Apr 12 19:01:15.175099 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 19:01:15.175146 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 19:01:15.175165 kernel: BIOS-provided physical RAM map: Apr 12 19:01:15.175179 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Apr 12 19:01:15.175192 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Apr 12 19:01:15.175206 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Apr 12 19:01:15.175226 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Apr 12 19:01:15.175240 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Apr 12 19:01:15.175253 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Apr 12 19:01:15.175266 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Apr 12 19:01:15.175298 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Apr 12 19:01:15.175311 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Apr 12 19:01:15.175324 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Apr 12 19:01:15.175338 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Apr 12 19:01:15.175360 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Apr 12 19:01:15.175375 kernel: NX (Execute Disable) protection: active Apr 12 19:01:15.175390 kernel: efi: EFI v2.70 by EDK II Apr 12 19:01:15.175405 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9ca000 MEMATTR=0xbe36f198 RNG=0xbfb73018 TPMEventLog=0xbe2b3018 Apr 12 19:01:15.175420 kernel: random: crng init done Apr 12 19:01:15.175436 kernel: SMBIOS 2.4 present. Apr 12 19:01:15.175451 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Apr 12 19:01:15.175466 kernel: Hypervisor detected: KVM Apr 12 19:01:15.175486 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Apr 12 19:01:15.175500 kernel: kvm-clock: cpu 0, msr 201191001, primary cpu clock Apr 12 19:01:15.175514 kernel: kvm-clock: using sched offset of 13658586913 cycles Apr 12 19:01:15.175530 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Apr 12 19:01:15.175546 kernel: tsc: Detected 2299.998 MHz processor Apr 12 19:01:15.175561 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 19:01:15.175577 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 19:01:15.175593 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Apr 12 19:01:15.175608 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 19:01:15.175624 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Apr 12 19:01:15.175647 kernel: Using GB pages for direct mapping Apr 12 19:01:15.175662 kernel: Secure boot disabled Apr 12 19:01:15.175678 kernel: ACPI: Early table checksum verification disabled Apr 12 19:01:15.175694 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Apr 12 19:01:15.175709 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Apr 12 19:01:15.175725 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Apr 12 19:01:15.175740 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Apr 12 19:01:15.175756 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Apr 12 19:01:15.175784 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Apr 12 19:01:15.175800 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Apr 12 19:01:15.175816 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Apr 12 19:01:15.175833 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Apr 12 19:01:15.175850 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Apr 12 19:01:15.175867 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Apr 12 19:01:15.175887 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Apr 12 19:01:15.175904 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Apr 12 19:01:15.175920 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Apr 12 19:01:15.175936 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Apr 12 19:01:15.175952 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Apr 12 19:01:15.175969 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Apr 12 19:01:15.175986 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Apr 12 19:01:15.176011 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Apr 12 19:01:15.176028 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Apr 12 19:01:15.176049 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Apr 12 19:01:15.176066 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Apr 12 19:01:15.176082 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Apr 12 19:01:15.176098 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Apr 12 19:01:15.176115 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Apr 12 19:01:15.176131 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Apr 12 19:01:15.176149 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Apr 12 19:01:15.176165 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Apr 12 19:01:15.176182 kernel: Zone ranges: Apr 12 19:01:15.176203 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 19:01:15.176219 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Apr 12 19:01:15.176236 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Apr 12 19:01:15.176251 kernel: Movable zone start for each node Apr 12 19:01:15.176281 kernel: Early memory node ranges Apr 12 19:01:15.176298 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Apr 12 19:01:15.176314 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Apr 12 19:01:15.176330 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Apr 12 19:01:15.176347 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Apr 12 19:01:15.176368 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Apr 12 19:01:15.176384 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Apr 12 19:01:15.176401 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 19:01:15.176417 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Apr 12 19:01:15.176434 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Apr 12 19:01:15.176450 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Apr 12 19:01:15.176467 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Apr 12 19:01:15.176484 kernel: ACPI: PM-Timer IO Port: 0xb008 Apr 12 19:01:15.176501 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Apr 12 19:01:15.176520 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Apr 12 19:01:15.176537 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Apr 12 19:01:15.176553 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 19:01:15.176569 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Apr 12 19:01:15.176586 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Apr 12 19:01:15.176602 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 19:01:15.176617 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Apr 12 19:01:15.176632 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Apr 12 19:01:15.176673 kernel: Booting paravirtualized kernel on KVM Apr 12 19:01:15.176696 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 19:01:15.176713 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Apr 12 19:01:15.176730 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Apr 12 19:01:15.176746 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Apr 12 19:01:15.176762 kernel: pcpu-alloc: [0] 0 1 Apr 12 19:01:15.176778 kernel: kvm-guest: PV spinlocks enabled Apr 12 19:01:15.176795 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Apr 12 19:01:15.176812 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1931256 Apr 12 19:01:15.176829 kernel: Policy zone: Normal Apr 12 19:01:15.176853 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 19:01:15.176870 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 19:01:15.176887 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Apr 12 19:01:15.176903 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 19:01:15.176920 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 19:01:15.176936 kernel: Memory: 7534432K/7860584K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 325892K reserved, 0K cma-reserved) Apr 12 19:01:15.176952 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Apr 12 19:01:15.176969 kernel: Kernel/User page tables isolation: enabled Apr 12 19:01:15.176989 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 19:01:15.177019 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 19:01:15.177035 kernel: rcu: Hierarchical RCU implementation. Apr 12 19:01:15.177053 kernel: rcu: RCU event tracing is enabled. Apr 12 19:01:15.177070 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Apr 12 19:01:15.177087 kernel: Rude variant of Tasks RCU enabled. Apr 12 19:01:15.177104 kernel: Tracing variant of Tasks RCU enabled. Apr 12 19:01:15.177121 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 19:01:15.177138 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Apr 12 19:01:15.177159 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Apr 12 19:01:15.177191 kernel: Console: colour dummy device 80x25 Apr 12 19:01:15.177209 kernel: printk: console [ttyS0] enabled Apr 12 19:01:15.177231 kernel: ACPI: Core revision 20210730 Apr 12 19:01:15.177250 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 19:01:15.177281 kernel: x2apic enabled Apr 12 19:01:15.177299 kernel: Switched APIC routing to physical x2apic. Apr 12 19:01:15.177316 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Apr 12 19:01:15.177334 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Apr 12 19:01:15.177352 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Apr 12 19:01:15.177375 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Apr 12 19:01:15.177392 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Apr 12 19:01:15.177410 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 19:01:15.177428 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Apr 12 19:01:15.177446 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Apr 12 19:01:15.177463 kernel: Spectre V2 : Mitigation: IBRS Apr 12 19:01:15.177481 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 19:01:15.177503 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Apr 12 19:01:15.177537 kernel: RETBleed: Mitigation: IBRS Apr 12 19:01:15.177555 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Apr 12 19:01:15.177572 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Apr 12 19:01:15.177588 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Apr 12 19:01:15.177606 kernel: MDS: Mitigation: Clear CPU buffers Apr 12 19:01:15.177624 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Apr 12 19:01:15.177641 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 12 19:01:15.177663 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 12 19:01:15.177680 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 12 19:01:15.177698 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 12 19:01:15.177715 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Apr 12 19:01:15.177733 kernel: Freeing SMP alternatives memory: 32K Apr 12 19:01:15.177750 kernel: pid_max: default: 32768 minimum: 301 Apr 12 19:01:15.177768 kernel: LSM: Security Framework initializing Apr 12 19:01:15.177786 kernel: SELinux: Initializing. Apr 12 19:01:15.177803 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Apr 12 19:01:15.177826 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Apr 12 19:01:15.177845 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Apr 12 19:01:15.177862 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Apr 12 19:01:15.177880 kernel: signal: max sigframe size: 1776 Apr 12 19:01:15.177897 kernel: rcu: Hierarchical SRCU implementation. Apr 12 19:01:15.177915 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Apr 12 19:01:15.177930 kernel: smp: Bringing up secondary CPUs ... Apr 12 19:01:15.177947 kernel: x86: Booting SMP configuration: Apr 12 19:01:15.177964 kernel: .... node #0, CPUs: #1 Apr 12 19:01:15.177986 kernel: kvm-clock: cpu 1, msr 201191041, secondary cpu clock Apr 12 19:01:15.178012 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Apr 12 19:01:15.178036 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Apr 12 19:01:15.178053 kernel: smp: Brought up 1 node, 2 CPUs Apr 12 19:01:15.178071 kernel: smpboot: Max logical packages: 1 Apr 12 19:01:15.178089 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Apr 12 19:01:15.178107 kernel: devtmpfs: initialized Apr 12 19:01:15.178124 kernel: x86/mm: Memory block size: 128MB Apr 12 19:01:15.178142 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Apr 12 19:01:15.178163 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 19:01:15.178181 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Apr 12 19:01:15.178199 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 19:01:15.178216 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 19:01:15.178234 kernel: audit: initializing netlink subsys (disabled) Apr 12 19:01:15.178252 kernel: audit: type=2000 audit(1712948473.633:1): state=initialized audit_enabled=0 res=1 Apr 12 19:01:15.178282 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 19:01:15.180801 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 19:01:15.180822 kernel: cpuidle: using governor menu Apr 12 19:01:15.180847 kernel: ACPI: bus type PCI registered Apr 12 19:01:15.180865 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 19:01:15.180883 kernel: dca service started, version 1.12.1 Apr 12 19:01:15.181042 kernel: PCI: Using configuration type 1 for base access Apr 12 19:01:15.181061 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 19:01:15.181080 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 19:01:15.181097 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 19:01:15.181252 kernel: ACPI: Added _OSI(Module Device) Apr 12 19:01:15.181319 kernel: ACPI: Added _OSI(Processor Device) Apr 12 19:01:15.181492 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 19:01:15.181509 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 19:01:15.181526 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 19:01:15.181635 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 19:01:15.181654 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 19:01:15.181671 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Apr 12 19:01:15.181688 kernel: ACPI: Interpreter enabled Apr 12 19:01:15.181705 kernel: ACPI: PM: (supports S0 S3 S5) Apr 12 19:01:15.181722 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 19:01:15.181745 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 19:01:15.181762 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Apr 12 19:01:15.181779 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Apr 12 19:01:15.182058 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Apr 12 19:01:15.182226 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Apr 12 19:01:15.182248 kernel: PCI host bridge to bus 0000:00 Apr 12 19:01:15.182454 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 19:01:15.182614 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 19:01:15.182767 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 19:01:15.182914 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Apr 12 19:01:15.183074 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 19:01:15.183263 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Apr 12 19:01:15.183463 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Apr 12 19:01:15.183648 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Apr 12 19:01:15.183839 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Apr 12 19:01:15.184030 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Apr 12 19:01:15.184201 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Apr 12 19:01:15.184400 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Apr 12 19:01:15.184588 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Apr 12 19:01:15.184757 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Apr 12 19:01:15.184929 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Apr 12 19:01:15.185130 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Apr 12 19:01:15.192662 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Apr 12 19:01:15.192889 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Apr 12 19:01:15.192913 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Apr 12 19:01:15.192932 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Apr 12 19:01:15.192950 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Apr 12 19:01:15.192976 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Apr 12 19:01:15.192994 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Apr 12 19:01:15.193017 kernel: iommu: Default domain type: Translated Apr 12 19:01:15.193032 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 19:01:15.193047 kernel: vgaarb: loaded Apr 12 19:01:15.193061 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 19:01:15.193076 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 19:01:15.193092 kernel: PTP clock support registered Apr 12 19:01:15.193107 kernel: Registered efivars operations Apr 12 19:01:15.193128 kernel: PCI: Using ACPI for IRQ routing Apr 12 19:01:15.193144 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 19:01:15.193161 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Apr 12 19:01:15.193179 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Apr 12 19:01:15.193196 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Apr 12 19:01:15.193213 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Apr 12 19:01:15.193230 kernel: clocksource: Switched to clocksource kvm-clock Apr 12 19:01:15.193248 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 19:01:15.193335 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 19:01:15.193360 kernel: pnp: PnP ACPI init Apr 12 19:01:15.193378 kernel: pnp: PnP ACPI: found 7 devices Apr 12 19:01:15.193396 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 19:01:15.193413 kernel: NET: Registered PF_INET protocol family Apr 12 19:01:15.193431 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Apr 12 19:01:15.193449 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Apr 12 19:01:15.193467 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 19:01:15.193486 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 19:01:15.193503 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Apr 12 19:01:15.193525 kernel: TCP: Hash tables configured (established 65536 bind 65536) Apr 12 19:01:15.193544 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Apr 12 19:01:15.193562 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Apr 12 19:01:15.193580 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 19:01:15.193598 kernel: NET: Registered PF_XDP protocol family Apr 12 19:01:15.193777 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 19:01:15.193928 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 19:01:15.194085 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 19:01:15.194241 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Apr 12 19:01:15.194440 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Apr 12 19:01:15.194466 kernel: PCI: CLS 0 bytes, default 64 Apr 12 19:01:15.194483 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Apr 12 19:01:15.194501 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Apr 12 19:01:15.194524 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Apr 12 19:01:15.194541 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Apr 12 19:01:15.194558 kernel: clocksource: Switched to clocksource tsc Apr 12 19:01:15.194582 kernel: Initialise system trusted keyrings Apr 12 19:01:15.194600 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Apr 12 19:01:15.194616 kernel: Key type asymmetric registered Apr 12 19:01:15.194635 kernel: Asymmetric key parser 'x509' registered Apr 12 19:01:15.194652 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 19:01:15.194669 kernel: io scheduler mq-deadline registered Apr 12 19:01:15.194684 kernel: io scheduler kyber registered Apr 12 19:01:15.194698 kernel: io scheduler bfq registered Apr 12 19:01:15.194713 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 19:01:15.194734 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Apr 12 19:01:15.194912 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Apr 12 19:01:15.194937 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Apr 12 19:01:15.195121 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Apr 12 19:01:15.195144 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Apr 12 19:01:15.195327 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Apr 12 19:01:15.195351 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 19:01:15.195370 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 19:01:15.195388 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Apr 12 19:01:15.195411 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Apr 12 19:01:15.195430 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Apr 12 19:01:15.195611 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Apr 12 19:01:15.195637 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Apr 12 19:01:15.195655 kernel: i8042: Warning: Keylock active Apr 12 19:01:15.195673 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Apr 12 19:01:15.195691 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Apr 12 19:01:15.195860 kernel: rtc_cmos 00:00: RTC can wake from S4 Apr 12 19:01:15.196029 kernel: rtc_cmos 00:00: registered as rtc0 Apr 12 19:01:15.196187 kernel: rtc_cmos 00:00: setting system clock to 2024-04-12T19:01:14 UTC (1712948474) Apr 12 19:01:15.196853 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Apr 12 19:01:15.196894 kernel: intel_pstate: CPU model not supported Apr 12 19:01:15.197057 kernel: pstore: Registered efi as persistent store backend Apr 12 19:01:15.197078 kernel: NET: Registered PF_INET6 protocol family Apr 12 19:01:15.197097 kernel: Segment Routing with IPv6 Apr 12 19:01:15.197115 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 19:01:15.197142 kernel: NET: Registered PF_PACKET protocol family Apr 12 19:01:15.197160 kernel: Key type dns_resolver registered Apr 12 19:01:15.197179 kernel: IPI shorthand broadcast: enabled Apr 12 19:01:15.197197 kernel: sched_clock: Marking stable (858359101, 201470015)->(1144335339, -84506223) Apr 12 19:01:15.197215 kernel: registered taskstats version 1 Apr 12 19:01:15.197455 kernel: Loading compiled-in X.509 certificates Apr 12 19:01:15.197659 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Apr 12 19:01:15.197678 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 19:01:15.197695 kernel: Key type .fscrypt registered Apr 12 19:01:15.197719 kernel: Key type fscrypt-provisioning registered Apr 12 19:01:15.197736 kernel: pstore: Using crash dump compression: deflate Apr 12 19:01:15.197754 kernel: ima: Allocated hash algorithm: sha1 Apr 12 19:01:15.197771 kernel: ima: No architecture policies found Apr 12 19:01:15.197788 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 19:01:15.197806 kernel: Write protecting the kernel read-only data: 28672k Apr 12 19:01:15.197823 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 19:01:15.197841 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 19:01:15.197862 kernel: Run /init as init process Apr 12 19:01:15.197879 kernel: with arguments: Apr 12 19:01:15.197896 kernel: /init Apr 12 19:01:15.197912 kernel: with environment: Apr 12 19:01:15.197929 kernel: HOME=/ Apr 12 19:01:15.197946 kernel: TERM=linux Apr 12 19:01:15.198065 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 19:01:15.198090 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 19:01:15.198118 systemd[1]: Detected virtualization kvm. Apr 12 19:01:15.198136 systemd[1]: Detected architecture x86-64. Apr 12 19:01:15.198154 systemd[1]: Running in initrd. Apr 12 19:01:15.198172 systemd[1]: No hostname configured, using default hostname. Apr 12 19:01:15.198190 systemd[1]: Hostname set to . Apr 12 19:01:15.198209 systemd[1]: Initializing machine ID from VM UUID. Apr 12 19:01:15.198227 systemd[1]: Queued start job for default target initrd.target. Apr 12 19:01:15.198245 systemd[1]: Started systemd-ask-password-console.path. Apr 12 19:01:15.198278 systemd[1]: Reached target cryptsetup.target. Apr 12 19:01:15.198297 systemd[1]: Reached target paths.target. Apr 12 19:01:15.198315 systemd[1]: Reached target slices.target. Apr 12 19:01:15.198333 systemd[1]: Reached target swap.target. Apr 12 19:01:15.198351 systemd[1]: Reached target timers.target. Apr 12 19:01:15.198370 systemd[1]: Listening on iscsid.socket. Apr 12 19:01:15.198388 systemd[1]: Listening on iscsiuio.socket. Apr 12 19:01:15.198412 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 19:01:15.198435 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 19:01:15.198453 systemd[1]: Listening on systemd-journald.socket. Apr 12 19:01:15.198471 systemd[1]: Listening on systemd-networkd.socket. Apr 12 19:01:15.198489 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 19:01:15.198508 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 19:01:15.198525 systemd[1]: Reached target sockets.target. Apr 12 19:01:15.198544 systemd[1]: Starting kmod-static-nodes.service... Apr 12 19:01:15.198562 systemd[1]: Finished network-cleanup.service. Apr 12 19:01:15.198585 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 19:01:15.198603 systemd[1]: Starting systemd-journald.service... Apr 12 19:01:15.198622 systemd[1]: Starting systemd-modules-load.service... Apr 12 19:01:15.198661 systemd[1]: Starting systemd-resolved.service... Apr 12 19:01:15.198684 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 19:01:15.198702 systemd[1]: Finished kmod-static-nodes.service. Apr 12 19:01:15.198722 kernel: audit: type=1130 audit(1712948475.184:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:15.198744 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 19:01:15.198771 systemd-journald[190]: Journal started Apr 12 19:01:15.198872 systemd-journald[190]: Runtime Journal (/run/log/journal/1093e094a4c371abe657adaea8cd16ce) is 8.0M, max 148.8M, 140.8M free. Apr 12 19:01:15.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:15.203320 systemd-modules-load[191]: Inserted module 'overlay' Apr 12 19:01:15.212426 kernel: audit: type=1130 audit(1712948475.203:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:15.212475 systemd[1]: Started systemd-journald.service. Apr 12 19:01:15.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:15.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:15.219044 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 19:01:15.236461 kernel: audit: type=1130 audit(1712948475.217:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:15.236507 kernel: audit: type=1130 audit(1712948475.226:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:15.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:15.229208 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 19:01:15.242077 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 19:01:15.264028 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 19:01:15.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:15.271291 kernel: audit: type=1130 audit(1712948475.262:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:15.275614 systemd-resolved[192]: Positive Trust Anchors: Apr 12 19:01:15.275640 systemd-resolved[192]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 19:01:15.275701 systemd-resolved[192]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 19:01:15.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:15.280692 systemd-resolved[192]: Defaulting to hostname 'linux'. Apr 12 19:01:15.282440 systemd[1]: Started systemd-resolved.service. Apr 12 19:01:15.282895 systemd[1]: Reached target nss-lookup.target. Apr 12 19:01:15.303307 kernel: audit: type=1130 audit(1712948475.281:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:15.322305 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 19:01:15.322495 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 19:01:15.368378 kernel: Bridge firewalling registered Apr 12 19:01:15.368566 kernel: audit: type=1130 audit(1712948475.331:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:15.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:15.358679 systemd-modules-load[191]: Inserted module 'br_netfilter' Apr 12 19:01:15.360346 systemd[1]: Starting dracut-cmdline.service... Apr 12 19:01:15.385603 dracut-cmdline[206]: dracut-dracut-053 Apr 12 19:01:15.385603 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 19:01:15.469476 kernel: SCSI subsystem initialized Apr 12 19:01:15.469527 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 19:01:15.469551 kernel: device-mapper: uevent: version 1.0.3 Apr 12 19:01:15.469574 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 19:01:15.450893 systemd-modules-load[191]: Inserted module 'dm_multipath' Apr 12 19:01:15.553496 kernel: audit: type=1130 audit(1712948475.476:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:15.553545 kernel: Loading iSCSI transport class v2.0-870. Apr 12 19:01:15.553566 kernel: audit: type=1130 audit(1712948475.520:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:15.553588 kernel: iscsi: registered transport (tcp) Apr 12 19:01:15.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:15.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:15.452135 systemd[1]: Finished systemd-modules-load.service. Apr 12 19:01:15.479061 systemd[1]: Starting systemd-sysctl.service... Apr 12 19:01:15.512997 systemd[1]: Finished systemd-sysctl.service. Apr 12 19:01:15.591358 kernel: iscsi: registered transport (qla4xxx) Apr 12 19:01:15.591499 kernel: QLogic iSCSI HBA Driver Apr 12 19:01:15.642726 systemd[1]: Finished dracut-cmdline.service. Apr 12 19:01:15.