--provisioner--0-" Apr 12 22:00:56.888901 env[1160]: 2024-04-12 22:00:56.701 [INFO][3044] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.7-k8s-nfs--server--provisioner--0-eth0" Apr 12 22:00:56.888901 env[1160]: 2024-04-12 22:00:56.715 [INFO][3065] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44" HandleID="k8s-pod-network.7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44" Workload="10.67.80.7-k8s-nfs--server--provisioner--0-eth0" Apr 12 22:00:56.888901 env[1160]: 2024-04-12 22:00:56.722 [INFO][3065] ipam_plugin.go 268: Auto assigning IP ContainerID="7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44" HandleID="k8s-pod-network.7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44" Workload="10.67.80.7-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003423e0), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.7", "pod":"nfs-server-provisioner-0", "timestamp":"2024-04-12 22:00:56.715151891 +0000 UTC"}, Hostname:"10.67.80.7", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 22:00:56.888901 env[1160]: 2024-04-12 22:00:56.722 [INFO][3065] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 22:00:56.888901 env[1160]: 2024-04-12 22:00:56.722 [INFO][3065] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 22:00:56.888901 env[1160]: 2024-04-12 22:00:56.722 [INFO][3065] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.7' Apr 12 22:00:56.888901 env[1160]: 2024-04-12 22:00:56.724 [INFO][3065] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44" host="10.67.80.7" Apr 12 22:00:56.888901 env[1160]: 2024-04-12 22:00:56.728 [INFO][3065] ipam.go 372: Looking up existing affinities for host host="10.67.80.7" Apr 12 22:00:56.888901 env[1160]: 2024-04-12 22:00:56.732 [INFO][3065] ipam.go 489: Trying affinity for 192.168.30.0/26 host="10.67.80.7" Apr 12 22:00:56.888901 env[1160]: 2024-04-12 22:00:56.734 [INFO][3065] ipam.go 155: Attempting to load block cidr=192.168.30.0/26 host="10.67.80.7" Apr 12 22:00:56.888901 env[1160]: 2024-04-12 22:00:56.736 [INFO][3065] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.30.0/26 host="10.67.80.7" Apr 12 22:00:56.888901 env[1160]: 2024-04-12 22:00:56.736 [INFO][3065] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.30.0/26 handle="k8s-pod-network.7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44" host="10.67.80.7" Apr 12 22:00:56.888901 env[1160]: 2024-04-12 22:00:56.738 [INFO][3065] ipam.go 1682: Creating new handle: k8s-pod-network.7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44 Apr 12 22:00:56.888901 env[1160]: 2024-04-12 22:00:56.742 [INFO][3065] ipam.go 1203: Writing block in order to claim IPs block=192.168.30.0/26 handle="k8s-pod-network.7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44" host="10.67.80.7" Apr 12 22:00:56.888901 env[1160]: 2024-04-12 22:00:56.748 [INFO][3065] ipam.go 1216: Successfully claimed IPs: [192.168.30.3/26] block=192.168.30.0/26 handle="k8s-pod-network.7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44" host="10.67.80.7" Apr 12 22:00:56.888901 env[1160]: 2024-04-12 22:00:56.748 [INFO][3065] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.30.3/26] handle="k8s-pod-network.7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44" host="10.67.80.7" Apr 12 22:00:56.888901 env[1160]: 2024-04-12 22:00:56.748 [INFO][3065] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 22:00:56.888901 env[1160]: 2024-04-12 22:00:56.748 [INFO][3065] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.30.3/26] IPv6=[] ContainerID="7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44" HandleID="k8s-pod-network.7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44" Workload="10.67.80.7-k8s-nfs--server--provisioner--0-eth0" Apr 12 22:00:56.889533 env[1160]: 2024-04-12 22:00:56.748 [INFO][3044] k8s.go 385: Populated endpoint ContainerID="7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.7-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.7-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"3b1dc64f-c0e6-4697-8926-7b7ad5a33fff", ResourceVersion:"2534", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 22, 0, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.7", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.30.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 22:00:56.889533 env[1160]: 2024-04-12 22:00:56.748 [INFO][3044] k8s.go 386: Calico CNI using IPs: [192.168.30.3/32] ContainerID="7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.7-k8s-nfs--server--provisioner--0-eth0" Apr 12 22:00:56.889533 env[1160]: 2024-04-12 22:00:56.748 [INFO][3044] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.7-k8s-nfs--server--provisioner--0-eth0" Apr 12 22:00:56.889533 env[1160]: 2024-04-12 22:00:56.882 [INFO][3044] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.7-k8s-nfs--server--provisioner--0-eth0" Apr 12 22:00:56.889731 env[1160]: 2024-04-12 22:00:56.883 [INFO][3044] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.7-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.7-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"3b1dc64f-c0e6-4697-8926-7b7ad5a33fff", ResourceVersion:"2534", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 22, 0, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.7", ContainerID:"7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.30.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"92:86:4e:fb:99:77", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 22:00:56.889731 env[1160]: 2024-04-12 22:00:56.888 [INFO][3044] k8s.go 498: Wrote updated endpoint to datastore ContainerID="7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.7-k8s-nfs--server--provisioner--0-eth0" Apr 12 22:00:56.894604 env[1160]: time="2024-04-12T22:00:56.894538623Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 22:00:56.894604 env[1160]: time="2024-04-12T22:00:56.894558701Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 22:00:56.894604 env[1160]: time="2024-04-12T22:00:56.894565173Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 22:00:56.894762 env[1160]: time="2024-04-12T22:00:56.894623712Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44 pid=3106 runtime=io.containerd.runc.v2 Apr 12 22:00:56.901599 systemd[1]: Started cri-containerd-7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44.scope. Apr 12 22:00:56.886000 audit[3084]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdd09db530 a2=0 a3=7ffdd09db51c items=0 ppid=1767 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:57.041073 kernel: audit: type=1325 audit(1712959256.886:736): table=filter:73 family=2 entries=32 op=nft_register_rule pid=3084 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:00:57.041151 kernel: audit: type=1300 audit(1712959256.886:736): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdd09db530 a2=0 a3=7ffdd09db51c items=0 ppid=1767 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:57.041196 kernel: audit: type=1327 audit(1712959256.886:736): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:00:56.886000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:00:56.949000 audit[3084]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=3084 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:00:57.098712 kernel: audit: type=1325 audit(1712959256.949:737): table=nat:74 family=2 entries=22 op=nft_register_rule pid=3084 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:00:56.949000 audit[3084]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdd09db530 a2=0 a3=0 items=0 ppid=1767 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:56.949000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:00:56.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:56.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:56.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:56.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:56.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:56.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:56.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:56.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:56.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.097000 audit: BPF prog-id=107 op=LOAD Apr 12 22:00:57.097000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.097000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3106 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:57.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766343563653439316130646464643563626630326238646638336666 Apr 12 22:00:57.097000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.097000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=3106 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:57.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766343563653439316130646464643563626630326238646638336666 Apr 12 22:00:57.097000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.097000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.097000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.097000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.097000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.097000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.097000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.097000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.097000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.097000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.097000 audit: BPF prog-id=108 op=LOAD Apr 12 22:00:57.097000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c0003da5a0 items=0 ppid=3106 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:57.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766343563653439316130646464643563626630326238646638336666 Apr 12 22:00:57.155000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.155000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.155000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.155000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.155000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.155000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.155000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.155000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.155000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.155000 audit: BPF prog-id=109 op=LOAD Apr 12 22:00:57.155000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c0003da5e8 items=0 ppid=3106 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:57.