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:15.652991 systemd[1]: Starting dracut-pre-udev.service... Apr 12 19:01:15.719356 kernel: raid6: avx2x4 gen() 19725 MB/s Apr 12 19:01:15.740354 kernel: raid6: avx2x4 xor() 6655 MB/s Apr 12 19:01:15.761368 kernel: raid6: avx2x2 gen() 19435 MB/s Apr 12 19:01:15.782332 kernel: raid6: avx2x2 xor() 18035 MB/s Apr 12 19:01:15.803384 kernel: raid6: avx2x1 gen() 18373 MB/s Apr 12 19:01:15.824370 kernel: raid6: avx2x1 xor() 15760 MB/s Apr 12 19:01:15.845324 kernel: raid6: sse2x4 gen() 10338 MB/s Apr 12 19:01:15.866393 kernel: raid6: sse2x4 xor() 6053 MB/s Apr 12 19:01:15.887346 kernel: raid6: sse2x2 gen() 10801 MB/s Apr 12 19:01:15.908324 kernel: raid6: sse2x2 xor() 7363 MB/s Apr 12 19:01:15.929331 kernel: raid6: sse2x1 gen() 9602 MB/s Apr 12 19:01:15.955593 kernel: raid6: sse2x1 xor() 4960 MB/s Apr 12 19:01:15.955716 kernel: raid6: using algorithm avx2x4 gen() 19725 MB/s Apr 12 19:01:15.955740 kernel: raid6: .... xor() 6655 MB/s, rmw enabled Apr 12 19:01:15.960864 kernel: raid6: using avx2x2 recovery algorithm Apr 12 19:01:15.987328 kernel: xor: automatically using best checksumming function avx Apr 12 19:01:16.103322 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 19:01:16.116187 systemd[1]: Finished dracut-pre-udev.service. Apr 12 19:01:16.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:16.124000 audit: BPF prog-id=7 op=LOAD Apr 12 19:01:16.124000 audit: BPF prog-id=8 op=LOAD Apr 12 19:01:16.126231 systemd[1]: Starting systemd-udevd.service... Apr 12 19:01:16.145117 systemd-udevd[388]: Using default interface naming scheme 'v252'. Apr 12 19:01:16.152750 systemd[1]: Started systemd-udevd.service. Apr 12 19:01:16.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:16.170937 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 19:01:16.187578 dracut-pre-trigger[393]: rd.md=0: removing MD RAID activation Apr 12 19:01:16.227171 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 19:01:16.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:16.238217 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 19:01:16.309241 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 19:01:16.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:16.391309 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 19:01:16.418308 kernel: scsi host0: Virtio SCSI HBA Apr 12 19:01:16.485112 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Apr 12 19:01:16.511230 kernel: AVX2 version of gcm_enc/dec engaged. Apr 12 19:01:16.511336 kernel: AES CTR mode by8 optimization enabled Apr 12 19:01:16.587744 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Apr 12 19:01:16.588215 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Apr 12 19:01:16.588451 kernel: sd 0:0:1:0: [sda] Write Protect is off Apr 12 19:01:16.593107 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Apr 12 19:01:16.593618 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Apr 12 19:01:16.621063 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 19:01:16.621185 kernel: GPT:17805311 != 25165823 Apr 12 19:01:16.621209 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 19:01:16.627380 kernel: GPT:17805311 != 25165823 Apr 12 19:01:16.631209 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 19:01:16.637006 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 19:01:16.649867 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Apr 12 19:01:16.701906 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 19:01:16.730452 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (433) Apr 12 19:01:16.731034 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 19:01:16.731190 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 19:01:16.736117 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 19:01:16.779602 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 19:01:16.790118 systemd[1]: Starting disk-uuid.service... Apr 12 19:01:16.825458 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 19:01:16.825624 disk-uuid[504]: Primary Header is updated. Apr 12 19:01:16.825624 disk-uuid[504]: Secondary Entries is updated. Apr 12 19:01:16.825624 disk-uuid[504]: Secondary Header is updated. Apr 12 19:01:16.851481 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 19:01:16.858310 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 19:01:17.855006 disk-uuid[505]: The operation has completed successfully. Apr 12 19:01:17.864433 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 19:01:17.926521 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 19:01:17.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:17.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:17.926685 systemd[1]: Finished disk-uuid.service. Apr 12 19:01:17.959621 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Apr 12 19:01:17.933021 systemd[1]: Starting verity-setup.service... Apr 12 19:01:18.043969 systemd[1]: Found device dev-mapper-usr.device. Apr 12 19:01:18.045700 systemd[1]: Mounting sysusr-usr.mount... Apr 12 19:01:18.074904 systemd[1]: Finished verity-setup.service. Apr 12 19:01:18.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:18.148309 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 19:01:18.148570 systemd[1]: Mounted sysusr-usr.mount. Apr 12 19:01:18.148958 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 19:01:18.207451 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 19:01:18.207492 kernel: BTRFS info (device sda6): using free space tree Apr 12 19:01:18.207515 kernel: BTRFS info (device sda6): has skinny extents Apr 12 19:01:18.207536 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 19:01:18.149866 systemd[1]: Starting ignition-setup.service... Apr 12 19:01:18.189481 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 19:01:18.221779 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 19:01:18.242514 systemd[1]: Finished ignition-setup.service. Apr 12 19:01:18.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:18.244038 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 19:01:18.315722 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 19:01:18.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:18.315000 audit: BPF prog-id=9 op=LOAD Apr 12 19:01:18.318045 systemd[1]: Starting systemd-networkd.service... Apr 12 19:01:18.352676 systemd-networkd[679]: lo: Link UP Apr 12 19:01:18.352691 systemd-networkd[679]: lo: Gained carrier Apr 12 19:01:18.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:18.353970 systemd-networkd[679]: Enumeration completed Apr 12 19:01:18.354116 systemd[1]: Started systemd-networkd.service. Apr 12 19:01:18.354543 systemd-networkd[679]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 19:01:18.357500 systemd-networkd[679]: eth0: Link UP Apr 12 19:01:18.357508 systemd-networkd[679]: eth0: Gained carrier Apr 12 19:01:18.367399 systemd-networkd[679]: eth0: DHCPv4 address 10.128.0.26/32, gateway 10.128.0.1 acquired from 169.254.169.254 Apr 12 19:01:18.369684 systemd[1]: Reached target network.target. Apr 12 19:01:18.385798 systemd[1]: Starting iscsiuio.service... Apr 12 19:01:18.395456 systemd[1]: Started iscsiuio.service. Apr 12 19:01:18.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:18.473875 systemd[1]: Starting iscsid.service... Apr 12 19:01:18.481625 systemd[1]: Started iscsid.service. Apr 12 19:01:18.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:18.503521 iscsid[688]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 19:01:18.503521 iscsid[688]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 19:01:18.503521 iscsid[688]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 19:01:18.503521 iscsid[688]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 19:01:18.503521 iscsid[688]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 19:01:18.503521 iscsid[688]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 19:01:18.503521 iscsid[688]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 19:01:18.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:18.497772 systemd[1]: Starting dracut-initqueue.service... Apr 12 19:01:18.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:18.536756 ignition[610]: Ignition 2.14.0 Apr 12 19:01:18.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:18.518179 systemd[1]: Finished dracut-initqueue.service. Apr 12 19:01:18.536771 ignition[610]: Stage: fetch-offline Apr 12 19:01:18.529589 systemd[1]: Reached target remote-fs-pre.target. Apr 12 19:01:18.536926 ignition[610]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:01:18.565461 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 19:01:18.536975 ignition[610]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 19:01:18.592549 systemd[1]: Reached target remote-fs.target. Apr 12 19:01:18.559583 ignition[610]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 19:01:18.610154 systemd[1]: Starting dracut-pre-mount.service... Apr 12 19:01:18.559823 ignition[610]: parsed url from cmdline: "" Apr 12 19:01:18.632121 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 19:01:18.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:18.559828 ignition[610]: no config URL provided Apr 12 19:01:18.658099 systemd[1]: Finished dracut-pre-mount.service. Apr 12 19:01:18.559835 ignition[610]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 19:01:18.678496 systemd[1]: Starting ignition-fetch.service... Apr 12 19:01:18.559847 ignition[610]: no config at "/usr/lib/ignition/user.ign" Apr 12 19:01:18.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:18.751858 unknown[703]: fetched base config from "system" Apr 12 19:01:18.559857 ignition[610]: failed to fetch config: resource requires networking Apr 12 19:01:18.751867 unknown[703]: fetched base config from "system" Apr 12 19:01:18.560144 ignition[610]: Ignition finished successfully Apr 12 19:01:18.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:18.751874 unknown[703]: fetched user config from "gcp" Apr 12 19:01:18.693253 ignition[703]: Ignition 2.14.0 Apr 12 19:01:18.754715 systemd[1]: Finished ignition-fetch.service. Apr 12 19:01:18.693383 ignition[703]: Stage: fetch Apr 12 19:01:18.772416 systemd[1]: Starting ignition-kargs.service... Apr 12 19:01:18.693555 ignition[703]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:01:18.805095 systemd[1]: Finished ignition-kargs.service. Apr 12 19:01:18.693589 ignition[703]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 19:01:18.828447 systemd[1]: Starting ignition-disks.service... Apr 12 19:01:18.702529 ignition[703]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 19:01:18.861123 systemd[1]: Finished ignition-disks.service. Apr 12 19:01:18.702728 ignition[703]: parsed url from cmdline: "" Apr 12 19:01:18.875942 systemd[1]: Reached target initrd-root-device.target. Apr 12 19:01:18.702735 ignition[703]: no config URL provided Apr 12 19:01:18.891623 systemd[1]: Reached target local-fs-pre.target. Apr 12 19:01:18.702746 ignition[703]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 19:01:18.907615 systemd[1]: Reached target local-fs.target. Apr 12 19:01:18.702759 ignition[703]: no config at "/usr/lib/ignition/user.ign" Apr 12 19:01:18.913666 systemd[1]: Reached target sysinit.target. Apr 12 19:01:18.702802 ignition[703]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Apr 12 19:01:18.926787 systemd[1]: Reached target basic.target. Apr 12 19:01:18.711667 ignition[703]: GET result: OK Apr 12 19:01:18.946299 systemd[1]: Starting systemd-fsck-root.service... Apr 12 19:01:18.711827 ignition[703]: parsing config with SHA512: c211d195a9930aae2b834f92a4de8c4c13c6ee1335e221f7004b6475e6e05557245b7a42875bcd5ba33ab0e3cda2790363f1469c48ad6e57b8bf8662b7d3e0a7 Apr 12 19:01:18.752555 ignition[703]: fetch: fetch complete Apr 12 19:01:18.752563 ignition[703]: fetch: fetch passed Apr 12 19:01:18.752627 ignition[703]: Ignition finished successfully Apr 12 19:01:18.790426 ignition[709]: Ignition 2.14.0 Apr 12 19:01:18.790439 ignition[709]: Stage: kargs Apr 12 19:01:18.790630 ignition[709]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:01:18.790671 ignition[709]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 19:01:18.800628 ignition[709]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 19:01:18.802239 ignition[709]: kargs: kargs passed Apr 12 19:01:18.802379 ignition[709]: Ignition finished successfully Apr 12 19:01:18.842731 ignition[715]: Ignition 2.14.0 Apr 12 19:01:18.842745 ignition[715]: Stage: disks Apr 12 19:01:18.842963 ignition[715]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:01:18.843000 ignition[715]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 19:01:18.852490 ignition[715]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 19:01:18.854154 ignition[715]: disks: disks passed Apr 12 19:01:18.854214 ignition[715]: Ignition finished successfully Apr 12 19:01:18.989385 systemd-fsck[723]: ROOT: clean, 612/1628000 files, 124056/1617920 blocks Apr 12 19:01:19.152565 systemd[1]: Finished systemd-fsck-root.service. Apr 12 19:01:19.192494 kernel: kauditd_printk_skb: 22 callbacks suppressed Apr 12 19:01:19.192555 kernel: audit: type=1130 audit(1712948479.151:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:19.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:19.154605 systemd[1]: Mounting sysroot.mount... Apr 12 19:01:19.209524 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 19:01:19.217837 systemd[1]: Mounted sysroot.mount. Apr 12 19:01:19.218221 systemd[1]: Reached target initrd-root-fs.target. Apr 12 19:01:19.244162 systemd[1]: Mounting sysroot-usr.mount... Apr 12 19:01:19.261000 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 19:01:19.261090 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 19:01:19.261167 systemd[1]: Reached target ignition-diskful.target. Apr 12 19:01:19.331603 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (729) Apr 12 19:01:19.331656 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 19:01:19.331683 kernel: BTRFS info (device sda6): using free space tree Apr 12 19:01:19.262748 systemd[1]: Mounted sysroot-usr.mount. Apr 12 19:01:19.350524 kernel: BTRFS info (device sda6): has skinny extents Apr 12 19:01:19.292963 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 19:01:19.373052 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 19:01:19.319423 systemd[1]: Starting initrd-setup-root.service... Apr 12 19:01:19.388570 initrd-setup-root[734]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 19:01:19.383561 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 19:01:19.415542 initrd-setup-root[758]: cut: /sysroot/etc/group: No such file or directory Apr 12 19:01:19.425498 initrd-setup-root[768]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 19:01:19.435497 initrd-setup-root[776]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 19:01:19.465697 systemd[1]: Finished initrd-setup-root.service. Apr 12 19:01:19.499524 kernel: audit: type=1130 audit(1712948479.464:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:19.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:19.467378 systemd[1]: Starting ignition-mount.service... Apr 12 19:01:19.507909 systemd[1]: Starting sysroot-boot.service... Apr 12 19:01:19.521681 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 19:01:19.521811 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 19:01:19.546494 ignition[794]: INFO : Ignition 2.14.0 Apr 12 19:01:19.546494 ignition[794]: INFO : Stage: mount Apr 12 19:01:19.546494 ignition[794]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:01:19.546494 ignition[794]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 19:01:19.651567 kernel: audit: type=1130 audit(1712948479.571:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:19.651624 kernel: audit: type=1130 audit(1712948479.603:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:19.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:19.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:19.556377 systemd[1]: Finished sysroot-boot.service. Apr 12 19:01:19.666512 ignition[794]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 19:01:19.666512 ignition[794]: INFO : mount: mount passed Apr 12 19:01:19.666512 ignition[794]: INFO : Ignition finished successfully Apr 12 19:01:19.733658 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (804) Apr 12 19:01:19.733710 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 19:01:19.733726 kernel: BTRFS info (device sda6): using free space tree Apr 12 19:01:19.733741 kernel: BTRFS info (device sda6): has skinny extents Apr 12 19:01:19.733755 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 19:01:19.573142 systemd[1]: Finished ignition-mount.service. Apr 12 19:01:19.606536 systemd[1]: Starting ignition-files.service... Apr 12 19:01:19.663301 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 19:01:19.765067 ignition[823]: INFO : Ignition 2.14.0 Apr 12 19:01:19.765067 ignition[823]: INFO : Stage: files Apr 12 19:01:19.765067 ignition[823]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:01:19.765067 ignition[823]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 19:01:19.823453 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (826) Apr 12 19:01:19.726713 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 19:01:19.832496 ignition[823]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 19:01:19.832496 ignition[823]: DEBUG : files: compiled without relabeling support, skipping Apr 12 19:01:19.832496 ignition[823]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 19:01:19.832496 ignition[823]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 19:01:19.832496 ignition[823]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 19:01:19.832496 ignition[823]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 19:01:19.832496 ignition[823]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 19:01:19.832496 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Apr 12 19:01:19.832496 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 19:01:19.832496 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem593161852" Apr 12 19:01:19.832496 ignition[823]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem593161852": device or resource busy Apr 12 19:01:19.832496 ignition[823]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem593161852", trying btrfs: device or resource busy Apr 12 19:01:19.832496 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem593161852" Apr 12 19:01:19.832496 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem593161852" Apr 12 19:01:19.832496 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem593161852" Apr 12 19:01:19.832496 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem593161852" Apr 12 19:01:19.832496 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Apr 12 19:01:19.832496 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 19:01:19.790915 unknown[823]: wrote ssh authorized keys file for user: core Apr 12 19:01:20.112560 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Apr 12 19:01:20.134457 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Apr 12 19:01:20.177663 systemd-networkd[679]: eth0: Gained IPv6LL Apr 12 19:01:20.406937 ignition[823]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Apr 12 19:01:20.431544 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 19:01:20.431544 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 19:01:20.431544 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Apr 12 19:01:20.621715 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Apr 12 19:01:20.746936 ignition[823]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Apr 12 19:01:20.770522 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 19:01:20.770522 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Apr 12 19:01:20.770522 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(9): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 19:01:20.770522 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem129264421" Apr 12 19:01:20.770522 ignition[823]: CRITICAL : files: createFilesystemsFiles: createFiles: op(9): op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem129264421": device or resource busy Apr 12 19:01:20.770522 ignition[823]: ERROR : files: createFilesystemsFiles: createFiles: op(9): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem129264421", trying btrfs: device or resource busy Apr 12 19:01:20.770522 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem129264421" Apr 12 19:01:20.770522 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem129264421" Apr 12 19:01:20.770522 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [started] unmounting "/mnt/oem129264421" Apr 12 19:01:20.770522 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [finished] unmounting "/mnt/oem129264421" Apr 12 19:01:20.770522 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Apr 12 19:01:20.770522 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 19:01:20.770522 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(d): GET https://dl.k8s.io/release/v1.29.2/bin/linux/amd64/kubeadm: attempt #1 Apr 12 19:01:20.768238 systemd[1]: mnt-oem129264421.mount: Deactivated successfully. Apr 12 19:01:21.001586 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(d): GET result: OK Apr 12 19:01:21.179253 ignition[823]: DEBUG : files: createFilesystemsFiles: createFiles: op(d): file matches expected sum of: 4261cb0319688a0557b3052cce8df9d754abc38d5fc8e0eeeb63a85a2194895fdca5bad464f8516459ed7b1764d7bbb2304f5f434d42bb35f38764b4b00ce663 Apr 12 19:01:21.204488 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 19:01:21.204488 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 19:01:21.204488 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://dl.k8s.io/release/v1.29.2/bin/linux/amd64/kubelet: attempt #1 Apr 12 19:01:21.204488 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Apr 12 19:01:21.742306 ignition[823]: DEBUG : files: createFilesystemsFiles: createFiles: op(e): file matches expected sum of: d3fef1d4b99415179ecb94d4de953bddb74c0fb0f798265829b899bb031e2ab8c2b60037b79a66405a9b102d3db0d90e9257595f4b11660356de0e2e63744cd7 Apr 12 19:01:21.766500 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 19:01:21.766500 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/home/core/install.sh" Apr 12 19:01:21.766500 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 19:01:21.766500 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 19:01:21.766500 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 19:01:21.766500 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 19:01:21.766500 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 19:01:21.766500 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Apr 12 19:01:21.766500 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 19:01:21.766500 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2455271629" Apr 12 19:01:21.766500 ignition[823]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2455271629": device or resource busy Apr 12 19:01:21.766500 ignition[823]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2455271629", trying btrfs: device or resource busy Apr 12 19:01:21.766500 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2455271629" Apr 12 19:01:21.766500 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2455271629" Apr 12 19:01:21.766500 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem2455271629" Apr 12 19:01:22.209485 kernel: audit: type=1130 audit(1712948481.828:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.209546 kernel: audit: type=1130 audit(1712948481.925:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.209576 kernel: audit: type=1130 audit(1712948481.972:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.209598 kernel: audit: type=1131 audit(1712948481.972:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.209635 kernel: audit: type=1130 audit(1712948482.112:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.209652 kernel: audit: type=1131 audit(1712948482.112:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:21.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:21.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:21.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:21.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:21.764729 systemd[1]: mnt-oem2455271629.mount: Deactivated successfully. Apr 12 19:01:22.224468 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem2455271629" Apr 12 19:01:22.224468 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Apr 12 19:01:22.224468 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Apr 12 19:01:22.224468 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(16): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 19:01:22.224468 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(17): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem447833465" Apr 12 19:01:22.224468 ignition[823]: CRITICAL : files: createFilesystemsFiles: createFiles: op(16): op(17): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem447833465": device or resource busy Apr 12 19:01:22.224468 ignition[823]: ERROR : files: createFilesystemsFiles: createFiles: op(16): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem447833465", trying btrfs: device or resource busy Apr 12 19:01:22.224468 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem447833465" Apr 12 19:01:22.224468 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem447833465" Apr 12 19:01:22.224468 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [started] unmounting "/mnt/oem447833465" Apr 12 19:01:22.224468 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [finished] unmounting "/mnt/oem447833465" Apr 12 19:01:22.224468 ignition[823]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Apr 12 19:01:22.224468 ignition[823]: INFO : files: op(1a): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 19:01:22.224468 ignition[823]: INFO : files: op(1a): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 19:01:22.224468 ignition[823]: INFO : files: op(1b): [started] processing unit "oem-gce.service" Apr 12 19:01:22.224468 ignition[823]: INFO : files: op(1b): [finished] processing unit "oem-gce.service" Apr 12 19:01:22.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:21.793698 systemd[1]: mnt-oem447833465.mount: Deactivated successfully. Apr 12 19:01:22.575512 ignition[823]: INFO : files: op(1c): [started] processing unit "oem-gce-enable-oslogin.service" Apr 12 19:01:22.575512 ignition[823]: INFO : files: op(1c): [finished] processing unit "oem-gce-enable-oslogin.service" Apr 12 19:01:22.575512 ignition[823]: INFO : files: op(1d): [started] processing unit "prepare-cni-plugins.service" Apr 12 19:01:22.575512 ignition[823]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 19:01:22.575512 ignition[823]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 19:01:22.575512 ignition[823]: INFO : files: op(1d): [finished] processing unit "prepare-cni-plugins.service" Apr 12 19:01:22.575512 ignition[823]: INFO : files: op(1f): [started] processing unit "prepare-critools.service" Apr 12 19:01:22.575512 ignition[823]: INFO : files: op(1f): op(20): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 19:01:22.575512 ignition[823]: INFO : files: op(1f): op(20): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 19:01:22.575512 ignition[823]: INFO : files: op(1f): [finished] processing unit "prepare-critools.service" Apr 12 19:01:22.575512 ignition[823]: INFO : files: op(21): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Apr 12 19:01:22.575512 ignition[823]: INFO : files: op(21): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Apr 12 19:01:22.575512 ignition[823]: INFO : files: op(22): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 19:01:22.575512 ignition[823]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 19:01:22.575512 ignition[823]: INFO : files: op(23): [started] setting preset to enabled for "prepare-critools.service" Apr 12 19:01:22.575512 ignition[823]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 19:01:22.575512 ignition[823]: INFO : files: op(24): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 19:01:22.575512 ignition[823]: INFO : files: op(24): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 19:01:22.575512 ignition[823]: INFO : files: op(25): [started] setting preset to enabled for "oem-gce.service" Apr 12 19:01:22.575512 ignition[823]: INFO : files: op(25): [finished] setting preset to enabled for "oem-gce.service" Apr 12 19:01:22.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:21.810676 systemd[1]: Finished ignition-files.service. Apr 12 19:01:22.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.976766 ignition[823]: INFO : files: createResultFile: createFiles: op(26): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 19:01:22.976766 ignition[823]: INFO : files: createResultFile: createFiles: op(26): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 19:01:22.976766 ignition[823]: INFO : files: files passed Apr 12 19:01:22.976766 ignition[823]: INFO : Ignition finished successfully Apr 12 19:01:22.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:23.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:23.056813 initrd-setup-root-after-ignition[846]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 19:01:21.841487 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 19:01:21.879580 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 19:01:21.881026 systemd[1]: Starting ignition-quench.service... Apr 12 19:01:21.902192 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 19:01:21.927054 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 19:01:23.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:21.927224 systemd[1]: Finished ignition-quench.service. Apr 12 19:01:23.