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766343563653439316130646464643563626630326238646638336666 Apr 12 22:00:57.155000 audit: BPF prog-id=109 op=UNLOAD Apr 12 22:00:57.155000 audit: BPF prog-id=108 op=UNLOAD Apr 12 22:00:57.155000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.155000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.155000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.155000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.155000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.155000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.155000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.155000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.155000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.155000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:00:57.155000 audit: BPF prog-id=110 op=LOAD Apr 12 22:00:57.155000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c0003da9f8 items=0 ppid=3106 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:57.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766343563653439316130646464643563626630326238646638336666 Apr 12 22:00:57.160000 audit[3133]: NETFILTER_CFG table=filter:75 family=2 entries=38 op=nft_register_chain pid=3133 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 22:00:57.160000 audit[3133]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffec8ba7620 a2=0 a3=7ffec8ba760c items=0 ppid=2307 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:00:57.160000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 22:00:57.167904 kubelet[1543]: E0412 22:00:57.167891 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:57.172423 env[1160]: time="2024-04-12T22:00:57.172401601Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:3b1dc64f-c0e6-4697-8926-7b7ad5a33fff,Namespace:default,Attempt:0,} returns sandbox id \"7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44\"" Apr 12 22:00:57.173097 env[1160]: time="2024-04-12T22:00:57.173082700Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Apr 12 22:00:58.168663 kubelet[1543]: E0412 22:00:58.168630 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:58.212918 systemd-networkd[1000]: cali60e51b789ff: Gained IPv6LL Apr 12 22:00:59.169413 kubelet[1543]: E0412 22:00:59.169389 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:00:59.212590 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2338397856.mount: Deactivated successfully. Apr 12 22:01:00.170307 kubelet[1543]: E0412 22:01:00.170285 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:01:00.380021 env[1160]: time="2024-04-12T22:01:00.379973892Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:01:00.380661 env[1160]: time="2024-04-12T22:01:00.380621335Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:01:00.381627 env[1160]: time="2024-04-12T22:01:00.381582638Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:01:00.382749 env[1160]: time="2024-04-12T22:01:00.382732521Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:01:00.383089 env[1160]: time="2024-04-12T22:01:00.383054422Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Apr 12 22:01:00.384282 env[1160]: time="2024-04-12T22:01:00.384234899Z" level=info msg="CreateContainer within sandbox \"7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Apr 12 22:01:00.389083 env[1160]: time="2024-04-12T22:01:00.389041769Z" level=info msg="CreateContainer within sandbox \"7f45ce491a0dddd5cbf02b8df83ffc6e65edfb5996a8dcdb76d2afdb43538e44\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"664576646d85a337ca375cb3419e024a32cde479c91a1a13d605aab619164acc\"" Apr 12 22:01:00.389505 env[1160]: time="2024-04-12T22:01:00.389429043Z" level=info msg="StartContainer for \"664576646d85a337ca375cb3419e024a32cde479c91a1a13d605aab619164acc\"" Apr 12 22:01:00.398823 systemd[1]: Started cri-containerd-664576646d85a337ca375cb3419e024a32cde479c91a1a13d605aab619164acc.scope. Apr 12 22:01:00.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit: BPF prog-id=111 op=LOAD Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3106 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:00.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636343537363634366438356133333763613337356362333431396530 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3106 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:00.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636343537363634366438356133333763613337356362333431396530 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit: BPF prog-id=112 op=LOAD Apr 12 22:01:00.403000 audit[3158]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000dfd10 items=0 ppid=3106 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:00.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636343537363634366438356133333763613337356362333431396530 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit: BPF prog-id=113 op=LOAD Apr 12 22:01:00.403000 audit[3158]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000dfd58 items=0 ppid=3106 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:00.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636343537363634366438356133333763613337356362333431396530 Apr 12 22:01:00.403000 audit: BPF prog-id=113 op=UNLOAD Apr 12 22:01:00.403000 audit: BPF prog-id=112 op=UNLOAD Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:00.403000 audit: BPF prog-id=114 op=LOAD Apr 12 22:01:00.403000 audit[3158]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000348168 items=0 ppid=3106 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:00.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636343537363634366438356133333763613337356362333431396530 Apr 12 22:01:00.416692 env[1160]: time="2024-04-12T22:01:00.416655834Z" level=info msg="StartContainer for \"664576646d85a337ca375cb3419e024a32cde479c91a1a13d605aab619164acc\" returns successfully" Apr 12 22:01:00.433000 audit[3186]: AVC avc: denied { search } for pid=3186 comm="rpcbind" name="crypto" dev="proc" ino=33861 scontext=system_u:system_r:svirt_lxc_net_t:s0:c178,c653 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 22:01:00.433000 audit[3186]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f525229e0c0 a2=0 a3=0 items=0 ppid=3168 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c178,c653 key=(null) Apr 12 22:01:00.433000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Apr 12 22:01:00.452000 audit[3191]: AVC avc: denied { search } for pid=3191 comm="dbus-daemon" name="crypto" dev="proc" ino=33861 scontext=system_u:system_r:svirt_lxc_net_t:s0:c178,c653 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 22:01:00.452000 audit[3191]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f73e79460c0 a2=0 a3=0 items=0 ppid=3168 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c178,c653 key=(null) Apr 12 22:01:00.452000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 22:01:00.454000 audit[3192]: AVC avc: denied { watch } for pid=3192 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538067 scontext=system_u:system_r:svirt_lxc_net_t:s0:c178,c653 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c178,c653 tclass=dir permissive=0 Apr 12 22:01:00.454000 audit[3192]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=5619ff2240b0 a2=2c8 a3=7ffeeb28623c items=0 ppid=3168 pid=3192 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c178,c653 key=(null) Apr 12 22:01:00.454000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 22:01:00.456000 audit[3193]: AVC avc: denied { read } for pid=3193 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=29890 scontext=system_u:system_r:svirt_lxc_net_t:s0:c178,c653 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Apr 12 22:01:00.456000 audit[3193]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f2f8efa1320 a1=80000 a2=d a3=7ffd558b30c0 items=0 ppid=3168 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c178,c653 key=(null) Apr 12 22:01:00.456000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 22:01:00.456000 audit[3193]: AVC avc: denied { search } for pid=3193 comm="ganesha.nfsd" name="crypto" dev="proc" ino=33861 scontext=system_u:system_r:svirt_lxc_net_t:s0:c178,c653 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 22:01:00.456000 audit[3193]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f2f8e4f50c0 a2=0 a3=0 items=0 ppid=3168 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c178,c653 key=(null) Apr 12 22:01:00.456000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 22:01:01.171058 kubelet[1543]: E0412 22:01:01.170942 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:01:01.437124 kubelet[1543]: I0412 22:01:01.436916 1543 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.2265645960000002 podCreationTimestamp="2024-04-12 22:00:56 +0000 UTC" firstStartedPulling="2024-04-12 22:00:57.172953251 +0000 UTC m=+41.430576573" lastFinishedPulling="2024-04-12 22:01:00.383220916 +0000 UTC m=+44.640844240" observedRunningTime="2024-04-12 22:01:01.436274167 +0000 UTC m=+45.693897554" watchObservedRunningTime="2024-04-12 22:01:01.436832263 +0000 UTC m=+45.694455632" Apr 12 22:01:01.446000 audit[3211]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=3211 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:01:01.473558 kernel: kauditd_printk_skb: 134 callbacks suppressed Apr 12 22:01:01.473592 kernel: audit: type=1325 audit(1712959261.446:780): table=filter:76 family=2 entries=20 op=nft_register_rule pid=3211 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:01:01.446000 audit[3211]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe0815bc60 a2=0 a3=7ffe0815bc4c items=0 ppid=1767 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:01.630338 kernel: audit: type=1300 audit(1712959261.446:780): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe0815bc60 a2=0 a3=7ffe0815bc4c items=0 ppid=1767 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:01.630369 kernel: audit: type=1327 audit(1712959261.446:780): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:01:01.446000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:01:01.700000 audit[3211]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=3211 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:01:01.700000 audit[3211]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe0815bc60 a2=0 a3=7ffe0815bc4c items=0 ppid=1767 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:01.860526 kernel: audit: type=1325 audit(1712959261.700:781): table=nat:77 family=2 entries=106 op=nft_register_chain pid=3211 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 22:01:01.860550 kernel: audit: type=1300 audit(1712959261.700:781): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe0815bc60 a2=0 a3=7ffe0815bc4c items=0 ppid=1767 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:01.860569 kernel: audit: type=1327 audit(1712959261.700:781): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:01:01.700000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 22:01:02.171479 kubelet[1543]: E0412 22:01:02.171415 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:01:03.172430 kubelet[1543]: E0412 22:01:03.172320 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:01:04.173311 kubelet[1543]: E0412 22:01:04.173194 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:01:05.174300 kubelet[1543]: E0412 22:01:05.174189 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:01:06.174620 kubelet[1543]: E0412 22:01:06.174511 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:01:07.175317 kubelet[1543]: E0412 22:01:07.175212 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:01:08.175613 kubelet[1543]: E0412 22:01:08.175499 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:01:09.176131 kubelet[1543]: E0412 22:01:09.176016 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:01:10.176402 kubelet[1543]: E0412 22:01:10.176277 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:01:10.224481 kubelet[1543]: I0412 22:01:10.224372 1543 topology_manager.go:215] "Topology Admit Handler" podUID="e58c3d98-2e90-415c-8708-0038dcd96d95" podNamespace="default" podName="test-pod-1" Apr 12 22:01:10.238064 systemd[1]: Created slice kubepods-besteffort-pode58c3d98_2e90_415c_8708_0038dcd96d95.slice. Apr 12 22:01:10.247163 kubelet[1543]: I0412 22:01:10.247070 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cgxk8\" (UniqueName: \"kubernetes.io/projected/e58c3d98-2e90-415c-8708-0038dcd96d95-kube-api-access-cgxk8\") pod \"test-pod-1\" (UID: \"e58c3d98-2e90-415c-8708-0038dcd96d95\") " pod="default/test-pod-1" Apr 12 22:01:10.247380 kubelet[1543]: I0412 22:01:10.247184 1543 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-b3960961-770f-4b41-b313-861b83dc11ec\" (UniqueName: \"kubernetes.io/nfs/e58c3d98-2e90-415c-8708-0038dcd96d95-pvc-b3960961-770f-4b41-b313-861b83dc11ec\") pod \"test-pod-1\" (UID: \"e58c3d98-2e90-415c-8708-0038dcd96d95\") " pod="default/test-pod-1" Apr 12 22:01:10.364000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:10.480932 kernel: Failed to create system directory netfs Apr 12 22:01:10.480976 kernel: audit: type=1400 audit(1712959270.364:782): avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:10.480994 kernel: Failed to create system directory netfs Apr 12 22:01:10.481006 kernel: audit: type=1400 audit(1712959270.364:782): avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:10.364000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:10.506521 kernel: Failed to create system directory netfs Apr 12 22:01:10.591983 kernel: audit: type=1400 audit(1712959270.364:782): avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:10.364000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:10.617392 kernel: Failed to create system directory netfs Apr 12 22:01:10.702018 kernel: audit: type=1400 audit(1712959270.364:782): avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:10.364000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:10.364000 audit[3237]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563282d065e0 a1=153bc a2=56328169c2b0 a3=5 items=0 ppid=791 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:10.364000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 22:01:10.937118 kernel: audit: type=1300 audit(1712959270.364:782): arch=c000003e syscall=175 success=yes exit=0 a0=563282d065e0 a1=153bc a2=56328169c2b0 a3=5 items=0 ppid=791 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:10.937152 kernel: audit: type=1327 audit(1712959270.364:782): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 22:01:10.814000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:10.962882 kernel: Failed to create system directory fscache Apr 12 22:01:10.962911 kernel: audit: type=1400 audit(1712959270.814:783): avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:10.962926 kernel: Failed to create system directory fscache Apr 12 22:01:11.046467 kernel: audit: type=1400 audit(1712959270.814:783): avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:10.814000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.071431 kernel: Failed to create system directory fscache Apr 12 22:01:11.154321 kernel: audit: type=1400 audit(1712959270.814:783): avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:10.814000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.176513 kubelet[1543]: E0412 22:01:11.176462 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:01:10.814000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.261788 kernel: Failed to create system directory fscache Apr 12 22:01:11.261829 kernel: audit: type=1400 audit(1712959270.814:783): avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.367435 kernel: Failed to create system directory fscache Apr 12 22:01:10.814000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:10.814000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.415482 kernel: Failed to create system directory fscache Apr 12 22:01:11.415553 kernel: Failed to create system directory fscache Apr 12 22:01:10.814000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.438833 kernel: Failed to create system directory fscache Apr 12 22:01:10.814000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:10.814000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.484325 kernel: Failed to create system directory fscache Apr 12 22:01:11.484396 kernel: Failed to create system directory fscache Apr 12 22:01:10.814000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.506335 kernel: Failed to create system directory fscache Apr 12 22:01:10.814000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.528005 kernel: Failed to create system directory fscache Apr 12 22:01:10.814000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.549084 kernel: Failed to create system directory fscache Apr 12 22:01:10.814000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.569778 kernel: Failed to create system directory fscache Apr 12 22:01:10.814000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.609733 kernel: FS-Cache: Loaded Apr 12 22:01:10.814000 audit[3237]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563282f1b9c0 a1=4c0fc a2=56328169c2b0 a3=5 items=0 ppid=791 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:10.814000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.670481 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.670546 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.670564 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.689449 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.707987 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.726416 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.744482 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.762042 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.779202 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.796172 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.812771 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.828932 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.844660 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.860195 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.875387 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.890164 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.904468 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.918371 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.931806 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.944814 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.957426 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.969607 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.981461 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.992854 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.003819 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.025013 kernel: Failed to create system directory sunrpc Apr 12 22:01:12.025083 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.035004 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.053978 kernel: Failed to create system directory sunrpc Apr 12 22:01:12.054050 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.062980 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.071515 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.079605 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.095118 kernel: Failed to create system directory sunrpc Apr 12 22:01:12.095181 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.102245 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.108940 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.115508 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.122000 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.128542 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.135017 