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:21.973923 systemd[1]: Reached target ignition-complete.target. Apr 12 19:01:23.195574 ignition[861]: INFO : Ignition 2.14.0 Apr 12 19:01:23.195574 ignition[861]: INFO : Stage: umount Apr 12 19:01:23.195574 ignition[861]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:01:23.195574 ignition[861]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 19:01:23.195574 ignition[861]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 19:01:23.195574 ignition[861]: INFO : umount: umount passed Apr 12 19:01:23.195574 ignition[861]: INFO : Ignition finished successfully Apr 12 19:01:23.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:23.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:23.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:23.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.056070 systemd[1]: Starting initrd-parse-etc.service... Apr 12 19:01:23.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.097938 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 19:01:23.324000 audit: BPF prog-id=6 op=UNLOAD Apr 12 19:01:23.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.098187 systemd[1]: Finished initrd-parse-etc.service. Apr 12 19:01:23.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.113790 systemd[1]: Reached target initrd-fs.target. Apr 12 19:01:22.194664 systemd[1]: Reached target initrd.target. Apr 12 19:01:22.216689 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 19:01:23.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.218369 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 19:01:23.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.247926 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 19:01:22.275133 systemd[1]: Starting initrd-cleanup.service... Apr 12 19:01:22.302332 systemd[1]: Stopped target nss-lookup.target. Apr 12 19:01:22.313941 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 19:01:23.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.336990 systemd[1]: Stopped target timers.target. Apr 12 19:01:23.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.361970 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 19:01:23.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.362183 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 19:01:22.389191 systemd[1]: Stopped target initrd.target. Apr 12 19:01:22.411916 systemd[1]: Stopped target basic.target. Apr 12 19:01:23.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.453820 systemd[1]: Stopped target ignition-complete.target. Apr 12 19:01:23.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.467909 systemd[1]: Stopped target ignition-diskful.target. Apr 12 19:01:23.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.491922 systemd[1]: Stopped target initrd-root-device.target. Apr 12 19:01:23.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:23.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:22.511969 systemd[1]: Stopped target remote-fs.target. Apr 12 19:01:22.548860 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 19:01:22.567836 systemd[1]: Stopped target sysinit.target. Apr 12 19:01:22.583821 systemd[1]: Stopped target local-fs.target. Apr 12 19:01:22.614821 systemd[1]: Stopped target local-fs-pre.target. Apr 12 19:01:22.627920 systemd[1]: Stopped target swap.target. Apr 12 19:01:22.652842 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 19:01:23.658498 systemd-journald[190]: Received SIGTERM from PID 1 (systemd). Apr 12 19:01:23.658613 iscsid[688]: iscsid shutting down. Apr 12 19:01:22.653062 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 19:01:22.677175 systemd[1]: Stopped target cryptsetup.target. Apr 12 19:01:22.695876 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 19:01:22.696217 systemd[1]: Stopped dracut-initqueue.service. Apr 12 19:01:22.714172 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 19:01:22.714550 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 19:01:22.762917 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 19:01:22.763141 systemd[1]: Stopped ignition-files.service. Apr 12 19:01:22.775841 systemd[1]: Stopping ignition-mount.service... Apr 12 19:01:22.816060 systemd[1]: Stopping sysroot-boot.service... Apr 12 19:01:22.834472 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 19:01:22.834814 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 19:01:22.867979 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 19:01:22.868183 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 19:01:22.885628 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 19:01:22.886722 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 19:01:22.886851 systemd[1]: Stopped ignition-mount.service. Apr 12 19:01:22.901488 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 19:01:22.901615 systemd[1]: Stopped sysroot-boot.service. Apr 12 19:01:22.921393 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 19:01:22.921603 systemd[1]: Stopped ignition-disks.service. Apr 12 19:01:22.947850 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 19:01:22.947938 systemd[1]: Stopped ignition-kargs.service. Apr 12 19:01:22.969660 systemd[1]: ignition-fetch.service: Deactivated successfully. Apr 12 19:01:22.969753 systemd[1]: Stopped ignition-fetch.service. Apr 12 19:01:22.985653 systemd[1]: Stopped target network.target. Apr 12 19:01:23.010526 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 19:01:23.010678 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 19:01:23.034681 systemd[1]: Stopped target paths.target. Apr 12 19:01:23.048471 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 19:01:23.052442 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 19:01:23.064512 systemd[1]: Stopped target slices.target. Apr 12 19:01:23.084545 systemd[1]: Stopped target sockets.target. Apr 12 19:01:23.100625 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 19:01:23.100689 systemd[1]: Closed iscsid.socket. Apr 12 19:01:23.124612 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 19:01:23.124672 systemd[1]: Closed iscsiuio.socket. Apr 12 19:01:23.138593 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 19:01:23.138690 systemd[1]: Stopped ignition-setup.service. Apr 12 19:01:23.155655 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 19:01:23.155754 systemd[1]: Stopped initrd-setup-root.service. Apr 12 19:01:23.172864 systemd[1]: Stopping systemd-networkd.service... Apr 12 19:01:23.176421 systemd-networkd[679]: eth0: DHCPv6 lease lost Apr 12 19:01:23.186911 systemd[1]: Stopping systemd-resolved.service... Apr 12 19:01:23.203514 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 19:01:23.203663 systemd[1]: Stopped systemd-resolved.service. Apr 12 19:01:23.223428 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 19:01:23.223578 systemd[1]: Stopped systemd-networkd.service. Apr 12 19:01:23.235593 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 19:01:23.235721 systemd[1]: Finished initrd-cleanup.service. Apr 12 19:01:23.271181 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 19:01:23.271259 systemd[1]: Closed systemd-networkd.socket. Apr 12 19:01:23.290014 systemd[1]: Stopping network-cleanup.service... Apr 12 19:01:23.295630 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 19:01:23.295724 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 19:01:23.317792 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 19:01:23.317879 systemd[1]: Stopped systemd-sysctl.service. Apr 12 19:01:23.333882 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 19:01:23.333971 systemd[1]: Stopped systemd-modules-load.service. Apr 12 19:01:23.349847 systemd[1]: Stopping systemd-udevd.service... Apr 12 19:01:23.358585 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 19:01:23.362317 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 19:01:23.362512 systemd[1]: Stopped network-cleanup.service. Apr 12 19:01:23.383185 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 19:01:23.383430 systemd[1]: Stopped systemd-udevd.service. Apr 12 19:01:23.403598 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 19:01:23.403654 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 19:01:23.419815 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 19:01:23.419891 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 19:01:23.440683 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 19:01:23.440773 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 19:01:23.456777 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 19:01:23.456875 systemd[1]: Stopped dracut-cmdline.service. Apr 12 19:01:23.473755 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 19:01:23.473849 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 19:01:23.491382 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 19:01:23.514606 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Apr 12 19:01:23.514750 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Apr 12 19:01:23.529836 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 19:01:23.529918 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 19:01:23.544704 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 19:01:23.544807 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 19:01:23.563469 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Apr 12 19:01:23.564234 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 19:01:23.564496 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 19:01:23.577965 systemd[1]: Reached target initrd-switch-root.target. Apr 12 19:01:23.594795 systemd[1]: Starting initrd-switch-root.service... Apr 12 19:01:23.625808 systemd[1]: Switching root. Apr 12 19:01:23.670531 systemd-journald[190]: Journal stopped Apr 12 19:01:28.720954 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 19:01:28.721060 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 19:01:28.721077 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 19:01:28.721092 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 19:01:28.721107 kernel: SELinux: policy capability open_perms=1 Apr 12 19:01:28.721121 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 19:01:28.721137 kernel: SELinux: policy capability always_check_network=0 Apr 12 19:01:28.721151 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 19:01:28.721170 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 19:01:28.721188 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 19:01:28.721209 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 19:01:28.721235 systemd[1]: Successfully loaded SELinux policy in 118.469ms. Apr 12 19:01:28.721301 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 12ms. Apr 12 19:01:28.721324 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 19:01:28.721340 systemd[1]: Detected virtualization kvm. Apr 12 19:01:28.721356 systemd[1]: Detected architecture x86-64. Apr 12 19:01:28.721372 systemd[1]: Detected first boot. Apr 12 19:01:28.721397 systemd[1]: Initializing machine ID from VM UUID. Apr 12 19:01:28.721412 kernel: kauditd_printk_skb: 36 callbacks suppressed Apr 12 19:01:28.721438 kernel: audit: type=1400 audit(1712948484.165:79): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 19:01:28.721459 kernel: audit: type=1400 audit(1712948484.165:80): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 19:01:28.721475 kernel: audit: type=1334 audit(1712948484.191:81): prog-id=10 op=LOAD Apr 12 19:01:28.721489 kernel: audit: type=1334 audit(1712948484.192:82): prog-id=10 op=UNLOAD Apr 12 19:01:28.721513 kernel: audit: type=1334 audit(1712948484.213:83): prog-id=11 op=LOAD Apr 12 19:01:28.721528 kernel: audit: type=1334 audit(1712948484.213:84): prog-id=11 op=UNLOAD Apr 12 19:01:28.721542 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 19:01:28.721557 kernel: audit: type=1400 audit(1712948484.413:85): avc: denied { associate } for pid=895 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 19:01:28.721573 kernel: audit: type=1300 audit(1712948484.413:85): arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=878 pid=895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:28.721588 kernel: audit: type=1327 audit(1712948484.413:85): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 19:01:28.721604 kernel: audit: type=1400 audit(1712948484.424:86): avc: denied { associate } for pid=895 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 19:01:28.721622 systemd[1]: Populated /etc with preset unit settings. Apr 12 19:01:28.721638 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 19:01:28.721653 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 19:01:28.721670 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 19:01:28.721687 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 19:01:28.721702 systemd[1]: Stopped iscsiuio.service. Apr 12 19:01:28.721717 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 19:01:28.721732 systemd[1]: Stopped iscsid.service. Apr 12 19:01:28.721751 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 19:01:28.721765 systemd[1]: Stopped initrd-switch-root.service. Apr 12 19:01:28.721781 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 19:01:28.721797 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 19:01:28.721812 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 19:01:28.721828 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 19:01:28.721843 systemd[1]: Created slice system-getty.slice. Apr 12 19:01:28.721861 systemd[1]: Created slice system-modprobe.slice. Apr 12 19:01:28.721877 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 19:01:28.721892 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 19:01:28.721907 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 19:01:28.721921 systemd[1]: Created slice user.slice. Apr 12 19:01:28.721939 systemd[1]: Started systemd-ask-password-console.path. Apr 12 19:01:28.721954 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 19:01:28.721969 systemd[1]: Set up automount boot.automount. Apr 12 19:01:28.721984 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 19:01:28.722002 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 19:01:28.722018 systemd[1]: Stopped target initrd-fs.target. Apr 12 19:01:28.722032 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 19:01:28.722047 systemd[1]: Reached target integritysetup.target. Apr 12 19:01:28.722062 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 19:01:28.722077 systemd[1]: Reached target remote-fs.target. Apr 12 19:01:28.722092 systemd[1]: Reached target slices.target. Apr 12 19:01:28.722107 systemd[1]: Reached target swap.target. Apr 12 19:01:28.722122 systemd[1]: Reached target torcx.target. Apr 12 19:01:28.722137 systemd[1]: Reached target veritysetup.target. Apr 12 19:01:28.722156 systemd[1]: Listening on systemd-coredump.socket. Apr 12 19:01:28.722170 systemd[1]: Listening on systemd-initctl.socket. Apr 12 19:01:28.722185 systemd[1]: Listening on systemd-networkd.socket. Apr 12 19:01:28.722200 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 19:01:28.722215 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 19:01:28.722230 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 19:01:28.722245 systemd[1]: Mounting dev-hugepages.mount... Apr 12 19:01:28.722260 systemd[1]: Mounting dev-mqueue.mount... Apr 12 19:01:28.722298 systemd[1]: Mounting media.mount... Apr 12 19:01:28.722325 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 19:01:28.722341 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 19:01:28.722355 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 19:01:28.722373 systemd[1]: Mounting tmp.mount... Apr 12 19:01:28.722393 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 19:01:28.722409 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 19:01:28.722425 systemd[1]: Starting kmod-static-nodes.service... Apr 12 19:01:28.722439 systemd[1]: Starting modprobe@configfs.service... Apr 12 19:01:28.722454 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 19:01:28.722473 systemd[1]: Starting modprobe@drm.service... Apr 12 19:01:28.722488 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 19:01:28.722503 systemd[1]: Starting modprobe@fuse.service... Apr 12 19:01:28.722518 systemd[1]: Starting modprobe@loop.service... Apr 12 19:01:28.722533 kernel: fuse: init (API version 7.34) Apr 12 19:01:28.722547 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 19:01:28.722563 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 19:01:28.722578 kernel: loop: module loaded Apr 12 19:01:28.722592 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 19:01:28.722610 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 19:01:28.722626 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 19:01:28.722641 systemd[1]: Stopped systemd-journald.service. Apr 12 19:01:28.722657 systemd[1]: Starting systemd-journald.service... Apr 12 19:01:28.722672 systemd[1]: Starting systemd-modules-load.service... Apr 12 19:01:28.722687 systemd[1]: Starting systemd-network-generator.service... Apr 12 19:01:28.722710 systemd-journald[986]: Journal started Apr 12 19:01:28.722772 systemd-journald[986]: Runtime Journal (/run/log/journal/1093e094a4c371abe657adaea8cd16ce) is 8.0M, max 148.8M, 140.8M free. Apr 12 19:01:23.670000 audit: BPF prog-id=9 op=UNLOAD Apr 12 19:01:24.009000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 19:01:24.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 19:01:24.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 19:01:24.191000 audit: BPF prog-id=10 op=LOAD Apr 12 19:01:24.192000 audit: BPF prog-id=10 op=UNLOAD Apr 12 19:01:24.213000 audit: BPF prog-id=11 op=LOAD Apr 12 19:01:24.213000 audit: BPF prog-id=11 op=UNLOAD Apr 12 19:01:24.413000 audit[895]: AVC avc: denied { associate } for pid=895 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 19:01:24.413000 audit[895]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=878 pid=895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:24.413000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 19:01:24.424000 audit[895]: AVC avc: denied { associate } for pid=895 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 19:01:24.424000 audit[895]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=878 pid=895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:24.424000 audit: CWD cwd="/" Apr 12 19:01:24.424000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:24.424000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:24.424000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 19:01:27.848000 audit: BPF prog-id=12 op=LOAD Apr 12 19:01:27.848000 audit: BPF prog-id=3 op=UNLOAD Apr 12 19:01:27.849000 audit: BPF prog-id=13 op=LOAD Apr 12 19:01:27.849000 audit: BPF prog-id=14 op=LOAD Apr 12 19:01:27.849000 audit: BPF prog-id=4 op=UNLOAD Apr 12 19:01:27.849000 audit: BPF prog-id=5 op=UNLOAD Apr 12 19:01:27.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:27.852000 audit: BPF prog-id=12 op=UNLOAD Apr 12 19:01:27.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:27.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:27.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:27.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.672000 audit: BPF prog-id=15 op=LOAD Apr 12 19:01:28.672000 audit: BPF prog-id=16 op=LOAD Apr 12 19:01:28.672000 audit: BPF prog-id=17 op=LOAD Apr 12 19:01:28.673000 audit: BPF prog-id=13 op=UNLOAD Apr 12 19:01:28.673000 audit: BPF prog-id=14 op=UNLOAD Apr 12 19:01:28.717000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 19:01:28.717000 audit[986]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7fff380a3210 a2=4000 a3=7fff380a32ac items=0 ppid=1 pid=986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:28.717000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 19:01:27.847126 systemd[1]: Queued start job for default target multi-user.target. Apr 12 19:01:24.409432 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 19:01:27.852388 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 19:01:24.410729 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:24Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 19:01:24.410758 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:24Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 19:01:24.410805 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:24Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 19:01:24.410819 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:24Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 19:01:24.410868 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:24Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 19:01:24.410885 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:24Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 19:01:24.411142 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:24Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 19:01:24.411201 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:24Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 19:01:24.411218 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:24Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 19:01:24.413417 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:24Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 19:01:24.413489 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:24Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 19:01:24.413518 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:24Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 19:01:24.413537 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:24Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 19:01:24.413562 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:24Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 19:01:24.413614 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:24Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 19:01:27.184974 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:27Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:01:27.185369 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:27Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:01:27.185550 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:27Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:01:27.185814 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:27Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:01:27.185893 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:27Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 19:01:27.186101 /usr/lib/systemd/system-generators/torcx-generator[895]: time="2024-04-12T19:01:27Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 19:01:28.733319 systemd[1]: Starting systemd-remount-fs.service... Apr 12 19:01:28.748535 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 19:01:28.764113 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 19:01:28.764243 systemd[1]: Stopped verity-setup.service. Apr 12 19:01:28.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.788288 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 19:01:28.798340 systemd[1]: Started systemd-journald.service. Apr 12 19:01:28.808917 systemd[1]: Mounted dev-hugepages.mount. Apr 12 19:01:28.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.816807 systemd[1]: Mounted dev-mqueue.mount. Apr 12 19:01:28.824760 systemd[1]: Mounted media.mount. Apr 12 19:01:28.832734 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 19:01:28.841725 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 19:01:28.850714 systemd[1]: Mounted tmp.mount. Apr 12 19:01:28.859074 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 19:01:28.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.868027 systemd[1]: Finished kmod-static-nodes.service. Apr 12 19:01:28.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.878038 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 19:01:28.878303 systemd[1]: Finished modprobe@configfs.service. Apr 12 19:01:28.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.888019 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 19:01:28.888260 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 19:01:28.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.898069 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 19:01:28.898333 systemd[1]: Finished modprobe@drm.service. Apr 12 19:01:28.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.908131 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 19:01:28.908445 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 19:01:28.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.918061 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 19:01:28.918341 systemd[1]: Finished modprobe@fuse.service. Apr 12 19:01:28.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.928024 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 19:01:28.928303 systemd[1]: Finished modprobe@loop.service. Apr 12 19:01:28.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.937044 systemd[1]: Finished systemd-modules-load.service. Apr 12 19:01:28.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.946021 systemd[1]: Finished systemd-network-generator.service. Apr 12 19:01:28.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.954999 systemd[1]: Finished systemd-remount-fs.service. Apr 12 19:01:28.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.964052 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 19:01:28.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:28.974506 systemd[1]: Reached target network-pre.target. Apr 12 19:01:28.985507 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 19:01:28.997340 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 19:01:29.004507 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 19:01:29.008370 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 19:01:29.017869 systemd[1]: Starting systemd-journal-flush.service... Apr 12 19:01:29.029111 systemd-journald[986]: Time spent on flushing to /var/log/journal/1093e094a4c371abe657adaea8cd16ce is 78.405ms for 1157 entries. Apr 12 19:01:29.029111 systemd-journald[986]: System Journal (/var/log/journal/1093e094a4c371abe657adaea8cd16ce) is 8.0M, max 584.8M, 576.8M free. Apr 12 19:01:29.133912 systemd-journald[986]: Received client request to flush runtime journal. Apr 12 19:01:29.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:29.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:29.027662 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 19:01:29.029891 systemd[1]: Starting systemd-random-seed.service... Apr 12 19:01:29.044561 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 19:01:29.046879 systemd[1]: Starting systemd-sysctl.service... Apr 12 19:01:29.056937 systemd[1]: Starting systemd-sysusers.service... Apr 12 19:01:29.136263 udevadm[1000]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 19:01:29.066688 systemd[1]: Starting systemd-udev-settle.service... Apr 12 19:01:29.077004 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 19:01:29.085636 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 19:01:29.094904 systemd[1]: Finished systemd-random-seed.service. Apr 12 19:01:29.110039 systemd[1]: Reached target first-boot-complete.target. Apr 12 19:01:29.119152 systemd[1]: Finished systemd-sysctl.service. Apr 12 19:01:29.132376 systemd[1]: Finished systemd-sysusers.service. Apr 12 19:01:29.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:29.142188 systemd[1]: Finished systemd-journal-flush.service. Apr 12 19:01:29.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:29.152897 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 19:01:29.216226 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 19:01:29.253156 kernel: kauditd_printk_skb: 53 callbacks suppressed Apr 12 19:01:29.253367 kernel: audit: type=1130 audit(1712948489.223:133): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:29.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:29.853586 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 19:01:29.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:29.886497 kernel: audit: type=1130 audit(1712948489.861:134): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:29.884000 audit: BPF prog-id=18 op=LOAD Apr 12 19:01:29.887813 systemd[1]: Starting systemd-udevd.service... Apr 12 19:01:29.885000 audit: BPF prog-id=19 op=LOAD Apr 12 19:01:29.885000 audit: BPF prog-id=7 op=UNLOAD Apr 12 19:01:29.885000 audit: BPF prog-id=8 op=UNLOAD Apr 12 19:01:29.901355 kernel: audit: type=1334 audit(1712948489.884:135): prog-id=18 op=LOAD Apr 12 19:01:29.901544 kernel: audit: type=1334 audit(1712948489.885:136): prog-id=19 op=LOAD Apr 12 19:01:29.901579 kernel: audit: type=1334 audit(1712948489.885:137): prog-id=7 op=UNLOAD Apr 12 19:01:29.901611 kernel: audit: type=1334 audit(1712948489.885:138): prog-id=8 op=UNLOAD Apr 12 19:01:29.940595 systemd-udevd[1006]: Using default interface naming scheme 'v252'. Apr 12 19:01:29.998150 systemd[1]: Started systemd-udevd.service. Apr 12 19:01:30.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:30.033562 kernel: audit: type=1130 audit(1712948490.005:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:30.033261 systemd[1]: Starting systemd-networkd.service... Apr 12 19:01:30.030000 audit: BPF prog-id=20 op=LOAD Apr 12 19:01:30.044297 kernel: audit: type=1334 audit(1712948490.030:140): prog-id=20 op=LOAD Apr 12 19:01:30.066369 kernel: audit: type=1334 audit(1712948490.055:141): prog-id=21 op=LOAD Apr 12 19:01:30.055000 audit: BPF prog-id=21 op=LOAD Apr 12 19:01:30.066083 systemd[1]: Starting systemd-userdbd.service... Apr 12 19:01:30.055000 audit: BPF prog-id=22 op=LOAD Apr 12 19:01:30.055000 audit: BPF prog-id=23 op=LOAD Apr 12 19:01:30.075320 kernel: audit: type=1334 audit(1712948490.055:142): prog-id=22 op=LOAD Apr 12 19:01:30.104976 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Apr 12 19:01:30.157704 systemd[1]: Started systemd-userdbd.service. Apr 12 19:01:30.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:30.220318 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Apr 12 19:01:30.168000 audit[1017]: AVC avc: denied { confidentiality } for pid=1017 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 19:01:30.282350 kernel: ACPI: button: Power Button [PWRF] Apr 12 19:01:30.303309 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Apr 12 19:01:30.303506 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Apr 12 19:01:30.168000 audit[1017]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55dbfbd79de0 a1=32194 a2=7fc50a3acbc5 a3=5 items=108 ppid=1006 pid=1017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:30.168000 audit: CWD cwd="/" Apr 12 19:01:30.168000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=1 name=(null) inode=13086 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=2 name=(null) inode=13086 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=3 name=(null) inode=13087 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=4 name=(null) inode=13086 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=5 name=(null) inode=13088 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=6 name=(null) inode=13086 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=7 name=(null) inode=13089 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=8 name=(null) inode=13089 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=9 name=(null) inode=13090 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=10 name=(null) inode=13089 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=11 name=(null) inode=13091 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=12 name=(null) inode=13089 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=13 name=(null) inode=13092 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=14 name=(null) inode=13089 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=15 name=(null) inode=13093 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=16 name=(null) inode=13089 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=17 name=(null) inode=13094 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=18 name=(null) inode=13086 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=19 name=(null) inode=13095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=20 name=(null) inode=13095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=21 name=(null) inode=13096 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=22 name=(null) inode=13095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=23 name=(null) inode=13097 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=24 name=(null) inode=13095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=25 name=(null) inode=13098 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=26 name=(null) inode=13095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=27 name=(null) inode=13099 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=28 name=(null) inode=13095 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=29 name=(null) inode=13100 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=30 name=(null) inode=13086 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=31 name=(null) inode=13101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=32 name=(null) inode=13101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=33 name=(null) inode=13102 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=34 name=(null) inode=13101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=35 name=(null) inode=13103 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=36 name=(null) inode=13101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=37 name=(null) inode=13104 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=38 name=(null) inode=13101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=39 name=(null) inode=13105 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=40 name=(null) inode=13101 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=41 name=(null) inode=13106 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=42 name=(null) inode=13086 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=43 name=(null) inode=13107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=44 name=(null) inode=13107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=45 name=(null) inode=13108 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=46 name=(null) inode=13107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=47 name=(null) inode=13109 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=48 name=(null) inode=13107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=49 name=(null) inode=13110 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=50 name=(null) inode=13107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=51 name=(null) inode=13111 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=52 name=(null) inode=13107 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=53 name=(null) inode=13112 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=55 name=(null) inode=13113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=56 name=(null) inode=13113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=57 name=(null) inode=13114 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=58 name=(null) inode=13113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=59 name=(null) inode=13115 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=60 name=(null) inode=13113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=61 name=(null) inode=13116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=62 name=(null) inode=13116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=63 name=(null) inode=13117 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=64 name=(null) inode=13116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=65 name=(null) inode=13118 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=66 name=(null) inode=13116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=67 name=(null) inode=13119 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=68 name=(null) inode=13116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=69 name=(null) inode=13120 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=70 name=(null) inode=13116 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=71 name=(null) inode=13121 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=72 name=(null) inode=13113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=73 name=(null) inode=13122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=74 name=(null) inode=13122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=75 name=(null) inode=13123 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=76 name=(null) inode=13122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=77 name=(null) inode=13124 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=78 name=(null) inode=13122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=79 name=(null) inode=13125 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=80 name=(null) inode=13122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=81 name=(null) inode=13126 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=82 name=(null) inode=13122 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=83 name=(null) inode=13127 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=84 name=(null) inode=13113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=85 name=(null) inode=13128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=86 name=(null) inode=13128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=87 name=(null) inode=13129 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=88 name=(null) inode=13128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=89 name=(null) inode=13130 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=90 name=(null) inode=13128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=91 name=(null) inode=13131 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=92 name=(null) inode=13128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=93 name=(null) inode=13132 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=94 name=(null) inode=13128 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=95 name=(null) inode=13133 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=96 name=(null) inode=13113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=97 name=(null) inode=13134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=98 name=(null) inode=13134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=99 name=(null) inode=13135 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=100 name=(null) inode=13134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=101 name=(null) inode=13136 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=102 name=(null) inode=13134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=103 name=(null) inode=13137 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=104 name=(null) inode=13134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=105 name=(null) inode=13138 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=106 name=(null) inode=13134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PATH item=107 name=(null) inode=13139 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:01:30.168000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 19:01:30.322930 systemd-networkd[1016]: lo: Link UP Apr 12 19:01:30.322951 systemd-networkd[1016]: lo: Gained carrier Apr 12 19:01:30.323812 systemd-networkd[1016]: Enumeration completed Apr 12 19:01:30.323987 systemd[1]: Started systemd-networkd.service. Apr 12 19:01:30.324790 systemd-networkd[1016]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 19:01:30.327113 systemd-networkd[1016]: eth0: Link UP Apr 12 19:01:30.327131 systemd-networkd[1016]: eth0: Gained carrier Apr 12 19:01:30.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:30.345428 kernel: ACPI: button: Sleep Button [SLPF] Apr 12 19:01:30.382638 systemd-networkd[1016]: eth0: DHCPv4 address 10.128.0.26/32, gateway 10.128.0.1 acquired from 169.254.169.254 Apr 12 19:01:30.399315 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1025) Apr 12 19:01:30.457321 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Apr 12 19:01:30.466350 kernel: EDAC MC: Ver: 3.0.0 Apr 12 19:01:30.474339 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 19:01:30.492954 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 19:01:30.504010 systemd[1]: Finished systemd-udev-settle.service. Apr 12 19:01:30.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:30.515524 systemd[1]: Starting lvm2-activation-early.service... Apr 12 19:01:30.547846 lvm[1043]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 19:01:30.579468 systemd[1]: Finished lvm2-activation-early.service. Apr 12 19:01:30.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:30.588730 systemd[1]: Reached target cryptsetup.target. Apr 12 19:01:30.599620 systemd[1]: Starting lvm2-activation.service... Apr 12 19:01:30.607657 lvm[1044]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 19:01:30.642393 systemd[1]: Finished lvm2-activation.service. Apr 12 19:01:30.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:30.650784 systemd[1]: Reached target local-fs-pre.target. Apr 12 19:01:30.659615 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 19:01:30.659674 systemd[1]: Reached target local-fs.target. Apr 12 19:01:30.668518 systemd[1]: Reached target machines.target. Apr 12 19:01:30.679463 systemd[1]: Starting ldconfig.service... Apr 12 19:01:30.687767 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 19:01:30.687875 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 19:01:30.690188 systemd[1]: Starting systemd-boot-update.service... Apr 12 19:01:30.700632 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 19:01:30.712803 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 19:01:30.722697 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 19:01:30.722795 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 19:01:30.725107 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 19:01:30.738197 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1046 (bootctl) Apr 12 19:01:30.741956 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 19:01:30.766825 systemd-tmpfiles[1049]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 19:01:30.769318 systemd-tmpfiles[1049]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 19:01:30.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:30.774205 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 19:01:30.776308 systemd-tmpfiles[1049]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 19:01:30.925966 systemd-fsck[1055]: fsck.fat 4.2 (2021-01-31) Apr 12 19:01:30.925966 systemd-fsck[1055]: /dev/sda1: 789 files, 119240/258078 clusters Apr 12 19:01:30.933123 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 19:01:30.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:30.946018 systemd[1]: Mounting boot.mount... Apr 12 19:01:30.971612 systemd[1]: Mounted boot.mount. Apr 12 19:01:31.035655 systemd[1]: Finished systemd-boot-update.service. Apr 12 19:01:31.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:31.212882 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 19:01:31.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:31.223753 systemd[1]: Starting audit-rules.service... Apr 12 19:01:31.233535 systemd[1]: Starting clean-ca-certificates.service... Apr 12 19:01:31.244785 systemd[1]: Starting oem-gce-enable-oslogin.service... Apr 12 19:01:31.255929 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 19:01:31.264000 audit: BPF prog-id=24 op=LOAD Apr 12 19:01:31.267869 systemd[1]: Starting systemd-resolved.service... Apr 12 19:01:31.276000 audit: BPF prog-id=25 op=LOAD Apr 12 19:01:31.279257 systemd[1]: Starting systemd-timesyncd.service... Apr 12 19:01:31.289653 systemd[1]: Starting systemd-update-utmp.service... Apr 12 19:01:31.298860 systemd[1]: Finished clean-ca-certificates.service. Apr 12 19:01:31.302000 audit[1077]: SYSTEM_BOOT pid=1077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 19:01:31.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:31.311993 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 19:01:31.317746 systemd[1]: Finished systemd-update-utmp.service. Apr 12 19:01:31.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:31.396542 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Apr 12 19:01:31.396828 systemd[1]: Finished oem-gce-enable-oslogin.service. Apr 12 19:01:31.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:31.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:31.423000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 19:01:31.423000 audit[1089]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff75937a50 a2=420 a3=0 items=0 ppid=1059 pid=1089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:31.423000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 19:01:31.426083 augenrules[1089]: No rules Apr 12 19:01:31.428160 systemd[1]: Finished audit-rules.service. Apr 12 19:01:31.437385 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 19:01:31.446643 systemd-timesyncd[1073]: Contacted time server 169.254.169.254:123 (169.254.169.254). Apr 12 19:01:31.447114 systemd-timesyncd[1073]: Initial clock synchronization to Fri 2024-04-12 19:01:31.370110 UTC. Apr 12 19:01:31.447661 systemd[1]: Started systemd-timesyncd.service. Apr 12 19:01:31.449717 systemd-resolved[1070]: Positive Trust Anchors: Apr 12 19:01:31.449740 systemd-resolved[1070]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 19:01:31.449802 systemd-resolved[1070]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 19:01:31.456755 systemd[1]: Reached target time-set.target. Apr 12 19:01:31.488846 systemd-resolved[1070]: Defaulting to hostname 'linux'. Apr 12 19:01:31.493127 systemd[1]: Started systemd-resolved.service. Apr 12 19:01:31.501827 systemd[1]: Reached target network.target. Apr 12 19:01:31.511644 systemd[1]: Reached target nss-lookup.target. Apr 12 19:01:31.555021 ldconfig[1045]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 19:01:31.578955 systemd[1]: Finished ldconfig.service. Apr 12 19:01:31.589222 systemd[1]: Starting systemd-update-done.service... Apr 12 19:01:31.598710 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 19:01:31.600153 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 19:01:31.608882 systemd[1]: Finished systemd-update-done.service. Apr 12 19:01:31.617736 systemd[1]: Reached target sysinit.target. Apr 12 19:01:31.626679 systemd[1]: Started motdgen.path. Apr 12 19:01:31.633576 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 19:01:31.644815 systemd[1]: Started logrotate.timer. Apr 12 19:01:31.652703 systemd[1]: Started mdadm.timer. Apr 12 19:01:31.660515 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 19:01:31.669503 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 19:01:31.669655 systemd[1]: Reached target paths.target. Apr 12 19:01:31.676499 systemd[1]: Reached target timers.target. Apr 12 19:01:31.684030 systemd[1]: Listening on dbus.socket. Apr 12 19:01:31.693417 systemd[1]: Starting docker.socket... Apr 12 19:01:31.705431 systemd[1]: Listening on sshd.socket. Apr 12 19:01:31.712615 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 19:01:31.713566 systemd[1]: Listening on docker.socket. Apr 12 19:01:31.720670 systemd[1]: Reached target sockets.target. Apr 12 19:01:31.729495 systemd[1]: Reached target basic.target. Apr 12 19:01:31.736561 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 19:01:31.736614 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 19:01:31.738575 systemd[1]: Starting containerd.service... Apr 12 19:01:31.747134 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 19:01:31.758807 systemd[1]: Starting dbus.service... Apr 12 19:01:31.766209 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 19:01:31.775775 systemd[1]: Starting extend-filesystems.service... Apr 12 19:01:31.781639 jq[1101]: false Apr 12 19:01:31.783522 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 19:01:31.786050 systemd[1]: Starting motdgen.service... Apr 12 19:01:31.795604 systemd[1]: Starting oem-gce.service... Apr 12 19:01:31.805171 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 19:01:31.814396 systemd[1]: Starting prepare-critools.service... Apr 12 19:01:31.823397 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 19:01:31.833142 systemd[1]: Starting sshd-keygen.service... Apr 12 19:01:31.844914 systemd[1]: Starting systemd-logind.service... Apr 12 19:01:31.852439 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 19:01:31.852561 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Apr 12 19:01:31.853453 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 19:01:31.855019 systemd[1]: Starting update-engine.service... Apr 12 19:01:31.864736 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 19:01:31.871493 jq[1124]: true Apr 12 19:01:31.877896 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 19:01:31.878242 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 19:01:31.889090 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 19:01:31.889549 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 19:01:31.921788 tar[1127]: ./ Apr 12 19:01:31.921788 tar[1127]: ./loopback Apr 12 19:01:31.922399 mkfs.ext4[1133]: mke2fs 1.46.5 (30-Dec-2021) Apr 12 19:01:31.928866 mkfs.ext4[1133]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Apr 12 19:01:31.929086 mkfs.ext4[1133]: Creating filesystem with 262144 4k blocks and 65536 inodes Apr 12 19:01:31.929086 mkfs.ext4[1133]: Filesystem UUID: 98b8c52e-462b-4b67-875d-1f4dbfe38a65 Apr 12 19:01:31.929086 mkfs.ext4[1133]: Superblock backups stored on blocks: Apr 12 19:01:31.929086 mkfs.ext4[1133]: 32768, 98304, 163840, 229376 Apr 12 19:01:31.929086 mkfs.ext4[1133]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Apr 12 19:01:31.929086 mkfs.ext4[1133]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Apr 12 19:01:31.931494 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 19:01:31.931785 systemd[1]: Finished motdgen.service. Apr 12 19:01:31.932589 mkfs.ext4[1133]: Creating journal (8192 blocks): done Apr 12 19:01:31.939248 mkfs.ext4[1133]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Apr 12 19:01:31.952081 jq[1130]: true Apr 12 19:01:31.977018 extend-filesystems[1102]: Found sda Apr 12 19:01:31.984539 extend-filesystems[1102]: Found sda1 Apr 12 19:01:31.984539 extend-filesystems[1102]: Found sda2 Apr 12 19:01:31.984539 extend-filesystems[1102]: Found sda3 Apr 12 19:01:31.984539 extend-filesystems[1102]: Found usr Apr 12 19:01:31.984539 extend-filesystems[1102]: Found sda4 Apr 12 19:01:31.984539 extend-filesystems[1102]: Found sda6 Apr 12 19:01:31.984539 extend-filesystems[1102]: Found sda7 Apr 12 19:01:31.984539 extend-filesystems[1102]: Found sda9 Apr 12 19:01:31.984539 extend-filesystems[1102]: Checking size of /dev/sda9 Apr 12 19:01:32.051596 umount[1138]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Apr 12 19:01:32.051790 tar[1128]: crictl Apr 12 19:01:32.052218 extend-filesystems[1102]: Resized partition /dev/sda9 Apr 12 19:01:32.066461 extend-filesystems[1153]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 19:01:32.075565 update_engine[1123]: I0412 19:01:32.072366 1123 main.cc:92] Flatcar Update Engine starting Apr 12 19:01:32.083315 kernel: loop0: detected capacity change from 0 to 2097152 Apr 12 19:01:32.091301 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Apr 12 19:01:32.098578 dbus-daemon[1100]: [system] SELinux support is enabled Apr 12 19:01:32.099030 systemd[1]: Started dbus.service. Apr 12 19:01:32.103426 dbus-daemon[1100]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1016 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Apr 12 19:01:32.110572 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 19:01:32.110639 systemd[1]: Reached target system-config.target. Apr 12 19:01:32.118254 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 19:01:32.118369 systemd[1]: Reached target user-config.target. Apr 12 19:01:32.119786 update_engine[1123]: I0412 19:01:32.119603 1123 update_check_scheduler.cc:74] Next update check in 3m57s Apr 12 19:01:32.134850 systemd[1]: Started update-engine.service. Apr 12 19:01:32.136028 dbus-daemon[1100]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 19:01:32.136897 tar[1127]: ./bandwidth Apr 12 19:01:32.144012 bash[1164]: Updated "/home/core/.ssh/authorized_keys" Apr 12 19:01:32.150002 systemd[1]: Started locksmithd.service. Apr 12 19:01:32.152434 systemd-networkd[1016]: eth0: Gained IPv6LL Apr 12 19:01:32.161321 systemd[1]: Starting systemd-hostnamed.service... Apr 12 19:01:32.179861 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 19:01:32.230019 tar[1127]: ./ptp Apr 12 19:01:32.255448 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Apr 12 19:01:32.265378 extend-filesystems[1153]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Apr 12 19:01:32.265378 extend-filesystems[1153]: old_desc_blocks = 1, new_desc_blocks = 2 Apr 12 19:01:32.265378 extend-filesystems[1153]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Apr 12 19:01:32.313523 kernel: EXT4-fs (loop0): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 19:01:32.265006 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 19:01:32.313810 extend-filesystems[1102]: Resized filesystem in /dev/sda9 Apr 12 19:01:32.265316 systemd[1]: Finished extend-filesystems.service. Apr 12 19:01:32.426141 env[1131]: time="2024-04-12T19:01:32.426060434Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 19:01:32.459083 systemd-logind[1122]: Watching system buttons on /dev/input/event1 (Power Button) Apr 12 19:01:32.459725 systemd-logind[1122]: Watching system buttons on /dev/input/event3 (Sleep Button) Apr 12 19:01:32.459862 systemd-logind[1122]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Apr 12 19:01:32.470253 systemd-logind[1122]: New seat seat0. Apr 12 19:01:32.488763 systemd[1]: Started systemd-logind.service. Apr 12 19:01:32.577366 coreos-metadata[1099]: Apr 12 19:01:32.577 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Apr 12 19:01:32.581004 coreos-metadata[1099]: Apr 12 19:01:32.580 INFO Fetch failed with 404: resource not found Apr 12 19:01:32.581177 coreos-metadata[1099]: Apr 12 19:01:32.581 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Apr 12 19:01:32.582746 coreos-metadata[1099]: Apr 12 19:01:32.582 INFO Fetch successful Apr 12 19:01:32.582848 coreos-metadata[1099]: Apr 12 19:01:32.582 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Apr 12 19:01:32.583655 coreos-metadata[1099]: Apr 12 19:01:32.583 INFO Fetch failed with 404: resource not found Apr 12 19:01:32.583752 coreos-metadata[1099]: Apr 12 19:01:32.583 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Apr 12 19:01:32.584608 coreos-metadata[1099]: Apr 12 19:01:32.584 INFO Fetch failed with 404: resource not found Apr 12 19:01:32.584719 coreos-metadata[1099]: Apr 12 19:01:32.584 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Apr 12 19:01:32.585826 coreos-metadata[1099]: Apr 12 19:01:32.585 INFO Fetch successful Apr 12 19:01:32.588234 unknown[1099]: wrote ssh authorized keys file for user: core Apr 12 19:01:32.615952 update-ssh-keys[1175]: Updated "/home/core/.ssh/authorized_keys" Apr 12 19:01:32.617032 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 19:01:32.649492 env[1131]: time="2024-04-12T19:01:32.649408574Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 19:01:32.649715 env[1131]: time="2024-04-12T19:01:32.649624380Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:01:32.652210 env[1131]: time="2024-04-12T19:01:32.652157424Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 19:01:32.652210 env[1131]: time="2024-04-12T19:01:32.652209765Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:01:32.652636 env[1131]: time="2024-04-12T19:01:32.652593827Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 19:01:32.652764 env[1131]: time="2024-04-12T19:01:32.652646351Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 19:01:32.652764 env[1131]: time="2024-04-12T19:01:32.652672039Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 19:01:32.652764 env[1131]: time="2024-04-12T19:01:32.652690822Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 19:01:32.652911 env[1131]: time="2024-04-12T19:01:32.652812078Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:01:32.653209 env[1131]: time="2024-04-12T19:01:32.653174009Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:01:32.653460 env[1131]: time="2024-04-12T19:01:32.653423072Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 19:01:32.653536 env[1131]: time="2024-04-12T19:01:32.653460868Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 19:01:32.653588 env[1131]: time="2024-04-12T19:01:32.653550435Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 19:01:32.653588 env[1131]: time="2024-04-12T19:01:32.653572126Z" level=info msg="metadata content store policy set" policy=shared Apr 12 19:01:32.658797 env[1131]: time="2024-04-12T19:01:32.658757795Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 19:01:32.658886 env[1131]: time="2024-04-12T19:01:32.658810423Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 19:01:32.658886 env[1131]: time="2024-04-12T19:01:32.658834147Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 19:01:32.658984 env[1131]: time="2024-04-12T19:01:32.658901686Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 19:01:32.658984 env[1131]: time="2024-04-12T19:01:32.658928490Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 19:01:32.659074 env[1131]: time="2024-04-12T19:01:32.658996153Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 19:01:32.659074 env[1131]: time="2024-04-12T19:01:32.659021398Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 19:01:32.659074 env[1131]: time="2024-04-12T19:01:32.659047997Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 19:01:32.659074 env[1131]: time="2024-04-12T19:01:32.659074167Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 19:01:32.659312 env[1131]: time="2024-04-12T19:01:32.659099315Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 19:01:32.659312 env[1131]: time="2024-04-12T19:01:32.659122014Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 19:01:32.659312 env[1131]: time="2024-04-12T19:01:32.659145852Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 19:01:32.659473 env[1131]: time="2024-04-12T19:01:32.659318737Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 19:01:32.659536 env[1131]: time="2024-04-12T19:01:32.659477668Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 19:01:32.660174 env[1131]: time="2024-04-12T19:01:32.660096404Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 19:01:32.660415 env[1131]: time="2024-04-12T19:01:32.660201439Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 19:01:32.660415 env[1131]: time="2024-04-12T19:01:32.660240558Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 19:01:32.660558 env[1131]: time="2024-04-12T19:01:32.660432403Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 19:01:32.660558 env[1131]: time="2024-04-12T19:01:32.660480111Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 19:01:32.660558 env[1131]: time="2024-04-12T19:01:32.660519571Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 19:01:32.660558 env[1131]: time="2024-04-12T19:01:32.660544951Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 19:01:32.660738 env[1131]: time="2024-04-12T19:01:32.660570947Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 19:01:32.660738 env[1131]: time="2024-04-12T19:01:32.660597350Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 19:01:32.660738 env[1131]: time="2024-04-12T19:01:32.660619985Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 19:01:32.660738 env[1131]: time="2024-04-12T19:01:32.660642690Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 19:01:32.660738 env[1131]: time="2024-04-12T19:01:32.660687222Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 19:01:32.660986 env[1131]: time="2024-04-12T19:01:32.660896801Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 19:01:32.660986 env[1131]: time="2024-04-12T19:01:32.660927787Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 19:01:32.660986 env[1131]: time="2024-04-12T19:01:32.660963887Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 19:01:32.661129 env[1131]: time="2024-04-12T19:01:32.660988220Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 19:01:32.661129 env[1131]: time="2024-04-12T19:01:32.661015528Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 19:01:32.661129 env[1131]: time="2024-04-12T19:01:32.661037672Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 19:01:32.661129 env[1131]: time="2024-04-12T19:01:32.661071829Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 19:01:32.661366 env[1131]: time="2024-04-12T19:01:32.661129059Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 19:01:32.661618 env[1131]: time="2024-04-12T19:01:32.661525719Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 19:01:32.665843 env[1131]: time="2024-04-12T19:01:32.661647742Z" level=info msg="Connect containerd service" Apr 12 19:01:32.665843 env[1131]: time="2024-04-12T19:01:32.661720185Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 19:01:32.665977 env[1131]: time="2024-04-12T19:01:32.665854495Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 19:01:32.666371 env[1131]: time="2024-04-12T19:01:32.666339936Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 19:01:32.666459 env[1131]: time="2024-04-12T19:01:32.666417860Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 19:01:32.666636 systemd[1]: Started containerd.service. Apr 12 19:01:32.666953 env[1131]: time="2024-04-12T19:01:32.666924125Z" level=info msg="containerd successfully booted in 0.242188s" Apr 12 19:01:32.668086 env[1131]: time="2024-04-12T19:01:32.667659833Z" level=info msg="Start subscribing containerd event" Apr 12 19:01:32.668086 env[1131]: time="2024-04-12T19:01:32.667754822Z" level=info msg="Start recovering state" Apr 12 19:01:32.668086 env[1131]: time="2024-04-12T19:01:32.667919849Z" level=info msg="Start event monitor" Apr 12 19:01:32.668086 env[1131]: time="2024-04-12T19:01:32.667944482Z" level=info msg="Start snapshots syncer" Apr 12 19:01:32.668086 env[1131]: time="2024-04-12T19:01:32.668017055Z" level=info msg="Start cni network conf syncer for default" Apr 12 19:01:32.668086 env[1131]: time="2024-04-12T19:01:32.668037118Z" level=info msg="Start streaming server" Apr 12 19:01:32.677637 tar[1127]: ./vlan Apr 12 19:01:32.715006 dbus-daemon[1100]: [system] Successfully activated service 'org.freedesktop.hostname1' Apr 12 19:01:32.715233 systemd[1]: Started systemd-hostnamed.service. Apr 12 19:01:32.720661 dbus-daemon[1100]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1167 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Apr 12 19:01:32.729315 systemd[1]: Starting polkit.service... Apr 12 19:01:32.838145 polkitd[1178]: Started polkitd version 121 Apr 12 19:01:32.872214 polkitd[1178]: Loading rules from directory /etc/polkit-1/rules.d Apr 12 19:01:32.872368 polkitd[1178]: Loading rules from directory /usr/share/polkit-1/rules.d Apr 12 19:01:32.877148 polkitd[1178]: Finished loading, compiling and executing 2 rules Apr 12 19:01:32.877914 dbus-daemon[1100]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Apr 12 19:01:32.878202 systemd[1]: Started polkit.service. Apr 12 19:01:32.878953 polkitd[1178]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Apr 12 19:01:32.884328 tar[1127]: ./host-device Apr 12 19:01:32.927634 systemd-hostnamed[1167]: Hostname set to (transient) Apr 12 19:01:32.930929 systemd-resolved[1070]: System hostname changed to 'ci-3510-3-3-434bd246cde247cf36b0.c.flatcar-212911.internal'. Apr 12 19:01:33.020814 tar[1127]: ./tuning Apr 12 19:01:33.129358 tar[1127]: ./vrf Apr 12 19:01:33.237664 tar[1127]: ./sbr Apr 12 19:01:33.355339 tar[1127]: ./tap Apr 12 19:01:33.489234 tar[1127]: ./dhcp Apr 12 19:01:33.811128 tar[1127]: ./static Apr 12 19:01:33.903949 tar[1127]: ./firewall Apr 12 19:01:34.011805 systemd[1]: Finished prepare-critools.service. Apr 12 19:01:34.049854 tar[1127]: ./macvlan Apr 12 19:01:34.175718 tar[1127]: ./dummy Apr 12 19:01:34.285478 tar[1127]: ./bridge Apr 12 19:01:34.397061 tar[1127]: ./ipvlan Apr 12 19:01:34.507801 tar[1127]: ./portmap Apr 12 19:01:34.610711 tar[1127]: ./host-local Apr 12 19:01:34.731534 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 19:01:34.878027 sshd_keygen[1129]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 19:01:34.922128 systemd[1]: Finished sshd-keygen.service. Apr 12 19:01:34.933300 systemd[1]: Starting issuegen.service... Apr 12 19:01:34.946093 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 19:01:34.946406 systemd[1]: Finished issuegen.service. Apr 12 19:01:34.956126 systemd[1]: Starting systemd-user-sessions.service... Apr 12 19:01:34.977680 systemd[1]: Finished systemd-user-sessions.service. Apr 12 19:01:34.989039 systemd[1]: Started getty@tty1.service. Apr 12 19:01:34.999606 systemd[1]: Started serial-getty@ttyS0.service. Apr 12 19:01:35.008970 systemd[1]: Reached target getty.target. Apr 12 19:01:35.084439 locksmithd[1165]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 19:01:37.908710 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Apr 12 19:01:39.947334 kernel: loop0: detected capacity change from 0 to 2097152 Apr 12 19:01:39.968251 systemd-nspawn[1207]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Apr 12 19:01:39.968251 systemd-nspawn[1207]: Press ^] three times within 1s to kill container. Apr 12 19:01:39.984308 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 19:01:40.075257 systemd[1]: Started oem-gce.service. Apr 12 19:01:40.076032 systemd[1]: Reached target multi-user.target. Apr 12 19:01:40.079289 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 19:01:40.090722 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 19:01:40.090994 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 19:01:40.091300 systemd[1]: Startup finished in 1.195s (kernel) + 9.013s (initrd) + 16.218s (userspace) = 26.426s. Apr 12 19:01:40.177770 systemd-nspawn[1207]: + '[' -e /etc/default/instance_configs.cfg.template ']' Apr 12 19:01:40.177770 systemd-nspawn[1207]: + echo -e '[InstanceSetup]\nset_host_keys = false' Apr 12 19:01:40.178142 systemd-nspawn[1207]: + /usr/bin/google_instance_setup Apr 12 19:01:40.903343 instance-setup[1213]: INFO Running google_set_multiqueue. Apr 12 19:01:40.923640 instance-setup[1213]: INFO Set channels for eth0 to 2. Apr 12 19:01:40.927680 instance-setup[1213]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Apr 12 19:01:40.929384 instance-setup[1213]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Apr 12 19:01:40.930013 instance-setup[1213]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Apr 12 19:01:40.931374 instance-setup[1213]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Apr 12 19:01:40.931832 instance-setup[1213]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Apr 12 19:01:40.933372 instance-setup[1213]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Apr 12 19:01:40.933780 instance-setup[1213]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Apr 12 19:01:40.935234 instance-setup[1213]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Apr 12 19:01:40.950201 instance-setup[1213]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Apr 12 19:01:40.950961 instance-setup[1213]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Apr 12 19:01:41.009860 systemd-nspawn[1207]: + /usr/bin/google_metadata_script_runner --script-type startup Apr 12 19:01:41.369381 startup-script[1244]: INFO Starting startup scripts. Apr 12 19:01:41.384210 startup-script[1244]: INFO No startup scripts found in metadata. Apr 12 19:01:41.384399 startup-script[1244]: INFO Finished running startup scripts. Apr 12 19:01:41.426021 systemd-nspawn[1207]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Apr 12 19:01:41.426021 systemd-nspawn[1207]: + daemon_pids=() Apr 12 19:01:41.426021 systemd-nspawn[1207]: + for d in accounts clock_skew network Apr 12 19:01:41.426788 systemd-nspawn[1207]: + daemon_pids+=($!) Apr 12 19:01:41.426922 systemd-nspawn[1207]: + /usr/bin/google_accounts_daemon Apr 12 19:01:41.427163 systemd-nspawn[1207]: + for d in accounts clock_skew network Apr 12 19:01:41.427556 systemd-nspawn[1207]: + daemon_pids+=($!) Apr 12 19:01:41.427653 systemd-nspawn[1207]: + for d in accounts clock_skew network Apr 12 19:01:41.427858 systemd-nspawn[1207]: + /usr/bin/google_clock_skew_daemon Apr 12 19:01:41.434577 systemd-nspawn[1207]: + daemon_pids+=($!) Apr 12 19:01:41.434734 systemd-nspawn[1207]: + NOTIFY_SOCKET=/run/systemd/notify Apr 12 19:01:41.434807 systemd-nspawn[1207]: + /usr/bin/systemd-notify --ready Apr 12 19:01:41.440932 systemd-nspawn[1207]: + /usr/bin/google_network_daemon Apr 12 19:01:41.507833 systemd-nspawn[1207]: + wait -n 36 37 38 Apr 12 19:01:41.712680 systemd[1]: Created slice system-sshd.slice. Apr 12 19:01:41.716517 systemd[1]: Started sshd@0-10.128.0.26:22-139.178.89.65:50622.service. Apr 12 19:01:42.107343 sshd[1252]: Accepted publickey for core from 139.178.89.65 port 50622 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:01:42.111323 sshd[1252]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:01:42.135674 systemd[1]: Created slice user-500.slice. Apr 12 19:01:42.139368 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 19:01:42.147150 systemd-logind[1122]: New session 1 of user core. Apr 12 19:01:42.159805 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 19:01:42.162803 systemd[1]: Starting user@500.service... Apr 12 19:01:42.213404 (systemd)[1261]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:01:42.298704 google-networking[1249]: INFO Starting Google Networking daemon. Apr 12 19:01:42.318358 google-clock-skew[1248]: INFO Starting Google Clock Skew daemon. Apr 12 19:01:42.352164 google-clock-skew[1248]: INFO Clock drift token has changed: 0. Apr 12 19:01:42.358327 systemd-nspawn[1207]: hwclock: Cannot access the Hardware Clock via any known method. Apr 12 19:01:42.358938 systemd-nspawn[1207]: hwclock: Use the --verbose option to see the details of our search for an access method. Apr 12 19:01:42.359564 google-clock-skew[1248]: WARNING Failed to sync system time with hardware clock. Apr 12 19:01:42.422073 groupadd[1269]: group added to /etc/group: name=google-sudoers, GID=1000 Apr 12 19:01:42.422682 systemd[1261]: Queued start job for default target default.target. Apr 12 19:01:42.423680 systemd[1261]: Reached target paths.target. Apr 12 19:01:42.423717 systemd[1261]: Reached target sockets.target. Apr 12 19:01:42.423741 systemd[1261]: Reached target timers.target. Apr 12 19:01:42.423761 systemd[1261]: Reached target basic.target. Apr 12 19:01:42.423919 systemd[1]: Started user@500.service. Apr 12 19:01:42.425928 systemd[1]: Started session-1.scope. Apr 12 19:01:42.426787 systemd[1261]: Reached target default.target. Apr 12 19:01:42.427079 systemd[1261]: Startup finished in 191ms. Apr 12 19:01:42.430048 groupadd[1269]: group added to /etc/gshadow: name=google-sudoers Apr 12 19:01:42.440825 groupadd[1269]: new group: name=google-sudoers, GID=1000 Apr 12 19:01:42.455846 google-accounts[1247]: INFO Starting Google Accounts daemon. Apr 12 19:01:42.484299 google-accounts[1247]: WARNING OS Login not installed. Apr 12 19:01:42.485634 google-accounts[1247]: INFO Creating a new user account for 0. Apr 12 19:01:42.491029 systemd-nspawn[1207]: useradd: invalid user name '0': use --badname to ignore Apr 12 19:01:42.491845 google-accounts[1247]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Apr 12 19:01:42.689470 systemd[1]: Started sshd@1-10.128.0.26:22-139.178.89.65:50638.service. Apr 12 19:01:43.036307 sshd[1282]: Accepted publickey for core from 139.178.89.65 port 50638 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:01:43.038801 sshd[1282]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:01:43.045544 systemd-logind[1122]: New session 2 of user core. Apr 12 19:01:43.046484 systemd[1]: Started session-2.scope. Apr 12 19:01:43.290777 sshd[1282]: pam_unix(sshd:session): session closed for user core Apr 12 19:01:43.296191 systemd[1]: sshd@1-10.128.0.26:22-139.178.89.65:50638.service: Deactivated successfully. Apr 12 19:01:43.297630 systemd[1]: session-2.scope: Deactivated successfully. Apr 12 19:01:43.298606 systemd-logind[1122]: Session 2 logged out. Waiting for processes to exit. Apr 12 19:01:43.299998 systemd-logind[1122]: Removed session 2. Apr 12 19:01:43.346288 systemd[1]: Started sshd@2-10.128.0.26:22-139.178.89.65:50650.service. Apr 12 19:01:43.694422 sshd[1288]: Accepted publickey for core from 139.178.89.65 port 50650 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:01:43.696586 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:01:43.703352 systemd-logind[1122]: New session 3 of user core. Apr 12 19:01:43.704213 systemd[1]: Started session-3.scope. Apr 12 19:01:43.940856 sshd[1288]: pam_unix(sshd:session): session closed for user core Apr 12 19:01:43.946206 systemd[1]: sshd@2-10.128.0.26:22-139.178.89.65:50650.service: Deactivated successfully. Apr 12 19:01:43.947568 systemd[1]: session-3.scope: Deactivated successfully. Apr 12 19:01:43.948479 systemd-logind[1122]: Session 3 logged out. Waiting for processes to exit. Apr 12 19:01:43.950042 systemd-logind[1122]: Removed session 3. Apr 12 19:01:43.996106 systemd[1]: Started sshd@3-10.128.0.26:22-139.178.89.65:50656.service. Apr 12 19:01:44.341142 sshd[1294]: Accepted publickey for core from 139.178.89.65 port 50656 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:01:44.342802 sshd[1294]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:01:44.349370 systemd-logind[1122]: New session 4 of user core. Apr 12 19:01:44.349951 systemd[1]: Started session-4.scope. Apr 12 19:01:44.592458 sshd[1294]: pam_unix(sshd:session): session closed for user core Apr 12 19:01:44.597311 systemd[1]: sshd@3-10.128.0.26:22-139.178.89.65:50656.service: Deactivated successfully. Apr 12 19:01:44.598503 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 19:01:44.599422 systemd-logind[1122]: Session 4 logged out. Waiting for processes to exit. Apr 12 19:01:44.600646 systemd-logind[1122]: Removed session 4. Apr 12 19:01:44.648215 systemd[1]: Started sshd@4-10.128.0.26:22-139.178.89.65:50662.service. Apr 12 19:01:44.995543 sshd[1300]: Accepted publickey for core from 139.178.89.65 port 50662 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:01:44.997676 sshd[1300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:01:45.004183 systemd-logind[1122]: New session 5 of user core. Apr 12 19:01:45.005022 systemd[1]: Started session-5.scope. Apr 12 19:01:45.221468 sudo[1303]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 19:01:45.221881 sudo[1303]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:01:45.232611 dbus-daemon[1100]: \xd0m'\x86\xdfU: received setenforce notice (enforcing=-1631875088) Apr 12 19:01:45.235168 sudo[1303]: pam_unix(sudo:session): session closed for user root Apr 12 19:01:45.288625 sshd[1300]: pam_unix(sshd:session): session closed for user core Apr 12 19:01:45.293961 systemd[1]: sshd@4-10.128.0.26:22-139.178.89.65:50662.service: Deactivated successfully. Apr 12 19:01:45.295241 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 19:01:45.296152 systemd-logind[1122]: Session 5 logged out. Waiting for processes to exit. Apr 12 19:01:45.297710 systemd-logind[1122]: Removed session 5. Apr 12 19:01:45.344763 systemd[1]: Started sshd@5-10.128.0.26:22-139.178.89.65:50674.service. Apr 12 19:01:45.693152 sshd[1307]: Accepted publickey for core from 139.178.89.65 port 50674 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:01:45.695110 sshd[1307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:01:45.701606 systemd[1]: Started session-6.scope. Apr 12 19:01:45.702558 systemd-logind[1122]: New session 6 of user core. Apr 12 19:01:45.899936 sudo[1311]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 19:01:45.900358 sudo[1311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:01:45.904757 sudo[1311]: pam_unix(sudo:session): session closed for user root Apr 12 19:01:45.916737 sudo[1310]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 19:01:45.917128 sudo[1310]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:01:45.929646 systemd[1]: Stopping audit-rules.service... Apr 12 19:01:45.931000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 19:01:45.937177 kernel: kauditd_printk_skb: 132 callbacks suppressed Apr 12 19:01:45.937313 kernel: audit: type=1305 audit(1712948505.931:162): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 19:01:45.937359 auditctl[1314]: No rules Apr 12 19:01:45.952709 kernel: audit: type=1300 audit(1712948505.931:162): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcd88a81d0 a2=420 a3=0 items=0 ppid=1 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:45.931000 audit[1314]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcd88a81d0 a2=420 a3=0 items=0 ppid=1 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:45.938294 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 19:01:45.938558 systemd[1]: Stopped audit-rules.service. Apr 12 19:01:45.954287 systemd[1]: Starting audit-rules.service... Apr 12 19:01:45.931000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 19:01:45.991817 augenrules[1331]: No rules Apr 12 19:01:45.992725 kernel: audit: type=1327 audit(1712948505.931:162): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 19:01:45.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:45.994628 sudo[1310]: pam_unix(sudo:session): session closed for user root Apr 12 19:01:45.993068 systemd[1]: Finished audit-rules.service. Apr 12 19:01:46.014559 kernel: audit: type=1131 audit(1712948505.938:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:46.014704 kernel: audit: type=1130 audit(1712948505.992:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:45.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:46.041329 kernel: audit: type=1106 audit(1712948505.993:165): pid=1310 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:01:45.993000 audit[1310]: USER_END pid=1310 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:01:46.077143 kernel: audit: type=1104 audit(1712948505.993:166): pid=1310 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:01:45.993000 audit[1310]: CRED_DISP pid=1310 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:01:46.071349 systemd-logind[1122]: Session 6 logged out. Waiting for processes to exit. Apr 12 19:01:46.066573 sshd[1307]: pam_unix(sshd:session): session closed for user core Apr 12 19:01:46.073456 systemd[1]: sshd@5-10.128.0.26:22-139.178.89.65:50674.service: Deactivated successfully. Apr 12 19:01:46.074604 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 19:01:46.076461 systemd-logind[1122]: Removed session 6. Apr 12 19:01:46.066000 audit[1307]: USER_END pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:46.118866 kernel: audit: type=1106 audit(1712948506.066:167): pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:46.118993 kernel: audit: type=1104 audit(1712948506.066:168): pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:46.066000 audit[1307]: CRED_DISP pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:46.121327 systemd[1]: Started sshd@6-10.128.0.26:22-139.178.89.65:50684.service. Apr 12 19:01:46.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.26:22-139.178.89.65:50674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:46.167067 kernel: audit: type=1131 audit(1712948506.072:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.26:22-139.178.89.65:50674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:46.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.26:22-139.178.89.65:50684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:46.473000 audit[1337]: USER_ACCT pid=1337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:46.474622 sshd[1337]: Accepted publickey for core from 139.178.89.65 port 50684 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 19:01:46.475000 audit[1337]: CRED_ACQ pid=1337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:46.475000 audit[1337]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe68b66d70 a2=3 a3=0 items=0 ppid=1 pid=1337 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:46.475000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:01:46.477251 sshd[1337]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:01:46.485341 systemd[1]: Started session-7.scope. Apr 12 19:01:46.486036 systemd-logind[1122]: New session 7 of user core. Apr 12 19:01:46.496000 audit[1337]: USER_START pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:46.499000 audit[1339]: CRED_ACQ pid=1339 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:46.679000 audit[1340]: USER_ACCT pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:01:46.680483 sudo[1340]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 19:01:46.679000 audit[1340]: CRED_REFR pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:01:46.680910 sudo[1340]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:01:46.682000 audit[1340]: USER_START pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:01:47.281463 systemd[1]: Reloading. Apr 12 19:01:47.376501 /usr/lib/systemd/system-generators/torcx-generator[1369]: time="2024-04-12T19:01:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 19:01:47.376557 /usr/lib/systemd/system-generators/torcx-generator[1369]: time="2024-04-12T19:01:47Z" level=info msg="torcx already run" Apr 12 19:01:47.512437 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 19:01:47.512468 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 19:01:47.540898 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 19:01:47.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.631000 audit: BPF prog-id=34 op=LOAD Apr 12 19:01:47.631000 audit: BPF prog-id=25 op=UNLOAD Apr 12 19:01:47.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.633000 audit: BPF prog-id=35 op=LOAD Apr 12 19:01:47.633000 audit: BPF prog-id=15 op=UNLOAD Apr 12 19:01:47.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.633000 audit: BPF prog-id=36 op=LOAD Apr 12 19:01:47.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.633000 audit: BPF prog-id=37 op=LOAD Apr 12 19:01:47.633000 audit: BPF prog-id=16 op=UNLOAD Apr 12 19:01:47.633000 audit: BPF prog-id=17 op=UNLOAD Apr 12 19:01:47.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.634000 audit: BPF prog-id=38 op=LOAD Apr 12 19:01:47.634000 audit: BPF prog-id=20 op=UNLOAD Apr 12 19:01:47.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.638000 audit: BPF prog-id=39 op=LOAD Apr 12 19:01:47.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.638000 audit: BPF prog-id=40 op=LOAD Apr 12 19:01:47.638000 audit: BPF prog-id=18 op=UNLOAD Apr 12 19:01:47.638000 audit: BPF prog-id=19 op=UNLOAD Apr 12 19:01:47.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.639000 audit: BPF prog-id=41 op=LOAD Apr 12 19:01:47.639000 audit: BPF prog-id=29 op=UNLOAD Apr 12 19:01:47.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.664000 audit: BPF prog-id=42 op=LOAD Apr 12 19:01:47.664000 audit: BPF prog-id=24 op=UNLOAD Apr 12 19:01:47.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.667000 audit: BPF prog-id=43 op=LOAD Apr 12 19:01:47.667000 audit: BPF prog-id=26 op=UNLOAD Apr 12 19:01:47.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.667000 audit: BPF prog-id=44 op=LOAD Apr 12 19:01:47.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.668000 audit: BPF prog-id=45 op=LOAD Apr 12 19:01:47.668000 audit: BPF prog-id=27 op=UNLOAD Apr 12 19:01:47.668000 audit: BPF prog-id=28 op=UNLOAD Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit: BPF prog-id=46 op=LOAD Apr 12 19:01:47.669000 audit: BPF prog-id=30 op=UNLOAD Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit: BPF prog-id=47 op=LOAD Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.669000 audit: BPF prog-id=48 op=LOAD Apr 12 19:01:47.669000 audit: BPF prog-id=31 op=UNLOAD Apr 12 19:01:47.669000 audit: BPF prog-id=32 op=UNLOAD Apr 12 19:01:47.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.671000 audit: BPF prog-id=49 op=LOAD Apr 12 19:01:47.671000 audit: BPF prog-id=21 op=UNLOAD Apr 12 19:01:47.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.672000 audit: BPF prog-id=50 op=LOAD Apr 12 19:01:47.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:47.672000 audit: BPF prog-id=51 op=LOAD Apr 12 19:01:47.672000 audit: BPF prog-id=22 op=UNLOAD Apr 12 19:01:47.672000 audit: BPF prog-id=23 op=UNLOAD Apr 12 19:01:47.689901 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 19:01:47.700309 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 19:01:47.701245 systemd[1]: Reached target network-online.target. Apr 12 19:01:47.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:47.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:47.704009 systemd[1]: Started kubelet.service. Apr 12 19:01:47.726181 systemd[1]: Starting coreos-metadata.service... Apr 12 19:01:47.816386 kubelet[1413]: E0412 19:01:47.812406 1413 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 19:01:47.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 19:01:47.816199 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 19:01:47.818015 coreos-metadata[1421]: Apr 12 19:01:47.817 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/hostname: Attempt #1 Apr 12 19:01:47.816429 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 19:01:47.820862 coreos-metadata[1421]: Apr 12 19:01:47.820 INFO Fetch successful Apr 12 19:01:47.820862 coreos-metadata[1421]: Apr 12 19:01:47.820 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip: Attempt #1 Apr 12 19:01:47.821759 coreos-metadata[1421]: Apr 12 19:01:47.821 INFO Fetch successful Apr 12 19:01:47.821759 coreos-metadata[1421]: Apr 12 19:01:47.821 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/ip: Attempt #1 Apr 12 19:01:47.822647 coreos-metadata[1421]: Apr 12 19:01:47.822 INFO Fetch successful Apr 12 19:01:47.822647 coreos-metadata[1421]: Apr 12 19:01:47.822 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/machine-type: Attempt #1 Apr 12 19:01:47.825329 coreos-metadata[1421]: Apr 12 19:01:47.823 INFO Fetch successful Apr 12 19:01:47.836065 systemd[1]: Finished coreos-metadata.service. Apr 12 19:01:47.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:48.337460 systemd[1]: Stopped kubelet.service. Apr 12 19:01:48.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:48.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:48.365051 systemd[1]: Reloading. Apr 12 19:01:48.502540 /usr/lib/systemd/system-generators/torcx-generator[1477]: time="2024-04-12T19:01:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 19:01:48.502593 /usr/lib/systemd/system-generators/torcx-generator[1477]: time="2024-04-12T19:01:48Z" level=info msg="torcx already run" Apr 12 19:01:48.604965 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 19:01:48.604996 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 19:01:48.632586 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 19:01:48.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.723000 audit: BPF prog-id=52 op=LOAD Apr 12 19:01:48.723000 audit: BPF prog-id=34 op=UNLOAD Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit: BPF prog-id=53 op=LOAD Apr 12 19:01:48.724000 audit: BPF prog-id=35 op=UNLOAD Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit: BPF prog-id=54 op=LOAD Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.725000 audit: BPF prog-id=55 op=LOAD Apr 12 19:01:48.725000 audit: BPF prog-id=36 op=UNLOAD Apr 12 19:01:48.725000 audit: BPF prog-id=37 op=UNLOAD Apr 12 19:01:48.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.726000 audit: BPF prog-id=56 op=LOAD Apr 12 19:01:48.726000 audit: BPF prog-id=38 op=UNLOAD Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit: BPF prog-id=57 op=LOAD Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit: BPF prog-id=58 op=LOAD Apr 12 19:01:48.729000 audit: BPF prog-id=39 op=UNLOAD Apr 12 19:01:48.729000 audit: BPF prog-id=40 op=UNLOAD Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.730000 audit: BPF prog-id=59 op=LOAD Apr 12 19:01:48.730000 audit: BPF prog-id=41 op=UNLOAD Apr 12 19:01:48.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.735000 audit: BPF prog-id=60 op=LOAD Apr 12 19:01:48.735000 audit: BPF prog-id=42 op=UNLOAD Apr 12 19:01:48.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.738000 audit: BPF prog-id=61 op=LOAD Apr 12 19:01:48.738000 audit: BPF prog-id=43 op=UNLOAD Apr 12 19:01:48.