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.141522 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.148038 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.154530 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.167526 kernel: Failed to create system directory sunrpc Apr 12 22:01:12.167579 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.174003 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.177237 kubelet[1543]: E0412 22:01:12.177226 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:01:12.180375 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.186601 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.192809 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.199055 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.205284 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.217765 kernel: Failed to create system directory sunrpc Apr 12 22:01:12.217804 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.223968 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.230224 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.236446 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.242672 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.248968 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.261358 kernel: Failed to create system directory sunrpc Apr 12 22:01:12.261385 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.267644 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.273852 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.280069 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.292499 kernel: Failed to create system directory sunrpc Apr 12 22:01:12.292525 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.298786 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.305053 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.311254 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.317513 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.329923 kernel: Failed to create system directory sunrpc Apr 12 22:01:12.329979 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.336140 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.348552 kernel: Failed to create system directory sunrpc Apr 12 22:01:12.348575 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.354856 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.361135 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.367342 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.379762 kernel: Failed to create system directory sunrpc Apr 12 22:01:12.379828 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.386024 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.392246 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.404684 kernel: Failed to create system directory sunrpc Apr 12 22:01:12.404732 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.410920 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.417121 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.429525 kernel: Failed to create system directory sunrpc Apr 12 22:01:12.429553 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.442026 kernel: Failed to create system directory sunrpc Apr 12 22:01:12.442072 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.448292 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.454531 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.460785 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.467026 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.473238 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.479475 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.485760 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.492009 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.498222 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.504478 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.510710 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.516948 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.529429 kernel: Failed to create system directory sunrpc Apr 12 22:01:12.529452 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.535668 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.541900 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.548105 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.554369 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.560604 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.566839 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.579297 kernel: Failed to create system directory sunrpc Apr 12 22:01:12.579353 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.585539 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.591749 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.598028 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.604271 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.610507 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.616730 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.629223 kernel: Failed to create system directory sunrpc Apr 12 22:01:12.629285 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.635463 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.641680 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.654190 kernel: Failed to create system directory sunrpc Apr 12 22:01:12.654246 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.660409 kernel: Failed to create system directory sunrpc Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:11.623000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.672846 kernel: Failed to create system directory sunrpc Apr 12 22:01:12.692542 kernel: RPC: Registered named UNIX socket transport module. Apr 12 22:01:12.692568 kernel: RPC: Registered udp transport module. Apr 12 22:01:12.692587 kernel: RPC: Registered tcp transport module. Apr 12 22:01:12.707130 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Apr 12 22:01:11.623000 audit[3237]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563282f67ad0 a1=1a7e9c a2=56328169c2b0 a3=5 items=6 ppid=791 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:11.623000 audit: CWD cwd="/" Apr 12 22:01:11.623000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:01:11.623000 audit: PATH item=1 name=(null) inode=19441 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:01:11.623000 audit: PATH item=2 name=(null) inode=19441 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:01:11.623000 audit: PATH item=3 name=(null) inode=19442 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:01:11.623000 audit: PATH item=4 name=(null) inode=19441 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:01:11.623000 audit: PATH item=5 name=(null) inode=19443 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 22:01:11.623000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.746870 kernel: Failed to create system directory nfs Apr 12 22:01:12.746914 kernel: Failed to create system directory nfs Apr 12 22:01:12.746941 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.753496 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.760132 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.766751 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.773364 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.780017 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.786649 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.793240 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.799898 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.806525 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.813121 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.819747 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.826370 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.832989 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.839647 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.846278 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.852871 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.859523 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.866154 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.872749 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.879405 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.886041 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.892646 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.899254 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.905893 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.912509 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.919135 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.925746 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.932401 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.939026 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.945651 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.952282 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.958913 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.965563 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.978822 kernel: Failed to create system directory nfs Apr 12 22:01:12.978871 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.985463 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.992123 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:12.998786 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.005383 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.012010 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.018649 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.025118 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.031436 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.037742 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.043921 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.049898 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.055877 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.061908 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.067878 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.073864 