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.738000 audit: BPF prog-id=62 op=LOAD Apr 12 19:01:48.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.738000 audit: BPF prog-id=63 op=LOAD Apr 12 19:01:48.738000 audit: BPF prog-id=44 op=UNLOAD Apr 12 19:01:48.738000 audit: BPF prog-id=45 op=UNLOAD Apr 12 19:01:48.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.739000 audit: BPF prog-id=64 op=LOAD Apr 12 19:01:48.739000 audit: BPF prog-id=46 op=UNLOAD Apr 12 19:01:48.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.740000 audit: BPF prog-id=65 op=LOAD Apr 12 19:01:48.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.740000 audit: BPF prog-id=66 op=LOAD Apr 12 19:01:48.740000 audit: BPF prog-id=47 op=UNLOAD Apr 12 19:01:48.740000 audit: BPF prog-id=48 op=UNLOAD Apr 12 19:01:48.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.742000 audit: BPF prog-id=67 op=LOAD Apr 12 19:01:48.742000 audit: BPF prog-id=49 op=UNLOAD Apr 12 19:01:48.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.742000 audit: BPF prog-id=68 op=LOAD Apr 12 19:01:48.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:48.742000 audit: BPF prog-id=69 op=LOAD Apr 12 19:01:48.742000 audit: BPF prog-id=50 op=UNLOAD Apr 12 19:01:48.742000 audit: BPF prog-id=51 op=UNLOAD Apr 12 19:01:48.767204 systemd[1]: Started kubelet.service. Apr 12 19:01:48.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:48.835929 kubelet[1521]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 19:01:48.835929 kubelet[1521]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 19:01:48.835929 kubelet[1521]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 19:01:48.836651 kubelet[1521]: I0412 19:01:48.836055 1521 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 19:01:49.302958 kubelet[1521]: I0412 19:01:49.302898 1521 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Apr 12 19:01:49.302958 kubelet[1521]: I0412 19:01:49.302941 1521 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 19:01:49.303392 kubelet[1521]: I0412 19:01:49.303354 1521 server.go:919] "Client rotation is on, will bootstrap in background" Apr 12 19:01:49.307533 kubelet[1521]: I0412 19:01:49.307503 1521 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 19:01:49.323630 kubelet[1521]: I0412 19:01:49.323580 1521 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 19:01:49.324746 kubelet[1521]: I0412 19:01:49.324653 1521 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 19:01:49.325236 kubelet[1521]: I0412 19:01:49.325169 1521 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 19:01:49.325236 kubelet[1521]: I0412 19:01:49.325229 1521 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 19:01:49.325549 kubelet[1521]: I0412 19:01:49.325248 1521 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 19:01:49.325549 kubelet[1521]: I0412 19:01:49.325468 1521 state_mem.go:36] "Initialized new in-memory state store" Apr 12 19:01:49.325674 kubelet[1521]: I0412 19:01:49.325644 1521 kubelet.go:396] "Attempting to sync node with API server" Apr 12 19:01:49.325674 kubelet[1521]: I0412 19:01:49.325670 1521 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 19:01:49.325773 kubelet[1521]: I0412 19:01:49.325714 1521 kubelet.go:312] "Adding apiserver pod source" Apr 12 19:01:49.325773 kubelet[1521]: I0412 19:01:49.325737 1521 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 19:01:49.328146 kubelet[1521]: E0412 19:01:49.328109 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:01:49.328386 kubelet[1521]: E0412 19:01:49.328316 1521 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:01:49.328561 kubelet[1521]: I0412 19:01:49.328536 1521 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 19:01:49.329300 kubelet[1521]: I0412 19:01:49.329249 1521 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Apr 12 19:01:49.329420 kubelet[1521]: W0412 19:01:49.329401 1521 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 19:01:49.330316 kubelet[1521]: I0412 19:01:49.330289 1521 server.go:1256] "Started kubelet" Apr 12 19:01:49.330508 kubelet[1521]: I0412 19:01:49.330480 1521 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 19:01:49.330656 kubelet[1521]: I0412 19:01:49.330635 1521 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Apr 12 19:01:49.332773 kubelet[1521]: I0412 19:01:49.332728 1521 server.go:461] "Adding debug handlers to kubelet server" Apr 12 19:01:49.334000 audit[1521]: AVC avc: denied { mac_admin } for pid=1521 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:49.334000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:01:49.334000 audit[1521]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0001537d0 a1=c000a26d80 a2=c000a2bfb0 a3=25 items=0 ppid=1 pid=1521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:49.334000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:01:49.334000 audit[1521]: AVC avc: denied { mac_admin } for pid=1521 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:49.334000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:01:49.334000 audit[1521]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00010f3e0 a1=c000a26d98 a2=c000540ff0 a3=25 items=0 ppid=1 pid=1521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:49.334000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:01:49.336425 kubelet[1521]: I0412 19:01:49.335750 1521 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 19:01:49.336425 kubelet[1521]: I0412 19:01:49.335812 1521 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 19:01:49.336425 kubelet[1521]: I0412 19:01:49.335912 1521 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 19:01:49.336884 kubelet[1521]: I0412 19:01:49.336861 1521 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 19:01:49.339158 kubelet[1521]: I0412 19:01:49.339112 1521 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 19:01:49.340425 kubelet[1521]: I0412 19:01:49.340360 1521 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 19:01:49.340537 kubelet[1521]: I0412 19:01:49.340515 1521 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 19:01:49.345043 kubelet[1521]: I0412 19:01:49.344984 1521 factory.go:221] Registration of the containerd container factory successfully Apr 12 19:01:49.345043 kubelet[1521]: I0412 19:01:49.345009 1521 factory.go:221] Registration of the systemd container factory successfully Apr 12 19:01:49.345251 kubelet[1521]: I0412 19:01:49.345119 1521 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Apr 12 19:01:49.346736 kubelet[1521]: E0412 19:01:49.346714 1521 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 19:01:49.364966 kubelet[1521]: I0412 19:01:49.364932 1521 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 19:01:49.365223 kubelet[1521]: I0412 19:01:49.365207 1521 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 19:01:49.365375 kubelet[1521]: I0412 19:01:49.365361 1521 state_mem.go:36] "Initialized new in-memory state store" Apr 12 19:01:49.368430 kubelet[1521]: I0412 19:01:49.368402 1521 policy_none.go:49] "None policy: Start" Apr 12 19:01:49.375698 kubelet[1521]: I0412 19:01:49.375668 1521 memory_manager.go:170] "Starting memorymanager" policy="None" Apr 12 19:01:49.375931 kubelet[1521]: I0412 19:01:49.375915 1521 state_mem.go:35] "Initializing new in-memory state store" Apr 12 19:01:49.380788 kubelet[1521]: E0412 19:01:49.380717 1521 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.128.0.26\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Apr 12 19:01:49.380977 kubelet[1521]: W0412 19:01:49.380903 1521 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 19:01:49.380977 kubelet[1521]: E0412 19:01:49.380939 1521 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 19:01:49.381101 kubelet[1521]: W0412 19:01:49.381036 1521 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: nodes "10.128.0.26" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 19:01:49.381101 kubelet[1521]: E0412 19:01:49.381055 1521 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.128.0.26" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 19:01:49.381219 kubelet[1521]: W0412 19:01:49.381118 1521 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 19:01:49.381219 kubelet[1521]: E0412 19:01:49.381137 1521 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 19:01:49.381877 kubelet[1521]: E0412 19:01:49.381473 1521 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.128.0.26.17c59d97f929c8cc default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.128.0.26,UID:10.128.0.26,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.128.0.26,},FirstTimestamp:2024-04-12 19:01:49.330229452 +0000 UTC m=+0.554686236,LastTimestamp:2024-04-12 19:01:49.330229452 +0000 UTC m=+0.554686236,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.128.0.26,}" Apr 12 19:01:49.384992 kubelet[1521]: E0412 19:01:49.384682 1521 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.128.0.26.17c59d97fa24fa47 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.128.0.26,UID:10.128.0.26,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.128.0.26,},FirstTimestamp:2024-04-12 19:01:49.346691655 +0000 UTC m=+0.571148321,LastTimestamp:2024-04-12 19:01:49.346691655 +0000 UTC m=+0.571148321,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.128.0.26,}" Apr 12 19:01:49.390961 systemd[1]: Created slice kubepods.slice. Apr 12 19:01:49.405679 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 19:01:49.419000 audit[1536]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1536 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:49.419000 audit[1536]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc4f3dfa40 a2=0 a3=7ffc4f3dfa2c items=0 ppid=1521 pid=1536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:49.419000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 19:01:49.423883 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 19:01:49.424000 audit[1539]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1539 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:49.424000 audit[1539]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc8812eff0 a2=0 a3=7ffc8812efdc items=0 ppid=1521 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:49.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 19:01:49.426614 kubelet[1521]: I0412 19:01:49.426583 1521 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 19:01:49.425000 audit[1521]: AVC avc: denied { mac_admin } for pid=1521 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:49.425000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:01:49.425000 audit[1521]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e821b0 a1=c000dfecc0 a2=c000e82180 a3=25 items=0 ppid=1 pid=1521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:49.425000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:01:49.430204 kubelet[1521]: I0412 19:01:49.430178 1521 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 19:01:49.431297 kubelet[1521]: I0412 19:01:49.430919 1521 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 19:01:49.434988 kubelet[1521]: E0412 19:01:49.434959 1521 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.128.0.26\" not found" Apr 12 19:01:49.440351 kubelet[1521]: I0412 19:01:49.440318 1521 kubelet_node_status.go:73] "Attempting to register node" node="10.128.0.26" Apr 12 19:01:49.445826 kubelet[1521]: I0412 19:01:49.445789 1521 kubelet_node_status.go:76] "Successfully registered node" node="10.128.0.26" Apr 12 19:01:49.431000 audit[1541]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1541 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:49.431000 audit[1541]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd30e03360 a2=0 a3=7ffd30e0334c items=0 ppid=1521 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:49.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:01:49.456000 audit[1546]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1546 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:49.456000 audit[1546]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcf7a46590 a2=0 a3=7ffcf7a4657c items=0 ppid=1521 pid=1546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:49.456000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:01:49.491537 kubelet[1521]: E0412 19:01:49.491477 1521 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.26\" not found" Apr 12 19:01:49.519000 audit[1551]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1551 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:49.519000 audit[1551]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcc582aaf0 a2=0 a3=7ffcc582aadc items=0 ppid=1521 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:49.519000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 19:01:49.521161 kubelet[1521]: I0412 19:01:49.521089 1521 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 19:01:49.521000 audit[1553]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1553 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:49.521000 audit[1553]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8b3fbb20 a2=0 a3=7ffe8b3fbb0c items=0 ppid=1521 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:49.521000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 19:01:49.522000 audit[1552]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1552 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:49.522000 audit[1552]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd63cbe980 a2=0 a3=7ffd63cbe96c items=0 ppid=1521 pid=1552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:49.522000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 19:01:49.524818 kubelet[1521]: I0412 19:01:49.524786 1521 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 19:01:49.525063 kubelet[1521]: I0412 19:01:49.525032 1521 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 19:01:49.523000 audit[1554]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1554 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:49.523000 audit[1554]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcca90c950 a2=0 a3=7ffcca90c93c items=0 ppid=1521 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:49.523000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 19:01:49.525684 kubelet[1521]: I0412 19:01:49.525648 1521 kubelet.go:2329] "Starting kubelet main sync loop" Apr 12 19:01:49.525940 kubelet[1521]: E0412 19:01:49.525923 1521 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Apr 12 19:01:49.525000 audit[1555]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1555 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:49.525000 audit[1555]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8c5b78f0 a2=0 a3=7ffc8c5b78dc items=0 ppid=1521 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:49.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 19:01:49.527000 audit[1556]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1556 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:49.527000 audit[1556]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0faab920 a2=0 a3=7ffc0faab90c items=0 ppid=1521 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:49.527000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 19:01:49.529000 audit[1557]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1557 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:49.529000 audit[1557]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe962a7ea0 a2=0 a3=10e3 items=0 ppid=1521 pid=1557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:49.529000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 19:01:49.531000 audit[1558]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1558 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:49.531000 audit[1558]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffee2ab93f0 a2=0 a3=7ffee2ab93dc items=0 ppid=1521 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:49.531000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 19:01:49.592055 kubelet[1521]: E0412 19:01:49.591838 1521 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.26\" not found" Apr 12 19:01:49.692766 kubelet[1521]: E0412 19:01:49.692680 1521 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.26\" not found" Apr 12 19:01:49.793508 kubelet[1521]: E0412 19:01:49.793412 1521 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.26\" not found" Apr 12 19:01:49.894658 kubelet[1521]: E0412 19:01:49.894577 1521 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.26\" not found" Apr 12 19:01:49.995593 kubelet[1521]: E0412 19:01:49.995503 1521 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.26\" not found" Apr 12 19:01:50.096502 kubelet[1521]: E0412 19:01:50.096417 1521 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.26\" not found" Apr 12 19:01:50.197574 kubelet[1521]: E0412 19:01:50.197388 1521 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.26\" not found" Apr 12 19:01:50.298577 kubelet[1521]: E0412 19:01:50.298498 1521 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.26\" not found" Apr 12 19:01:50.306109 kubelet[1521]: I0412 19:01:50.306037 1521 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Apr 12 19:01:50.306449 kubelet[1521]: W0412 19:01:50.306421 1521 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Apr 12 19:01:50.328605 kubelet[1521]: E0412 19:01:50.328534 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:01:50.342940 sudo[1340]: pam_unix(sudo:session): session closed for user root Apr 12 19:01:50.341000 audit[1340]: USER_END pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:01:50.341000 audit[1340]: CRED_DISP pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:01:50.395145 sshd[1337]: pam_unix(sshd:session): session closed for user core Apr 12 19:01:50.395000 audit[1337]: USER_END pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:50.395000 audit[1337]: CRED_DISP pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:01:50.399769 kubelet[1521]: E0412 19:01:50.399738 1521 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.26\" not found" Apr 12 19:01:50.400968 systemd[1]: sshd@6-10.128.0.26:22-139.178.89.65:50684.service: Deactivated successfully. Apr 12 19:01:50.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.26:22-139.178.89.65:50684 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:01:50.402347 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 19:01:50.403334 systemd-logind[1122]: Session 7 logged out. Waiting for processes to exit. Apr 12 19:01:50.405013 systemd-logind[1122]: Removed session 7. Apr 12 19:01:50.500853 kubelet[1521]: E0412 19:01:50.500666 1521 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.26\" not found" Apr 12 19:01:50.601619 kubelet[1521]: E0412 19:01:50.601545 1521 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.26\" not found" Apr 12 19:01:50.702593 kubelet[1521]: E0412 19:01:50.702523 1521 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.26\" not found" Apr 12 19:01:50.804317 kubelet[1521]: I0412 19:01:50.803726 1521 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Apr 12 19:01:50.804877 env[1131]: time="2024-04-12T19:01:50.804811611Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 19:01:50.805781 kubelet[1521]: I0412 19:01:50.805730 1521 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Apr 12 19:01:51.327741 kubelet[1521]: I0412 19:01:51.327685 1521 apiserver.go:52] "Watching apiserver" Apr 12 19:01:51.328860 kubelet[1521]: E0412 19:01:51.328821 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:01:51.341503 kubelet[1521]: I0412 19:01:51.341453 1521 topology_manager.go:215] "Topology Admit Handler" podUID="080e1178-aabb-4545-bafd-0377d40e41b0" podNamespace="calico-system" podName="calico-node-wr5zv" Apr 12 19:01:51.341986 kubelet[1521]: I0412 19:01:51.341953 1521 topology_manager.go:215] "Topology Admit Handler" podUID="f39ba5a1-f691-4b08-a934-e09b8435cf50" podNamespace="calico-system" podName="csi-node-driver-7mwbm" Apr 12 19:01:51.342252 kubelet[1521]: I0412 19:01:51.342233 1521 topology_manager.go:215] "Topology Admit Handler" podUID="8b05767a-4edf-4bd8-86f2-ec4e414a9e3a" podNamespace="kube-system" podName="kube-proxy-qwrlk" Apr 12 19:01:51.345470 kubelet[1521]: I0412 19:01:51.345443 1521 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 19:01:51.349377 kubelet[1521]: E0412 19:01:51.343032 1521 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7mwbm" podUID="f39ba5a1-f691-4b08-a934-e09b8435cf50" Apr 12 19:01:51.353629 systemd[1]: Created slice kubepods-besteffort-pod080e1178_aabb_4545_bafd_0377d40e41b0.slice. Apr 12 19:01:51.359605 kubelet[1521]: I0412 19:01:51.359490 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/080e1178-aabb-4545-bafd-0377d40e41b0-lib-modules\") pod \"calico-node-wr5zv\" (UID: \"080e1178-aabb-4545-bafd-0377d40e41b0\") " pod="calico-system/calico-node-wr5zv" Apr 12 19:01:51.359605 kubelet[1521]: I0412 19:01:51.359569 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/080e1178-aabb-4545-bafd-0377d40e41b0-tigera-ca-bundle\") pod \"calico-node-wr5zv\" (UID: \"080e1178-aabb-4545-bafd-0377d40e41b0\") " pod="calico-system/calico-node-wr5zv" Apr 12 19:01:51.359605 kubelet[1521]: I0412 19:01:51.359609 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/080e1178-aabb-4545-bafd-0377d40e41b0-var-run-calico\") pod \"calico-node-wr5zv\" (UID: \"080e1178-aabb-4545-bafd-0377d40e41b0\") " pod="calico-system/calico-node-wr5zv" Apr 12 19:01:51.359986 kubelet[1521]: I0412 19:01:51.359839 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/f39ba5a1-f691-4b08-a934-e09b8435cf50-kubelet-dir\") pod \"csi-node-driver-7mwbm\" (UID: \"f39ba5a1-f691-4b08-a934-e09b8435cf50\") " pod="calico-system/csi-node-driver-7mwbm" Apr 12 19:01:51.359986 kubelet[1521]: I0412 19:01:51.359885 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/f39ba5a1-f691-4b08-a934-e09b8435cf50-socket-dir\") pod \"csi-node-driver-7mwbm\" (UID: \"f39ba5a1-f691-4b08-a934-e09b8435cf50\") " pod="calico-system/csi-node-driver-7mwbm" Apr 12 19:01:51.359986 kubelet[1521]: I0412 19:01:51.359924 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7mm6p\" (UniqueName: \"kubernetes.io/projected/f39ba5a1-f691-4b08-a934-e09b8435cf50-kube-api-access-7mm6p\") pod \"csi-node-driver-7mwbm\" (UID: \"f39ba5a1-f691-4b08-a934-e09b8435cf50\") " pod="calico-system/csi-node-driver-7mwbm" Apr 12 19:01:51.359986 kubelet[1521]: I0412 19:01:51.359961 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/080e1178-aabb-4545-bafd-0377d40e41b0-policysync\") pod \"calico-node-wr5zv\" (UID: \"080e1178-aabb-4545-bafd-0377d40e41b0\") " pod="calico-system/calico-node-wr5zv" Apr 12 19:01:51.360211 kubelet[1521]: I0412 19:01:51.359998 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/080e1178-aabb-4545-bafd-0377d40e41b0-node-certs\") pod \"calico-node-wr5zv\" (UID: \"080e1178-aabb-4545-bafd-0377d40e41b0\") " pod="calico-system/calico-node-wr5zv" Apr 12 19:01:51.360211 kubelet[1521]: I0412 19:01:51.360051 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/080e1178-aabb-4545-bafd-0377d40e41b0-cni-net-dir\") pod \"calico-node-wr5zv\" (UID: \"080e1178-aabb-4545-bafd-0377d40e41b0\") " pod="calico-system/calico-node-wr5zv" Apr 12 19:01:51.360211 kubelet[1521]: I0412 19:01:51.360096 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/080e1178-aabb-4545-bafd-0377d40e41b0-cni-log-dir\") pod \"calico-node-wr5zv\" (UID: \"080e1178-aabb-4545-bafd-0377d40e41b0\") " pod="calico-system/calico-node-wr5zv" Apr 12 19:01:51.360211 kubelet[1521]: I0412 19:01:51.360135 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/8b05767a-4edf-4bd8-86f2-ec4e414a9e3a-kube-proxy\") pod \"kube-proxy-qwrlk\" (UID: \"8b05767a-4edf-4bd8-86f2-ec4e414a9e3a\") " pod="kube-system/kube-proxy-qwrlk" Apr 12 19:01:51.360211 kubelet[1521]: I0412 19:01:51.360175 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7wvdw\" (UniqueName: \"kubernetes.io/projected/8b05767a-4edf-4bd8-86f2-ec4e414a9e3a-kube-api-access-7wvdw\") pod \"kube-proxy-qwrlk\" (UID: \"8b05767a-4edf-4bd8-86f2-ec4e414a9e3a\") " pod="kube-system/kube-proxy-qwrlk" Apr 12 19:01:51.360585 kubelet[1521]: I0412 19:01:51.360247 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/080e1178-aabb-4545-bafd-0377d40e41b0-xtables-lock\") pod \"calico-node-wr5zv\" (UID: \"080e1178-aabb-4545-bafd-0377d40e41b0\") " pod="calico-system/calico-node-wr5zv" Apr 12 19:01:51.360585 kubelet[1521]: I0412 19:01:51.360321 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/080e1178-aabb-4545-bafd-0377d40e41b0-var-lib-calico\") pod \"calico-node-wr5zv\" (UID: \"080e1178-aabb-4545-bafd-0377d40e41b0\") " pod="calico-system/calico-node-wr5zv" Apr 12 19:01:51.360585 kubelet[1521]: I0412 19:01:51.360363 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/080e1178-aabb-4545-bafd-0377d40e41b0-cni-bin-dir\") pod \"calico-node-wr5zv\" (UID: \"080e1178-aabb-4545-bafd-0377d40e41b0\") " pod="calico-system/calico-node-wr5zv" Apr 12 19:01:51.360585 kubelet[1521]: I0412 19:01:51.360405 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/080e1178-aabb-4545-bafd-0377d40e41b0-flexvol-driver-host\") pod \"calico-node-wr5zv\" (UID: \"080e1178-aabb-4545-bafd-0377d40e41b0\") " pod="calico-system/calico-node-wr5zv" Apr 12 19:01:51.360585 kubelet[1521]: I0412 19:01:51.360447 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-brdtc\" (UniqueName: \"kubernetes.io/projected/080e1178-aabb-4545-bafd-0377d40e41b0-kube-api-access-brdtc\") pod \"calico-node-wr5zv\" (UID: \"080e1178-aabb-4545-bafd-0377d40e41b0\") " pod="calico-system/calico-node-wr5zv" Apr 12 19:01:51.360924 kubelet[1521]: I0412 19:01:51.360484 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/f39ba5a1-f691-4b08-a934-e09b8435cf50-varrun\") pod \"csi-node-driver-7mwbm\" (UID: \"f39ba5a1-f691-4b08-a934-e09b8435cf50\") " pod="calico-system/csi-node-driver-7mwbm" Apr 12 19:01:51.360924 kubelet[1521]: I0412 19:01:51.360525 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8b05767a-4edf-4bd8-86f2-ec4e414a9e3a-xtables-lock\") pod \"kube-proxy-qwrlk\" (UID: \"8b05767a-4edf-4bd8-86f2-ec4e414a9e3a\") " pod="kube-system/kube-proxy-qwrlk" Apr 12 19:01:51.360924 kubelet[1521]: I0412 19:01:51.360566 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8b05767a-4edf-4bd8-86f2-ec4e414a9e3a-lib-modules\") pod \"kube-proxy-qwrlk\" (UID: \"8b05767a-4edf-4bd8-86f2-ec4e414a9e3a\") " pod="kube-system/kube-proxy-qwrlk" Apr 12 19:01:51.360924 kubelet[1521]: I0412 19:01:51.360604 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/f39ba5a1-f691-4b08-a934-e09b8435cf50-registration-dir\") pod \"csi-node-driver-7mwbm\" (UID: \"f39ba5a1-f691-4b08-a934-e09b8435cf50\") " pod="calico-system/csi-node-driver-7mwbm" Apr 12 19:01:51.378146 systemd[1]: Created slice kubepods-besteffort-pod8b05767a_4edf_4bd8_86f2_ec4e414a9e3a.slice. Apr 12 19:01:51.464318 kubelet[1521]: E0412 19:01:51.464255 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:51.464318 kubelet[1521]: W0412 19:01:51.464303 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:51.464318 kubelet[1521]: E0412 19:01:51.464334 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:51.465042 kubelet[1521]: E0412 19:01:51.465013 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:51.465179 kubelet[1521]: W0412 19:01:51.465039 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:51.465179 kubelet[1521]: E0412 19:01:51.465076 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:51.465402 kubelet[1521]: E0412 19:01:51.465381 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:51.465402 kubelet[1521]: W0412 19:01:51.465402 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:51.465587 kubelet[1521]: E0412 19:01:51.465421 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:51.465884 kubelet[1521]: E0412 19:01:51.465859 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:51.465884 kubelet[1521]: W0412 19:01:51.465883 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:51.466047 kubelet[1521]: E0412 19:01:51.465902 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:51.467018 kubelet[1521]: E0412 19:01:51.466970 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:51.467018 kubelet[1521]: W0412 19:01:51.467016 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:51.467202 kubelet[1521]: E0412 19:01:51.467042 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:51.467415 kubelet[1521]: E0412 19:01:51.467398 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:51.467415 kubelet[1521]: W0412 19:01:51.467414 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:51.467559 kubelet[1521]: E0412 19:01:51.467542 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:51.467755 kubelet[1521]: E0412 19:01:51.467734 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:51.467755 kubelet[1521]: W0412 19:01:51.467754 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:51.467902 kubelet[1521]: E0412 19:01:51.467876 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:51.468106 kubelet[1521]: E0412 19:01:51.468086 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:51.468106 kubelet[1521]: W0412 19:01:51.468104 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:51.468295 kubelet[1521]: E0412 19:01:51.468226 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:51.468460 kubelet[1521]: E0412 19:01:51.468445 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:51.468460 kubelet[1521]: W0412 19:01:51.468459 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:51.468601 kubelet[1521]: E0412 19:01:51.468579 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:51.468796 kubelet[1521]: E0412 19:01:51.468776 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:51.468796 kubelet[1521]: W0412 19:01:51.468796 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:51.468955 kubelet[1521]: E0412 19:01:51.468819 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:51.469328 kubelet[1521]: E0412 19:01:51.469255 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:51.469328 kubelet[1521]: W0412 19:01:51.469287 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:51.469520 kubelet[1521]: E0412 19:01:51.469493 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:51.469736 kubelet[1521]: E0412 19:01:51.469716 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:51.469930 kubelet[1521]: W0412 19:01:51.469739 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:51.469930 kubelet[1521]: E0412 19:01:51.469886 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:51.470102 kubelet[1521]: E0412 19:01:51.470083 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:51.470102 kubelet[1521]: W0412 19:01:51.470101 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:51.470246 kubelet[1521]: E0412 19:01:51.470126 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:51.470488 kubelet[1521]: E0412 19:01:51.470460 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:51.470488 kubelet[1521]: W0412 19:01:51.470481 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:51.470669 kubelet[1521]: E0412 19:01:51.470505 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:51.470880 kubelet[1521]: E0412 19:01:51.470860 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:51.470880 kubelet[1521]: W0412 19:01:51.470880 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:51.471025 kubelet[1521]: E0412 19:01:51.470903 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:51.471213 kubelet[1521]: E0412 19:01:51.471191 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:51.471213 kubelet[1521]: W0412 19:01:51.471211 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:51.471382 kubelet[1521]: E0412 19:01:51.471231 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:51.471601 kubelet[1521]: E0412 19:01:51.471582 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:51.471601 kubelet[1521]: W0412 19:01:51.471601 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:51.471735 kubelet[1521]: E0412 19:01:51.471621 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:51.482437 kubelet[1521]: E0412 19:01:51.482398 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:51.482437 kubelet[1521]: W0412 19:01:51.482429 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:51.482719 kubelet[1521]: E0412 19:01:51.482472 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:51.495119 kubelet[1521]: E0412 19:01:51.495065 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:51.495119 kubelet[1521]: W0412 19:01:51.495110 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:51.495419 kubelet[1521]: E0412 19:01:51.495146 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:51.505885 kubelet[1521]: E0412 19:01:51.505852 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:51.505885 kubelet[1521]: W0412 19:01:51.505878 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:51.506133 kubelet[1521]: E0412 19:01:51.505910 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:51.519063 kubelet[1521]: E0412 19:01:51.517404 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:51.519063 kubelet[1521]: W0412 19:01:51.517432 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:51.519063 kubelet[1521]: E0412 19:01:51.517465 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:51.674556 env[1131]: time="2024-04-12T19:01:51.674476757Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wr5zv,Uid:080e1178-aabb-4545-bafd-0377d40e41b0,Namespace:calico-system,Attempt:0,}" Apr 12 19:01:51.684613 env[1131]: time="2024-04-12T19:01:51.684544704Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qwrlk,Uid:8b05767a-4edf-4bd8-86f2-ec4e414a9e3a,Namespace:kube-system,Attempt:0,}" Apr 12 19:01:52.276988 env[1131]: time="2024-04-12T19:01:52.276891589Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:52.278529 env[1131]: time="2024-04-12T19:01:52.278472378Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:52.282811 env[1131]: time="2024-04-12T19:01:52.282760730Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:52.284312 env[1131]: time="2024-04-12T19:01:52.284244568Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:52.285443 env[1131]: time="2024-04-12T19:01:52.285397417Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:52.288502 env[1131]: time="2024-04-12T19:01:52.288406800Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:52.289566 env[1131]: time="2024-04-12T19:01:52.289521838Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:52.295000 env[1131]: time="2024-04-12T19:01:52.294939969Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:52.324351 env[1131]: time="2024-04-12T19:01:52.324196756Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:01:52.324351 env[1131]: time="2024-04-12T19:01:52.324261985Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:01:52.324351 env[1131]: time="2024-04-12T19:01:52.324300431Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:01:52.325053 env[1131]: time="2024-04-12T19:01:52.324979070Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9b250ef1fcfdfb8bedd6f402f07240b06f01d31da4ebc3ac32a05b055cca909a pid=1599 runtime=io.containerd.runc.v2 Apr 12 19:01:52.328732 env[1131]: time="2024-04-12T19:01:52.328620843Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:01:52.328876 env[1131]: time="2024-04-12T19:01:52.328799057Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:01:52.328984 env[1131]: time="2024-04-12T19:01:52.328896017Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:01:52.329514 env[1131]: time="2024-04-12T19:01:52.329412069Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/321a781d9ed4188c6e183c47d2a05c18dc207b34bb3f81454f2a76753a1238b3 pid=1603 runtime=io.containerd.runc.v2 Apr 12 19:01:52.329946 kubelet[1521]: E0412 19:01:52.329877 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:01:52.356831 systemd[1]: Started cri-containerd-9b250ef1fcfdfb8bedd6f402f07240b06f01d31da4ebc3ac32a05b055cca909a.scope. Apr 12 19:01:52.385107 systemd[1]: Started cri-containerd-321a781d9ed4188c6e183c47d2a05c18dc207b34bb3f81454f2a76753a1238b3.scope. Apr 12 19:01:52.411799 kernel: kauditd_printk_skb: 483 callbacks suppressed Apr 12 19:01:52.411993 kernel: audit: type=1400 audit(1712948512.405:618): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.454475 kernel: audit: type=1400 audit(1712948512.406:619): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.454712 kernel: audit: type=1400 audit(1712948512.406:620): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.480304 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 19:01:52.501641 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 19:01:52.501806 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 19:01:52.501896 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 19:01:52.501935 kernel: audit: backlog limit exceeded Apr 12 19:01:52.501985 kernel: audit: type=1400 audit(1712948512.406:621): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.502025 kernel: audit: backlog limit exceeded Apr 12 19:01:52.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.459000 audit: BPF prog-id=70 op=LOAD Apr 12 19:01:52.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.474000 audit: BPF prog-id=71 op=LOAD Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1599 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962323530656631666366646662386265646436663430326630373234 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1599 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962323530656631666366646662386265646436663430326630373234 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit: BPF prog-id=72 op=LOAD Apr 12 19:01:52.475000 audit[1616]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00031c610 items=0 ppid=1599 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962323530656631666366646662386265646436663430326630373234 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit: BPF prog-id=73 op=LOAD Apr 12 19:01:52.475000 audit[1616]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00031c658 items=0 ppid=1599 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962323530656631666366646662386265646436663430326630373234 Apr 12 19:01:52.475000 audit: BPF prog-id=73 op=UNLOAD Apr 12 19:01:52.475000 audit: BPF prog-id=72 op=UNLOAD Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.475000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.501000 audit[1622]: AVC avc: denied { perfmon } for pid=1622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.501000 audit[1622]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1603 pid=1622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332316137383164396564343138386336653138336334376432613035 Apr 12 19:01:52.506000 audit[1622]: AVC avc: denied { bpf } for pid=1622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.506000 audit[1622]: AVC avc: denied { bpf } for pid=1622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.506000 audit[1622]: AVC avc: denied { bpf } for pid=1622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.506000 audit[1622]: AVC avc: denied { perfmon } for pid=1622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.506000 audit[1622]: AVC avc: denied { perfmon } for pid=1622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.506000 audit[1622]: AVC avc: denied { perfmon } for pid=1622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.506000 audit[1622]: AVC avc: denied { perfmon } for pid=1622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.506000 audit[1622]: AVC avc: denied { perfmon } for pid=1622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.506000 audit[1622]: AVC avc: denied { bpf } for pid=1622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.506000 audit[1622]: AVC avc: denied { bpf } for pid=1622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.506000 audit: BPF prog-id=75 op=LOAD Apr 12 19:01:52.506000 audit[1622]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00031d0e0 items=0 ppid=1603 pid=1622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332316137383164396564343138386336653138336334376432613035 Apr 12 19:01:52.531000 audit[1622]: AVC avc: denied { bpf } for pid=1622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.531000 audit[1622]: AVC avc: denied { bpf } for pid=1622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.531000 audit[1622]: AVC avc: denied { perfmon } for pid=1622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.531000 audit[1622]: AVC avc: denied { perfmon } for pid=1622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.531000 audit[1622]: AVC avc: denied { perfmon } for pid=1622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.531000 audit[1622]: AVC avc: denied { perfmon } for pid=1622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.531000 audit[1622]: AVC avc: denied { perfmon } for pid=1622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.531000 audit[1622]: AVC avc: denied { bpf } for pid=1622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.531000 audit[1622]: AVC avc: denied { bpf } for pid=1622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.531000 audit: BPF prog-id=76 op=LOAD Apr 12 19:01:52.531000 audit[1622]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00031d128 items=0 ppid=1603 pid=1622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332316137383164396564343138386336653138336334376432613035 Apr 12 19:01:52.533000 audit: BPF prog-id=76 op=UNLOAD Apr 12 19:01:52.533000 audit: BPF prog-id=75 op=UNLOAD Apr 12 19:01:52.533000 audit[1622]: AVC avc: denied { bpf } for pid=1622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.533000 audit[1622]: AVC avc: denied { bpf } for pid=1622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.533000 audit[1622]: AVC avc: denied { bpf } for pid=1622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.533000 audit[1622]: AVC avc: denied { perfmon } for pid=1622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.533000 audit[1622]: AVC avc: denied { perfmon } for pid=1622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.533000 audit[1622]: AVC avc: denied { perfmon } for pid=1622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.533000 audit[1622]: AVC avc: denied { perfmon } for pid=1622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.533000 audit[1622]: AVC avc: denied { perfmon } for pid=1622 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.533000 audit[1622]: AVC avc: denied { bpf } for pid=1622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.533000 audit[1622]: AVC avc: denied { bpf } for pid=1622 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:52.533000 audit: BPF prog-id=77 op=LOAD Apr 12 19:01:52.533000 audit[1622]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00031d538 items=0 ppid=1603 pid=1622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332316137383164396564343138386336653138336334376432613035 Apr 12 19:01:52.538952 kubelet[1521]: E0412 19:01:52.538304 1521 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7mwbm" podUID="f39ba5a1-f691-4b08-a934-e09b8435cf50" Apr 12 19:01:52.539366 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1954346607.mount: Deactivated successfully. Apr 12 19:01:52.475000 audit[1616]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00031ca68 items=0 ppid=1599 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:52.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962323530656631666366646662386265646436663430326630373234 Apr 12 19:01:52.571757 env[1131]: time="2024-04-12T19:01:52.571679915Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qwrlk,Uid:8b05767a-4edf-4bd8-86f2-ec4e414a9e3a,Namespace:kube-system,Attempt:0,} returns sandbox id \"321a781d9ed4188c6e183c47d2a05c18dc207b34bb3f81454f2a76753a1238b3\"" Apr 12 19:01:52.578231 env[1131]: time="2024-04-12T19:01:52.576638357Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\"" Apr 12 19:01:52.579573 env[1131]: time="2024-04-12T19:01:52.579506968Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wr5zv,Uid:080e1178-aabb-4545-bafd-0377d40e41b0,Namespace:calico-system,Attempt:0,} returns sandbox id \"9b250ef1fcfdfb8bedd6f402f07240b06f01d31da4ebc3ac32a05b055cca909a\"" Apr 12 19:01:53.330586 kubelet[1521]: E0412 19:01:53.330487 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:01:53.777337 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3671982677.mount: Deactivated successfully. Apr 12 19:01:54.331664 kubelet[1521]: E0412 19:01:54.331556 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:01:54.510561 env[1131]: time="2024-04-12T19:01:54.510484496Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:54.515840 env[1131]: time="2024-04-12T19:01:54.515780910Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a1d263b5dc5b0acea099d5e91a3a041b6704392ad95e5ea3b5bbe4f71784e392,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:54.518709 env[1131]: time="2024-04-12T19:01:54.518631513Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:54.521962 env[1131]: time="2024-04-12T19:01:54.521892265Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fa87cba052adcb992bd59bd1304115c6f3b3fb370407805ba52af3d9ff3f0863,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:54.523174 env[1131]: time="2024-04-12T19:01:54.523018599Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\" returns image reference \"sha256:a1d263b5dc5b0acea099d5e91a3a041b6704392ad95e5ea3b5bbe4f71784e392\"" Apr 12 19:01:54.525187 env[1131]: time="2024-04-12T19:01:54.525136702Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 19:01:54.526823 kubelet[1521]: E0412 19:01:54.526776 1521 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7mwbm" podUID="f39ba5a1-f691-4b08-a934-e09b8435cf50" Apr 12 19:01:54.528494 env[1131]: time="2024-04-12T19:01:54.528439636Z" level=info msg="CreateContainer within sandbox \"321a781d9ed4188c6e183c47d2a05c18dc207b34bb3f81454f2a76753a1238b3\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 19:01:54.552762 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2645910471.mount: Deactivated successfully. Apr 12 19:01:54.563413 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2413920097.mount: Deactivated successfully. Apr 12 19:01:54.571489 env[1131]: time="2024-04-12T19:01:54.571422896Z" level=info msg="CreateContainer within sandbox \"321a781d9ed4188c6e183c47d2a05c18dc207b34bb3f81454f2a76753a1238b3\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"37930b5a1e7d45beb55e48293d8179c5348b1d34d158d7a53ae072e802f7b428\"" Apr 12 19:01:54.573113 env[1131]: time="2024-04-12T19:01:54.573072770Z" level=info msg="StartContainer for \"37930b5a1e7d45beb55e48293d8179c5348b1d34d158d7a53ae072e802f7b428\"" Apr 12 19:01:54.605027 systemd[1]: Started cri-containerd-37930b5a1e7d45beb55e48293d8179c5348b1d34d158d7a53ae072e802f7b428.scope. Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1b0d61da18 items=0 ppid=1603 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337393330623561316537643435626562353565343832393364383137 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit: BPF prog-id=78 op=LOAD Apr 12 19:01:54.636000 audit[1680]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000dfa18 items=0 ppid=1603 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337393330623561316537643435626562353565343832393364383137 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit: BPF prog-id=79 op=LOAD Apr 12 19:01:54.636000 audit[1680]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000dfa68 items=0 ppid=1603 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337393330623561316537643435626562353565343832393364383137 Apr 12 19:01:54.636000 audit: BPF prog-id=79 op=UNLOAD Apr 12 19:01:54.636000 audit: BPF prog-id=78 op=UNLOAD Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:54.636000 audit: BPF prog-id=80 op=LOAD Apr 12 19:01:54.636000 audit[1680]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000dfaf8 items=0 ppid=1603 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337393330623561316537643435626562353565343832393364383137 Apr 12 19:01:54.663334 env[1131]: time="2024-04-12T19:01:54.661907372Z" level=info msg="StartContainer for \"37930b5a1e7d45beb55e48293d8179c5348b1d34d158d7a53ae072e802f7b428\" returns successfully" Apr 12 19:01:54.753000 audit[1732]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.753000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce8683000 a2=0 a3=7ffce8682fec items=0 ppid=1691 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 19:01:54.755000 audit[1733]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:54.755000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0de66b30 a2=0 a3=7ffc0de66b1c items=0 ppid=1691 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.755000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 19:01:54.758000 audit[1734]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.758000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcaa31060 a2=0 a3=7fffcaa3104c items=0 ppid=1691 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.758000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 19:01:54.758000 audit[1735]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:54.758000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda5094700 a2=0 a3=7ffda50946ec items=0 ppid=1691 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.758000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 19:01:54.760000 audit[1736]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.760000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed1178ce0 a2=0 a3=7ffed1178ccc items=0 ppid=1691 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.760000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 19:01:54.761000 audit[1737]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:54.761000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd34b20020 a2=0 a3=7ffd34b2000c items=0 ppid=1691 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.761000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 19:01:54.864000 audit[1738]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.864000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd0d2b58a0 a2=0 a3=7ffd0d2b588c items=0 ppid=1691 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.864000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 19:01:54.869000 audit[1740]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.869000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffa5164550 a2=0 a3=7fffa516453c items=0 ppid=1691 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.869000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 19:01:54.875000 audit[1743]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.875000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe6baee940 a2=0 a3=7ffe6baee92c items=0 ppid=1691 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.875000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 19:01:54.877000 audit[1744]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.877000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7546b460 a2=0 a3=7ffc7546b44c items=0 ppid=1691 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.877000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 19:01:54.881000 audit[1746]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.881000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff404d2050 a2=0 a3=7fff404d203c items=0 ppid=1691 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.881000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 19:01:54.884000 audit[1747]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.884000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb87c78b0 a2=0 a3=7ffeb87c789c items=0 ppid=1691 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 19:01:54.889000 audit[1749]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.889000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd33664a60 a2=0 a3=7ffd33664a4c items=0 ppid=1691 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.889000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 19:01:54.894000 audit[1752]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.894000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdc5799100 a2=0 a3=7ffdc57990ec items=0 ppid=1691 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.894000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 19:01:54.896000 audit[1753]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.896000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3746a320 a2=0 a3=7ffd3746a30c items=0 ppid=1691 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.896000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 19:01:54.901000 audit[1755]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.901000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffda757f090 a2=0 a3=7ffda757f07c items=0 ppid=1691 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.901000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 19:01:54.903000 audit[1756]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.903000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe90c26630 a2=0 a3=7ffe90c2661c items=0 ppid=1691 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.903000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 19:01:54.907000 audit[1758]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.907000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc61ece820 a2=0 a3=7ffc61ece80c items=0 ppid=1691 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.907000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 19:01:54.915000 audit[1761]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.915000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffebe377f30 a2=0 a3=7ffebe377f1c items=0 ppid=1691 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.915000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 19:01:54.922000 audit[1764]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.922000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc01b673a0 a2=0 a3=7ffc01b6738c items=0 ppid=1691 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.922000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 19:01:54.924000 audit[1765]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.924000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcd869afa0 a2=0 a3=7ffcd869af8c items=0 ppid=1691 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.924000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 19:01:54.927000 audit[1767]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.927000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff48073fa0 a2=0 a3=7fff48073f8c items=0 ppid=1691 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.927000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:01:54.963000 audit[1772]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.963000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff4115c320 a2=0 a3=7fff4115c30c items=0 ppid=1691 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.963000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:01:54.965000 audit[1773]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.965000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3194cb90 a2=0 a3=7ffd3194cb7c items=0 ppid=1691 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.965000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 19:01:54.969000 audit[1775]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:01:54.969000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdfe68e5e0 a2=0 a3=7ffdfe68e5cc items=0 ppid=1691 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:54.969000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 19:01:55.001000 audit[1781]: NETFILTER_CFG table=filter:39 family=2 entries=6 op=nft_register_rule pid=1781 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:55.001000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc21c445b0 a2=0 a3=7ffc21c4459c items=0 ppid=1691 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.001000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:55.035000 audit[1781]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:01:55.035000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=25476 a0=3 a1=7ffc21c445b0 a2=0 a3=7ffc21c4459c items=0 ppid=1691 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.035000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:55.059000 audit[1790]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.059000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd2104a340 a2=0 a3=7ffd2104a32c items=0 ppid=1691 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.059000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 19:01:55.066000 audit[1792]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.066000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdf9bdd230 a2=0 a3=7ffdf9bdd21c items=0 ppid=1691 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.066000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 19:01:55.073000 audit[1795]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.073000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd7ef531c0 a2=0 a3=7ffd7ef531ac items=0 ppid=1691 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.073000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 19:01:55.076000 audit[1796]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.076000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9adf7c90 a2=0 a3=7ffe9adf7c7c items=0 ppid=1691 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.076000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 19:01:55.082000 audit[1798]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.082000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd76025440 a2=0 a3=7ffd7602542c items=0 ppid=1691 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.082000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 19:01:55.084000 audit[1799]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.084000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff988154f0 a2=0 a3=7fff988154dc items=0 ppid=1691 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.084000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 19:01:55.089000 audit[1801]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1801 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.089000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd3a0b05d0 a2=0 a3=7ffd3a0b05bc items=0 ppid=1691 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.089000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 19:01:55.096000 audit[1804]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.096000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc5250f410 a2=0 a3=7ffc5250f3fc items=0 ppid=1691 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.096000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 19:01:55.098000 audit[1805]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.098000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdfe4c56a0 a2=0 a3=7ffdfe4c568c items=0 ppid=1691 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.098000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 19:01:55.101000 audit[1807]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.101000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd4d7ef870 a2=0 a3=7ffd4d7ef85c items=0 ppid=1691 