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.079828 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.085867 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.091821 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.097747 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.103779 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.109688 kernel: Failed to create system directory nfs Apr 12 22:01:12.727000 audit[3237]: AVC avc: denied { confidentiality } for pid=3237 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.133711 kernel: FS-Cache: Netfs 'nfs' registered for caching Apr 12 22:01:12.727000 audit[3237]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563283188670 a1=16d85c a2=56328169c2b0 a3=5 items=0 ppid=791 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:12.727000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.172763 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.172794 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.172808 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.177980 kubelet[1543]: E0412 22:01:13.177940 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:01:13.179165 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.185498 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.191862 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.198207 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.204569 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.210919 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.217268 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.223603 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.229969 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.236325 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.242672 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.249036 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.255379 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.261745 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.268108 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.274449 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.280784 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.287132 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.293471 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.299790 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.306191 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.312536 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.318908 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.325248 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.331557 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.337908 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.344293 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.350623 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.356966 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.363298 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.369620 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.375967 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.382364 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.388697 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.395029 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.401385 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.407743 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.414055 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.420381 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.426781 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.433094 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.439443 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.445784 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.452195 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.458381 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.464426 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.470479 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.476550 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.482581 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.488616 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.494641 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.500651 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.506695 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.512758 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.518761 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.524759 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.530783 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.536779 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.542758 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.548770 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.554748 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.560749 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.566778 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.578692 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.578739 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.584682 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.590658 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.596622 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.602611 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.608569 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.614537 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.620496 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.626476 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.632425 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.638370 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.644331 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.650283 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.656231 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.662167 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.668100 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.674029 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.679971 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.685913 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.691855 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.697788 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.703750 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.709686 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.715619 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.721567 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.727497 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.733421 kernel: Failed to create system directory nfs4 Apr 12 22:01:13.151000 audit[3244]: AVC avc: denied { confidentiality } for pid=3244 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.826152 kernel: NFS: Registering the id_resolver key type Apr 12 22:01:13.826176 kernel: Key type id_resolver registered Apr 12 22:01:13.826187 kernel: Key type id_legacy registered Apr 12 22:01:13.151000 audit[3244]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fca8743d010 a1=208ac4 a2=5646d350f2b0 a3=5 items=0 ppid=791 pid=3244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:13.151000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.846756 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.846785 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.859966 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.859989 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.866584 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.873193 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.879784 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.886380 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.893020 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.899695 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.906321 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.912947 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.919578 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.926217 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.932854 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.939494 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.946125 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.952811 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.959525 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.966182 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.972852 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.979525 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.986187 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.992856 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.999525 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:14.006179 kernel: Failed to create system directory rpcgss Apr 12 22:01:13.837000 audit[3245]: AVC avc: denied { confidentiality } for pid=3245 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 22:01:13.837000 audit[3245]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f01f0ea3010 a1=70c3c a2=55b8f85bc2b0 a3=5 items=0 ppid=791 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:13.837000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Apr 12 22:01:14.178754 kubelet[1543]: E0412 22:01:14.178649 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:01:14.334148 nfsidmap[3254]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.3-a-a4974466e6' Apr 12 22:01:14.343286 nfsidmap[3255]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.3-a-a4974466e6' Apr 12 22:01:14.369000 audit[1209]: AVC avc: denied { watch_reads } for pid=1209 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2548 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 22:01:14.369000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2548 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 22:01:14.369000 audit[1209]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55840d1ffc30 a2=10 a3=c23213c027c352f items=0 ppid=1 pid=1209 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:14.369000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2548 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 22:01:14.369000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 22:01:14.369000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2548 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 22:01:14.369000 audit[1209]: AVC avc: denied { watch_reads } for pid=1209 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2548 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 22:01:14.369000 audit[1209]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55840d1ffc30 a2=10 a3=c23213c027c352f items=0 ppid=1 pid=1209 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:14.369000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 22:01:14.369000 audit[1209]: AVC avc: denied { watch_reads } for pid=1209 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2548 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 22:01:14.369000 audit[1209]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55840d1ffc30 a2=10 a3=c23213c027c352f items=0 ppid=1 pid=1209 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:14.369000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 22:01:14.444542 env[1160]: time="2024-04-12T22:01:14.444412953Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e58c3d98-2e90-415c-8708-0038dcd96d95,Namespace:default,Attempt:0,}" Apr 12 22:01:14.572282 systemd-networkd[1000]: cali5ec59c6bf6e: Link UP Apr 12 22:01:14.594323 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 22:01:14.594481 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Apr 12 22:01:14.594958 systemd-networkd[1000]: cali5ec59c6bf6e: Gained carrier Apr 12 22:01:14.602635 env[1160]: 2024-04-12 22:01:14.493 [INFO][3257] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.7-k8s-test--pod--1-eth0 default e58c3d98-2e90-415c-8708-0038dcd96d95 2594 0 2024-04-12 22:00:56 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.7 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.7-k8s-test--pod--1-" Apr 12 22:01:14.602635 env[1160]: 2024-04-12 22:01:14.493 [INFO][3257] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.7-k8s-test--pod--1-eth0" Apr 12 22:01:14.602635 env[1160]: 2024-04-12 22:01:14.523 [INFO][3277] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a" HandleID="k8s-pod-network.75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a" Workload="10.67.80.7-k8s-test--pod--1-eth0" Apr 12 22:01:14.602635 env[1160]: 2024-04-12 22:01:14.539 [INFO][3277] ipam_plugin.go 268: Auto assigning IP ContainerID="75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a" HandleID="k8s-pod-network.75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a" Workload="10.67.80.7-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000531e10), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.7", "pod":"test-pod-1", "timestamp":"2024-04-12 22:01:14.523859598 +0000 UTC"}, Hostname:"10.67.80.7", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 22:01:14.602635 env[1160]: 2024-04-12 22:01:14.539 [INFO][3277] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 22:01:14.602635 env[1160]: 2024-04-12 22:01:14.539 [INFO][3277] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 22:01:14.602635 env[1160]: 2024-04-12 22:01:14.539 [INFO][3277] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.7' Apr 12 22:01:14.602635 env[1160]: 2024-04-12 22:01:14.541 [INFO][3277] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a" host="10.67.80.7" Apr 12 22:01:14.602635 env[1160]: 2024-04-12 22:01:14.546 [INFO][3277] ipam.go 372: Looking up existing affinities for host host="10.67.80.7" Apr 12 22:01:14.602635 env[1160]: 2024-04-12 22:01:14.551 [INFO][3277] ipam.go 489: Trying affinity for 192.168.30.0/26 host="10.67.80.7" Apr 12 22:01:14.602635 env[1160]: 2024-04-12 22:01:14.553 [INFO][3277] ipam.go 155: Attempting to load block cidr=192.168.30.0/26 host="10.67.80.7" Apr 12 22:01:14.602635 env[1160]: 2024-04-12 22:01:14.555 [INFO][3277] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.30.0/26 host="10.67.80.7" Apr 12 22:01:14.602635 env[1160]: 2024-04-12 22:01:14.555 [INFO][3277] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.30.0/26 handle="k8s-pod-network.75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a" host="10.67.80.7" Apr 12 22:01:14.602635 env[1160]: 2024-04-12 22:01:14.556 [INFO][3277] ipam.go 1682: Creating new handle: k8s-pod-network.75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a Apr 12 22:01:14.602635 env[1160]: 2024-04-12 22:01:14.561 [INFO][3277] ipam.go 1203: Writing block in order to claim IPs block=192.168.30.0/26 handle="k8s-pod-network.75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a" host="10.67.80.7" Apr 12 22:01:14.602635 env[1160]: 2024-04-12 22:01:14.566 [INFO][3277] ipam.go 1216: Successfully claimed IPs: [192.168.30.4/26] block=192.168.30.0/26 handle="k8s-pod-network.75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a" host="10.67.80.7" Apr 12 22:01:14.602635 env[1160]: 2024-04-12 22:01:14.566 [INFO][3277] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.30.4/26] handle="k8s-pod-network.75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a" host="10.67.80.7" Apr 12 22:01:14.602635 env[1160]: 2024-04-12 22:01:14.566 [INFO][3277] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 22:01:14.602635 env[1160]: 2024-04-12 22:01:14.566 [INFO][3277] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.30.4/26] IPv6=[] ContainerID="75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a" HandleID="k8s-pod-network.75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a" Workload="10.67.80.7-k8s-test--pod--1-eth0" Apr 12 22:01:14.602635 env[1160]: 2024-04-12 22:01:14.569 [INFO][3257] k8s.go 385: Populated endpoint ContainerID="75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.7-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.7-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e58c3d98-2e90-415c-8708-0038dcd96d95", ResourceVersion:"2594", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 22, 0, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.7", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.30.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 22:01:14.602635 env[1160]: 2024-04-12 22:01:14.569 [INFO][3257] k8s.go 386: Calico CNI using IPs: [192.168.30.4/32] ContainerID="75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.7-k8s-test--pod--1-eth0" Apr 12 22:01:14.604616 env[1160]: 2024-04-12 22:01:14.569 [INFO][3257] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.7-k8s-test--pod--1-eth0" Apr 12 22:01:14.604616 env[1160]: 2024-04-12 22:01:14.594 [INFO][3257] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.7-k8s-test--pod--1-eth0" Apr 12 22:01:14.604616 env[1160]: 2024-04-12 22:01:14.595 [INFO][3257] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.7-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.7-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e58c3d98-2e90-415c-8708-0038dcd96d95", ResourceVersion:"2594", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 22, 0, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.7", ContainerID:"75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.30.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"5e:ca:de:98:3d:d1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 22:01:14.604616 env[1160]: 2024-04-12 22:01:14.600 [INFO][3257] k8s.go 498: Wrote updated endpoint to datastore ContainerID="75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.7-k8s-test--pod--1-eth0" Apr 12 22:01:14.625038 env[1160]: time="2024-04-12T22:01:14.624878126Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 22:01:14.625038 env[1160]: time="2024-04-12T22:01:14.624939145Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 22:01:14.625038 env[1160]: time="2024-04-12T22:01:14.624961463Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 22:01:14.625305 env[1160]: time="2024-04-12T22:01:14.625161823Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a pid=3311 runtime=io.containerd.runc.v2 Apr 12 22:01:14.624000 audit[3312]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3312 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 22:01:14.624000 audit[3312]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffd11d58c60 a2=0 a3=7ffd11d58c4c items=0 ppid=2307 pid=3312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:14.624000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 22:01:14.642153 systemd[1]: Started cri-containerd-75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a.scope. Apr 12 22:01:14.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit: BPF prog-id=115 op=LOAD Apr 12 22:01:14.657000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3311 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:14.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735353731633237643965623466316536333965333535366561316564 Apr 12 22:01:14.657000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3311 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:14.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735353731633237643965623466316536333965333535366561316564 Apr 12 22:01:14.657000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit: BPF prog-id=116 op=LOAD Apr 12 22:01:14.657000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001be9d0 items=0 ppid=3311 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:14.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735353731633237643965623466316536333965333535366561316564 Apr 12 22:01:14.657000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.657000 audit: BPF prog-id=117 op=LOAD Apr 12 22:01:14.657000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001bea18 items=0 ppid=3311 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:14.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735353731633237643965623466316536333965333535366561316564 Apr 12 22:01:14.657000 audit: BPF prog-id=117 op=UNLOAD Apr 12 22:01:14.657000 audit: BPF prog-id=116 op=UNLOAD Apr 12 22:01:14.658000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.658000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.658000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.658000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.658000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.658000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.658000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.658000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.658000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.658000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:14.658000 audit: BPF prog-id=118 op=LOAD Apr 12 22:01:14.658000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001bee28 items=0 ppid=3311 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:14.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735353731633237643965623466316536333965333535366561316564 Apr 12 22:01:14.686851 env[1160]: time="2024-04-12T22:01:14.686821027Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e58c3d98-2e90-415c-8708-0038dcd96d95,Namespace:default,Attempt:0,} returns sandbox id \"75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a\"" Apr 12 22:01:14.687631 env[1160]: time="2024-04-12T22:01:14.687617186Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 22:01:15.020390 env[1160]: time="2024-04-12T22:01:15.020331633Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:01:15.020976 env[1160]: time="2024-04-12T22:01:15.020923822Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:01:15.021943 env[1160]: time="2024-04-12T22:01:15.021910318Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:01:15.022992 env[1160]: time="2024-04-12T22:01:15.022946368Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 22:01:15.023472 env[1160]: time="2024-04-12T22:01:15.023406203Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83\"" Apr 12 22:01:15.024483 env[1160]: time="2024-04-12T22:01:15.024441668Z" level=info msg="CreateContainer within sandbox \"75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a\" for container &ContainerMetadata{Name:test,Attempt:0,}" Apr 12 22:01:15.029191 env[1160]: time="2024-04-12T22:01:15.029144810Z" level=info msg="CreateContainer within sandbox \"75571c27d9eb4f1e639e3556ea1ed2fd88bb1e7fb84d4bf0ef164817d4bc993a\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"b72015c6822de6c80c25a357ef5cfbc474c121d8282aec7fc5be654317c8dd29\"" Apr 12 22:01:15.029381 env[1160]: time="2024-04-12T22:01:15.029346667Z" level=info msg="StartContainer for \"b72015c6822de6c80c25a357ef5cfbc474c121d8282aec7fc5be654317c8dd29\"" Apr 12 22:01:15.037659 systemd[1]: Started cri-containerd-b72015c6822de6c80c25a357ef5cfbc474c121d8282aec7fc5be654317c8dd29.scope. Apr 12 22:01:15.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit: BPF prog-id=119 op=LOAD Apr 12 22:01:15.044000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3311 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:15.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237323031356336383232646536633830633235613335376566356366 Apr 12 22:01:15.044000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3311 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:15.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237323031356336383232646536633830633235613335376566356366 Apr 12 22:01:15.044000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.044000 audit: BPF prog-id=120 op=LOAD Apr 12 22:01:15.044000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000383dc0 items=0 ppid=3311 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:15.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237323031356336383232646536633830633235613335376566356366 Apr 12 22:01:15.045000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.045000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.045000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.045000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.045000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.045000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.045000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.045000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.045000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.045000 audit: BPF prog-id=121 op=LOAD Apr 12 22:01:15.045000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000383e08 items=0 ppid=3311 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:15.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237323031356336383232646536633830633235613335376566356366 Apr 12 22:01:15.045000 audit: BPF prog-id=121 op=UNLOAD Apr 12 22:01:15.045000 audit: BPF prog-id=120 op=UNLOAD Apr 12 22:01:15.045000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.045000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.045000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.045000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.045000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.045000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.045000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.045000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.045000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.045000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 22:01:15.045000 audit: BPF prog-id=122 op=LOAD Apr 12 22:01:15.045000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003de218 items=0 ppid=3311 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 22:01:15.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237323031356336383232646536633830633235613335376566356366 Apr 12 22:01:15.052819 env[1160]: time="2024-04-12T22:01:15.052789904Z" level=info msg="StartContainer for \"b72015c6822de6c80c25a357ef5cfbc474c121d8282aec7fc5be654317c8dd29\" returns successfully" Apr 12 22:01:15.179072 kubelet[1543]: E0412 22:01:15.178962 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:01:15.472682 kubelet[1543]: I0412 22:01:15.472565 1543 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=19.136304929 podCreationTimestamp="2024-04-12 22:00:56 +0000 UTC" firstStartedPulling="2024-04-12 22:01:14.687454561 +0000 UTC m=+58.945077886" lastFinishedPulling="2024-04-12 22:01:15.023632817 +0000 UTC m=+59.281256139" observedRunningTime="2024-04-12 22:01:15.472102247 +0000 UTC m=+59.729725630" watchObservedRunningTime="2024-04-12 22:01:15.472483182 +0000 UTC m=+59.730106549" Apr 12 22:01:16.069107 systemd-networkd[1000]: cali5ec59c6bf6e: Gained IPv6LL Apr 12 22:01:16.142007 kubelet[1543]: E0412 22:01:16.141881 1543 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:01:16.164062 env[1160]: time="2024-04-12T22:01:16.163925214Z" level=info msg="StopPodSandbox for \"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\"" Apr 12 22:01:16.179443 kubelet[1543]: E0412 22:01:16.179391 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:01:16.231494 env[1160]: 2024-04-12 22:01:16.197 [WARNING][3428] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.7-k8s-csi--node--driver--r6cqh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a095c897-f494-4339-b464-5f055f671010", ResourceVersion:"2481", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 22, 0, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.7", ContainerID:"96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee", Pod:"csi-node-driver-r6cqh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.30.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali4cfa71e4038", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 22:01:16.231494 env[1160]: 2024-04-12 22:01:16.197 [INFO][3428] k8s.go 585: Cleaning up netns ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Apr 12 22:01:16.231494 env[1160]: 2024-04-12 22:01:16.197 [INFO][3428] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" iface="eth0" netns="" Apr 12 22:01:16.231494 env[1160]: 2024-04-12 22:01:16.197 [INFO][3428] k8s.go 592: Releasing IP address(es) ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Apr 12 22:01:16.231494 env[1160]: 2024-04-12 22:01:16.197 [INFO][3428] utils.go 188: Calico CNI releasing IP address ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Apr 12 22:01:16.231494 env[1160]: 2024-04-12 22:01:16.210 [INFO][3442] ipam_plugin.go 415: Releasing address using handleID ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" HandleID="k8s-pod-network.0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Workload="10.67.80.7-k8s-csi--node--driver--r6cqh-eth0" Apr 12 22:01:16.231494 env[1160]: 2024-04-12 22:01:16.210 [INFO][3442] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 22:01:16.231494 env[1160]: 2024-04-12 22:01:16.210 [INFO][3442] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 22:01:16.231494 env[1160]: 2024-04-12 22:01:16.223 [WARNING][3442] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" HandleID="k8s-pod-network.0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Workload="10.67.80.7-k8s-csi--node--driver--r6cqh-eth0" Apr 12 22:01:16.231494 env[1160]: 2024-04-12 22:01:16.223 [INFO][3442] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" HandleID="k8s-pod-network.0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Workload="10.67.80.7-k8s-csi--node--driver--r6cqh-eth0" Apr 12 22:01:16.231494 env[1160]: 2024-04-12 22:01:16.226 [INFO][3442] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 22:01:16.231494 env[1160]: 2024-04-12 22:01:16.229 [INFO][3428] k8s.go 598: Teardown processing complete. ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Apr 12 22:01:16.232903 env[1160]: time="2024-04-12T22:01:16.231502262Z" level=info msg="TearDown network for sandbox \"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\" successfully" Apr 12 22:01:16.232903 env[1160]: time="2024-04-12T22:01:16.231571571Z" level=info msg="StopPodSandbox for \"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\" returns successfully" Apr 12 22:01:16.232903 env[1160]: time="2024-04-12T22:01:16.232417935Z" level=info msg="RemovePodSandbox for \"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\"" Apr 12 22:01:16.232903 env[1160]: time="2024-04-12T22:01:16.232490176Z" level=info msg="Forcibly stopping sandbox \"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\"" Apr 12 22:01:16.306224 env[1160]: 2024-04-12 22:01:16.288 [WARNING][3475] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.7-k8s-csi--node--driver--r6cqh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a095c897-f494-4339-b464-5f055f671010", ResourceVersion:"2481", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 22, 0, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.7", ContainerID:"96fca1aaf941ec09c8ddbbea686684948d59c63467db8ebc4ff62e45fb0d0aee", Pod:"csi-node-driver-r6cqh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.30.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali4cfa71e4038", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 22:01:16.306224 env[1160]: 2024-04-12 22:01:16.288 [INFO][3475] k8s.go 585: Cleaning up netns ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Apr 12 22:01:16.306224 env[1160]: 2024-04-12 22:01:16.288 [INFO][3475] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" iface="eth0" netns="" Apr 12 22:01:16.306224 env[1160]: 2024-04-12 22:01:16.288 [INFO][3475] k8s.go 592: Releasing IP address(es) ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Apr 12 22:01:16.306224 env[1160]: 2024-04-12 22:01:16.288 [INFO][3475] utils.go 188: Calico CNI releasing IP address ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Apr 12 22:01:16.306224 env[1160]: 2024-04-12 22:01:16.298 [INFO][3497] ipam_plugin.go 415: Releasing address using handleID ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" HandleID="k8s-pod-network.0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Workload="10.67.80.7-k8s-csi--node--driver--r6cqh-eth0" Apr 12 22:01:16.306224 env[1160]: 2024-04-12 22:01:16.298 [INFO][3497] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 22:01:16.306224 env[1160]: 2024-04-12 22:01:16.298 [INFO][3497] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 22:01:16.306224 env[1160]: 2024-04-12 22:01:16.303 [WARNING][3497] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" HandleID="k8s-pod-network.0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Workload="10.67.80.7-k8s-csi--node--driver--r6cqh-eth0" Apr 12 22:01:16.306224 env[1160]: 2024-04-12 22:01:16.303 [INFO][3497] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" HandleID="k8s-pod-network.0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Workload="10.67.80.7-k8s-csi--node--driver--r6cqh-eth0" Apr 12 22:01:16.306224 env[1160]: 2024-04-12 22:01:16.305 [INFO][3497] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 22:01:16.306224 env[1160]: 2024-04-12 22:01:16.305 [INFO][3475] k8s.go 598: Teardown processing complete. ContainerID="0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1" Apr 12 22:01:16.306224 env[1160]: time="2024-04-12T22:01:16.306204281Z" level=info msg="TearDown network for sandbox \"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\" successfully" Apr 12 22:01:16.307368 env[1160]: time="2024-04-12T22:01:16.307328880Z" level=info msg="RemovePodSandbox \"0a406891183a0c4160f7284958411ee43b8d63328a364f95218c1c2c2b7b2df1\" returns successfully" Apr 12 22:01:16.307640 env[1160]: time="2024-04-12T22:01:16.307625487Z" level=info msg="StopPodSandbox for \"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\"" Apr 12 22:01:16.352884 env[1160]: 2024-04-12 22:01:16.328 [WARNING][3525] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"5d10b781-2cb7-48ad-8603-e0eed309a7b0", ResourceVersion:"2501", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 22, 0, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.7", ContainerID:"fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694", Pod:"nginx-deployment-6d5f899847-hwj6q", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.30.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3690a681b5d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 22:01:16.352884 env[1160]: 2024-04-12 22:01:16.328 [INFO][3525] k8s.go 585: Cleaning up netns ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Apr 12 22:01:16.352884 env[1160]: 2024-04-12 22:01:16.328 [INFO][3525] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" iface="eth0" netns="" Apr 12 22:01:16.352884 env[1160]: 2024-04-12 22:01:16.328 [INFO][3525] k8s.go 592: Releasing IP address(es) ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Apr 12 22:01:16.352884 env[1160]: 2024-04-12 22:01:16.328 [INFO][3525] utils.go 188: Calico CNI releasing IP address ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Apr 12 22:01:16.352884 env[1160]: 2024-04-12 22:01:16.339 [INFO][3539] ipam_plugin.go 415: Releasing address using handleID ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" HandleID="k8s-pod-network.b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Workload="10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0" Apr 12 22:01:16.352884 env[1160]: 2024-04-12 22:01:16.339 [INFO][3539] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 22:01:16.352884 env[1160]: 2024-04-12 22:01:16.339 [INFO][3539] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 22:01:16.352884 env[1160]: 2024-04-12 22:01:16.348 [WARNING][3539] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" HandleID="k8s-pod-network.b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Workload="10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0" Apr 12 22:01:16.352884 env[1160]: 2024-04-12 22:01:16.348 [INFO][3539] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" HandleID="k8s-pod-network.b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Workload="10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0" Apr 12 22:01:16.352884 env[1160]: 2024-04-12 22:01:16.351 [INFO][3539] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 22:01:16.352884 env[1160]: 2024-04-12 22:01:16.352 [INFO][3525] k8s.go 598: Teardown processing complete. ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Apr 12 22:01:16.352884 env[1160]: time="2024-04-12T22:01:16.352831148Z" level=info msg="TearDown network for sandbox \"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\" successfully" Apr 12 22:01:16.352884 env[1160]: time="2024-04-12T22:01:16.352851526Z" level=info msg="StopPodSandbox for \"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\" returns successfully" Apr 12 22:01:16.353347 env[1160]: time="2024-04-12T22:01:16.353189378Z" level=info msg="RemovePodSandbox for \"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\"" Apr 12 22:01:16.353347 env[1160]: time="2024-04-12T22:01:16.353209845Z" level=info msg="Forcibly stopping sandbox \"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\"" Apr 12 22:01:16.440491 env[1160]: 2024-04-12 22:01:16.381 [WARNING][3569] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"5d10b781-2cb7-48ad-8603-e0eed309a7b0", ResourceVersion:"2501", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 22, 0, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.7", ContainerID:"fa6ca2af5582055e868483610f08f78622adc2dd92c1b19d50715cf416679694", Pod:"nginx-deployment-6d5f899847-hwj6q", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.30.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3690a681b5d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 22:01:16.440491 env[1160]: 2024-04-12 22:01:16.381 [INFO][3569] k8s.go 585: Cleaning up netns ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Apr 12 22:01:16.440491 env[1160]: 2024-04-12 22:01:16.381 [INFO][3569] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" iface="eth0" netns="" Apr 12 22:01:16.440491 env[1160]: 2024-04-12 22:01:16.382 [INFO][3569] k8s.go 592: Releasing IP address(es) ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Apr 12 22:01:16.440491 env[1160]: 2024-04-12 22:01:16.382 [INFO][3569] utils.go 188: Calico CNI releasing IP address ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Apr 12 22:01:16.440491 env[1160]: 2024-04-12 22:01:16.424 [INFO][3586] ipam_plugin.go 415: Releasing address using handleID ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" HandleID="k8s-pod-network.b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Workload="10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0" Apr 12 22:01:16.440491 env[1160]: 2024-04-12 22:01:16.424 [INFO][3586] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 22:01:16.440491 env[1160]: 2024-04-12 22:01:16.424 [INFO][3586] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 22:01:16.440491 env[1160]: 2024-04-12 22:01:16.433 [WARNING][3586] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" HandleID="k8s-pod-network.b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Workload="10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0" Apr 12 22:01:16.440491 env[1160]: 2024-04-12 22:01:16.433 [INFO][3586] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" HandleID="k8s-pod-network.b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Workload="10.67.80.7-k8s-nginx--deployment--6d5f899847--hwj6q-eth0" Apr 12 22:01:16.440491 env[1160]: 2024-04-12 22:01:16.435 [INFO][3586] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 22:01:16.440491 env[1160]: 2024-04-12 22:01:16.438 [INFO][3569] k8s.go 598: Teardown processing complete. ContainerID="b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324" Apr 12 22:01:16.441880 env[1160]: time="2024-04-12T22:01:16.440495566Z" level=info msg="TearDown network for sandbox \"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\" successfully" Apr 12 22:01:16.444263 env[1160]: time="2024-04-12T22:01:16.444157175Z" level=info msg="RemovePodSandbox \"b84b2693bc5e486256d0e59992ce72ea8ebdeca318ce069555d959c835c72324\" returns successfully" Apr 12 22:01:17.180686 kubelet[1543]: E0412 22:01:17.180616 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:01:18.181425 kubelet[1543]: E0412 22:01:18.181299 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 22:01:19.182667 kubelet[1543]: E0412 22:01:19.182550 1543 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"