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.101000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 19:01:55.103000 audit[1808]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.103000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7b4ef1a0 a2=0 a3=7fff7b4ef18c items=0 ppid=1691 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.103000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 19:01:55.107000 audit[1810]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1810 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.107000 audit[1810]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff429fbc70 a2=0 a3=7fff429fbc5c items=0 ppid=1691 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.107000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 19:01:55.114000 audit[1813]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1813 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.114000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdde488d30 a2=0 a3=7ffdde488d1c items=0 ppid=1691 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 19:01:55.122000 audit[1816]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1816 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.122000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff95bed350 a2=0 a3=7fff95bed33c items=0 ppid=1691 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.122000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 19:01:55.124000 audit[1817]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1817 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.124000 audit[1817]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe95f55010 a2=0 a3=7ffe95f54ffc items=0 ppid=1691 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.124000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 19:01:55.128000 audit[1819]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1819 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.128000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffeabc9ff40 a2=0 a3=7ffeabc9ff2c items=0 ppid=1691 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.128000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:01:55.134000 audit[1822]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1822 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.134000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc2407a230 a2=0 a3=7ffc2407a21c items=0 ppid=1691 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.134000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:01:55.136000 audit[1823]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.136000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff3a27f90 a2=0 a3=7ffff3a27f7c items=0 ppid=1691 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.136000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 19:01:55.141000 audit[1825]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1825 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.141000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffca7e5810 a2=0 a3=7fffca7e57fc items=0 ppid=1691 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.141000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 19:01:55.144000 audit[1826]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1826 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.144000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef611d7a0 a2=0 a3=7ffef611d78c items=0 ppid=1691 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.144000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 19:01:55.149000 audit[1828]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1828 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.149000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffb7b5a690 a2=0 a3=7fffb7b5a67c items=0 ppid=1691 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.149000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:01:55.155000 audit[1831]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1831 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:01:55.155000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc01b7c8a0 a2=0 a3=7ffc01b7c88c items=0 ppid=1691 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.155000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:01:55.161000 audit[1833]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1833 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 19:01:55.161000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffff7c6c800 a2=0 a3=7ffff7c6c7ec items=0 ppid=1691 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.161000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:55.162000 audit[1833]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1833 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 19:01:55.162000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffff7c6c800 a2=0 a3=7ffff7c6c7ec items=0 ppid=1691 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:55.162000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:01:55.332828 kubelet[1521]: E0412 19:01:55.332668 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:01:55.363299 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount647687546.mount: Deactivated successfully. Apr 12 19:01:55.574686 kubelet[1521]: I0412 19:01:55.572619 1521 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-qwrlk" podStartSLOduration=4.623508208 podStartE2EDuration="6.572543157s" podCreationTimestamp="2024-04-12 19:01:49 +0000 UTC" firstStartedPulling="2024-04-12 19:01:52.574999566 +0000 UTC m=+3.799456211" lastFinishedPulling="2024-04-12 19:01:54.524034494 +0000 UTC m=+5.748491160" observedRunningTime="2024-04-12 19:01:55.572172429 +0000 UTC m=+6.796629102" watchObservedRunningTime="2024-04-12 19:01:55.572543157 +0000 UTC m=+6.796999831" Apr 12 19:01:55.582360 kubelet[1521]: E0412 19:01:55.582317 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.582632 kubelet[1521]: W0412 19:01:55.582354 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.582632 kubelet[1521]: E0412 19:01:55.582420 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.582837 kubelet[1521]: E0412 19:01:55.582816 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.582923 kubelet[1521]: W0412 19:01:55.582842 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.582923 kubelet[1521]: E0412 19:01:55.582865 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.583225 kubelet[1521]: E0412 19:01:55.583200 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.583332 kubelet[1521]: W0412 19:01:55.583230 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.583332 kubelet[1521]: E0412 19:01:55.583252 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.583668 kubelet[1521]: E0412 19:01:55.583618 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.583668 kubelet[1521]: W0412 19:01:55.583641 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.583668 kubelet[1521]: E0412 19:01:55.583663 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.584019 kubelet[1521]: E0412 19:01:55.583999 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.584019 kubelet[1521]: W0412 19:01:55.584018 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.584167 kubelet[1521]: E0412 19:01:55.584049 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.584504 kubelet[1521]: E0412 19:01:55.584484 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.584504 kubelet[1521]: W0412 19:01:55.584504 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.584677 kubelet[1521]: E0412 19:01:55.584535 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.584872 kubelet[1521]: E0412 19:01:55.584853 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.584872 kubelet[1521]: W0412 19:01:55.584872 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.585326 kubelet[1521]: E0412 19:01:55.584891 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.585326 kubelet[1521]: E0412 19:01:55.585192 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.585326 kubelet[1521]: W0412 19:01:55.585205 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.585326 kubelet[1521]: E0412 19:01:55.585225 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.585674 kubelet[1521]: E0412 19:01:55.585654 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.585674 kubelet[1521]: W0412 19:01:55.585674 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.585816 kubelet[1521]: E0412 19:01:55.585694 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.586036 kubelet[1521]: E0412 19:01:55.586015 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.586036 kubelet[1521]: W0412 19:01:55.586036 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.586227 kubelet[1521]: E0412 19:01:55.586065 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.586448 kubelet[1521]: E0412 19:01:55.586416 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.586448 kubelet[1521]: W0412 19:01:55.586448 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.586604 kubelet[1521]: E0412 19:01:55.586467 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.586832 kubelet[1521]: E0412 19:01:55.586798 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.586832 kubelet[1521]: W0412 19:01:55.586820 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.587040 kubelet[1521]: E0412 19:01:55.586840 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.587201 kubelet[1521]: E0412 19:01:55.587181 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.587201 kubelet[1521]: W0412 19:01:55.587201 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.588120 kubelet[1521]: E0412 19:01:55.587230 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.588120 kubelet[1521]: E0412 19:01:55.587597 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.588120 kubelet[1521]: W0412 19:01:55.587610 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.588120 kubelet[1521]: E0412 19:01:55.587631 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.588401 kubelet[1521]: E0412 19:01:55.588123 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.588401 kubelet[1521]: W0412 19:01:55.588137 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.588401 kubelet[1521]: E0412 19:01:55.588159 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.588629 kubelet[1521]: E0412 19:01:55.588532 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.588629 kubelet[1521]: W0412 19:01:55.588558 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.588629 kubelet[1521]: E0412 19:01:55.588578 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.588920 kubelet[1521]: E0412 19:01:55.588898 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.588920 kubelet[1521]: W0412 19:01:55.588919 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.589074 kubelet[1521]: E0412 19:01:55.588939 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.589329 kubelet[1521]: E0412 19:01:55.589259 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.589329 kubelet[1521]: W0412 19:01:55.589329 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.589469 kubelet[1521]: E0412 19:01:55.589351 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.589706 kubelet[1521]: E0412 19:01:55.589683 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.589706 kubelet[1521]: W0412 19:01:55.589704 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.589864 kubelet[1521]: E0412 19:01:55.589724 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.590049 kubelet[1521]: E0412 19:01:55.590025 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.590049 kubelet[1521]: W0412 19:01:55.590049 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.590170 kubelet[1521]: E0412 19:01:55.590069 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.594623 kubelet[1521]: E0412 19:01:55.594598 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.594623 kubelet[1521]: W0412 19:01:55.594624 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.594806 kubelet[1521]: E0412 19:01:55.594646 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.595050 kubelet[1521]: E0412 19:01:55.595029 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.595130 kubelet[1521]: W0412 19:01:55.595049 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.595130 kubelet[1521]: E0412 19:01:55.595082 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.595505 kubelet[1521]: E0412 19:01:55.595483 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.595505 kubelet[1521]: W0412 19:01:55.595504 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.595666 kubelet[1521]: E0412 19:01:55.595529 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.595876 kubelet[1521]: E0412 19:01:55.595856 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.595876 kubelet[1521]: W0412 19:01:55.595876 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.596012 kubelet[1521]: E0412 19:01:55.595899 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.596300 kubelet[1521]: E0412 19:01:55.596280 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.596300 kubelet[1521]: W0412 19:01:55.596300 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.596456 kubelet[1521]: E0412 19:01:55.596438 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.596923 kubelet[1521]: E0412 19:01:55.596902 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.596923 kubelet[1521]: W0412 19:01:55.596923 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.597081 kubelet[1521]: E0412 19:01:55.596950 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.597520 kubelet[1521]: E0412 19:01:55.597499 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.597520 kubelet[1521]: W0412 19:01:55.597518 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.597681 kubelet[1521]: E0412 19:01:55.597566 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.597961 kubelet[1521]: E0412 19:01:55.597932 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.598045 kubelet[1521]: W0412 19:01:55.598008 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.598368 kubelet[1521]: E0412 19:01:55.598142 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.598460 kubelet[1521]: E0412 19:01:55.598446 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.598580 kubelet[1521]: W0412 19:01:55.598459 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.598580 kubelet[1521]: E0412 19:01:55.598485 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.599238 kubelet[1521]: E0412 19:01:55.599204 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.599238 kubelet[1521]: W0412 19:01:55.599225 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.599429 kubelet[1521]: E0412 19:01:55.599254 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.599918 kubelet[1521]: E0412 19:01:55.599894 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.599918 kubelet[1521]: W0412 19:01:55.599920 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.600076 kubelet[1521]: E0412 19:01:55.599940 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:55.600534 kubelet[1521]: E0412 19:01:55.600512 1521 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:01:55.600534 kubelet[1521]: W0412 19:01:55.600533 1521 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:01:55.600668 kubelet[1521]: E0412 19:01:55.600554 1521 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:01:56.049356 env[1131]: time="2024-04-12T19:01:56.049252523Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:56.052738 env[1131]: time="2024-04-12T19:01:56.052689061Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:56.057093 env[1131]: time="2024-04-12T19:01:56.057043547Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:56.061773 env[1131]: time="2024-04-12T19:01:56.061723671Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:01:56.062464 env[1131]: time="2024-04-12T19:01:56.062399590Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\"" Apr 12 19:01:56.067246 env[1131]: time="2024-04-12T19:01:56.067066830Z" level=info msg="CreateContainer within sandbox \"9b250ef1fcfdfb8bedd6f402f07240b06f01d31da4ebc3ac32a05b055cca909a\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 19:01:56.086519 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3542880961.mount: Deactivated successfully. Apr 12 19:01:56.095559 env[1131]: time="2024-04-12T19:01:56.095458797Z" level=info msg="CreateContainer within sandbox \"9b250ef1fcfdfb8bedd6f402f07240b06f01d31da4ebc3ac32a05b055cca909a\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"c86ff04b26950db531dbee68af7e2fd1948a113978a83b382cf2eb86d7cc8b94\"" Apr 12 19:01:56.096589 env[1131]: time="2024-04-12T19:01:56.096526596Z" level=info msg="StartContainer for \"c86ff04b26950db531dbee68af7e2fd1948a113978a83b382cf2eb86d7cc8b94\"" Apr 12 19:01:56.145520 systemd[1]: run-containerd-runc-k8s.io-c86ff04b26950db531dbee68af7e2fd1948a113978a83b382cf2eb86d7cc8b94-runc.16jWA6.mount: Deactivated successfully. Apr 12 19:01:56.149748 systemd[1]: Started cri-containerd-c86ff04b26950db531dbee68af7e2fd1948a113978a83b382cf2eb86d7cc8b94.scope. Apr 12 19:01:56.181000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.181000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fec4c5d18c8 items=0 ppid=1599 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:56.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338366666303462323639353064623533316462656536386166376532 Apr 12 19:01:56.181000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.181000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.181000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.181000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.181000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.181000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.181000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.181000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.181000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.181000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.181000 audit: BPF prog-id=81 op=LOAD Apr 12 19:01:56.181000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00028a388 items=0 ppid=1599 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:56.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338366666303462323639353064623533316462656536386166376532 Apr 12 19:01:56.181000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.181000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.181000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.181000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.181000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.181000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.181000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.181000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.181000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.181000 audit: BPF prog-id=82 op=LOAD Apr 12 19:01:56.181000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00028a3d8 items=0 ppid=1599 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:56.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338366666303462323639353064623533316462656536386166376532 Apr 12 19:01:56.181000 audit: BPF prog-id=82 op=UNLOAD Apr 12 19:01:56.182000 audit: BPF prog-id=81 op=UNLOAD Apr 12 19:01:56.182000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.182000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.182000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.182000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.182000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.182000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.182000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.182000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.182000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.182000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:01:56.182000 audit: BPF prog-id=83 op=LOAD Apr 12 19:01:56.182000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00028a468 items=0 ppid=1599 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:01:56.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338366666303462323639353064623533316462656536386166376532 Apr 12 19:01:56.206314 env[1131]: time="2024-04-12T19:01:56.205371303Z" level=info msg="StartContainer for \"c86ff04b26950db531dbee68af7e2fd1948a113978a83b382cf2eb86d7cc8b94\" returns successfully" Apr 12 19:01:56.222106 systemd[1]: cri-containerd-c86ff04b26950db531dbee68af7e2fd1948a113978a83b382cf2eb86d7cc8b94.scope: Deactivated successfully. Apr 12 19:01:56.224000 audit: BPF prog-id=83 op=UNLOAD Apr 12 19:01:56.333775 kubelet[1521]: E0412 19:01:56.333608 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:01:56.526921 kubelet[1521]: E0412 19:01:56.526846 1521 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7mwbm" podUID="f39ba5a1-f691-4b08-a934-e09b8435cf50" Apr 12 19:01:56.640357 env[1131]: time="2024-04-12T19:01:56.640284116Z" level=info msg="shim disconnected" id=c86ff04b26950db531dbee68af7e2fd1948a113978a83b382cf2eb86d7cc8b94 Apr 12 19:01:56.640357 env[1131]: time="2024-04-12T19:01:56.640358040Z" level=warning msg="cleaning up after shim disconnected" id=c86ff04b26950db531dbee68af7e2fd1948a113978a83b382cf2eb86d7cc8b94 namespace=k8s.io Apr 12 19:01:56.640679 env[1131]: time="2024-04-12T19:01:56.640373047Z" level=info msg="cleaning up dead shim" Apr 12 19:01:56.652652 env[1131]: time="2024-04-12T19:01:56.652574357Z" level=warning msg="cleanup warnings time=\"2024-04-12T19:01:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1915 runtime=io.containerd.runc.v2\n" Apr 12 19:01:57.082235 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c86ff04b26950db531dbee68af7e2fd1948a113978a83b382cf2eb86d7cc8b94-rootfs.mount: Deactivated successfully. Apr 12 19:01:57.334349 kubelet[1521]: E0412 19:01:57.334174 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:01:57.571290 env[1131]: time="2024-04-12T19:01:57.571210848Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 19:01:58.335203 kubelet[1521]: E0412 19:01:58.335126 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:01:58.359458 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3316357069.mount: Deactivated successfully. Apr 12 19:01:58.526617 kubelet[1521]: E0412 19:01:58.526553 1521 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7mwbm" podUID="f39ba5a1-f691-4b08-a934-e09b8435cf50" Apr 12 19:01:59.335597 kubelet[1521]: E0412 19:01:59.335531 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:00.336190 kubelet[1521]: E0412 19:02:00.336075 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:00.527662 kubelet[1521]: E0412 19:02:00.526936 1521 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7mwbm" podUID="f39ba5a1-f691-4b08-a934-e09b8435cf50" Apr 12 19:02:01.337003 kubelet[1521]: E0412 19:02:01.336928 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:01.808265 env[1131]: time="2024-04-12T19:02:01.808177714Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:01.812588 env[1131]: time="2024-04-12T19:02:01.812483769Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:01.815653 env[1131]: time="2024-04-12T19:02:01.815589269Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:01.819410 env[1131]: time="2024-04-12T19:02:01.819346077Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:01.820750 env[1131]: time="2024-04-12T19:02:01.820692657Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\"" Apr 12 19:02:01.824788 env[1131]: time="2024-04-12T19:02:01.824710865Z" level=info msg="CreateContainer within sandbox \"9b250ef1fcfdfb8bedd6f402f07240b06f01d31da4ebc3ac32a05b055cca909a\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 19:02:01.843017 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1869177419.mount: Deactivated successfully. Apr 12 19:02:01.848307 env[1131]: time="2024-04-12T19:02:01.848202993Z" level=info msg="CreateContainer within sandbox \"9b250ef1fcfdfb8bedd6f402f07240b06f01d31da4ebc3ac32a05b055cca909a\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"101eb4c6fcf58caf28fdcdd86a1d904eaacc96bc92cc6b406b686a2e8ec01281\"" Apr 12 19:02:01.849461 env[1131]: time="2024-04-12T19:02:01.849418473Z" level=info msg="StartContainer for \"101eb4c6fcf58caf28fdcdd86a1d904eaacc96bc92cc6b406b686a2e8ec01281\"" Apr 12 19:02:01.892733 systemd[1]: Started cri-containerd-101eb4c6fcf58caf28fdcdd86a1d904eaacc96bc92cc6b406b686a2e8ec01281.scope. Apr 12 19:02:01.922000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.950852 kernel: kauditd_printk_skb: 346 callbacks suppressed Apr 12 19:02:01.951118 kernel: audit: type=1400 audit(1712948521.922:717): avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.922000 audit[1936]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f242877f718 items=0 ppid=1599 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:02.015625 kernel: audit: type=1300 audit(1712948521.922:717): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f242877f718 items=0 ppid=1599 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:02.015840 kernel: audit: type=1327 audit(1712948521.922:717): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130316562346336666366353863616632386664636464383661316439 Apr 12 19:02:01.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130316562346336666366353863616632386664636464383661316439 Apr 12 19:02:01.922000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:02.037856 env[1131]: time="2024-04-12T19:02:02.037766587Z" level=info msg="StartContainer for \"101eb4c6fcf58caf28fdcdd86a1d904eaacc96bc92cc6b406b686a2e8ec01281\" returns successfully" Apr 12 19:02:02.038953 kernel: audit: type=1400 audit(1712948521.922:718): avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:02.039110 kernel: audit: type=1400 audit(1712948521.922:718): avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.922000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.922000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:02.080053 kernel: audit: type=1400 audit(1712948521.922:718): avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:02.080360 kernel: audit: type=1400 audit(1712948521.922:718): avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.922000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:02.101075 kernel: audit: type=1400 audit(1712948521.922:718): avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.922000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.922000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:02.143753 kernel: audit: type=1400 audit(1712948521.922:718): avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:02.143996 kernel: audit: type=1400 audit(1712948521.922:718): avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.922000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.922000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.922000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.922000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.922000 audit: BPF prog-id=84 op=LOAD Apr 12 19:02:01.922000 audit[1936]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00028a7b8 items=0 ppid=1599 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:01.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130316562346336666366353863616632386664636464383661316439 Apr 12 19:02:01.950000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.950000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.950000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.950000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.950000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.950000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.950000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.950000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.950000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.950000 audit: BPF prog-id=85 op=LOAD Apr 12 19:02:01.950000 audit[1936]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00028a808 items=0 ppid=1599 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:01.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130316562346336666366353863616632386664636464383661316439 Apr 12 19:02:01.950000 audit: BPF prog-id=85 op=UNLOAD Apr 12 19:02:01.950000 audit: BPF prog-id=84 op=UNLOAD Apr 12 19:02:01.950000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.950000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.950000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.950000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.950000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.950000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.950000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.950000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.950000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.950000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:01.950000 audit: BPF prog-id=86 op=LOAD Apr 12 19:02:01.950000 audit[1936]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00028a898 items=0 ppid=1599 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:01.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130316562346336666366353863616632386664636464383661316439 Apr 12 19:02:02.337976 kubelet[1521]: E0412 19:02:02.337453 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:02.526475 kubelet[1521]: E0412 19:02:02.526411 1521 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7mwbm" podUID="f39ba5a1-f691-4b08-a934-e09b8435cf50" Apr 12 19:02:02.744040 kubelet[1521]: I0412 19:02:02.744007 1521 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Apr 12 19:02:02.745595 systemd[1]: cri-containerd-101eb4c6fcf58caf28fdcdd86a1d904eaacc96bc92cc6b406b686a2e8ec01281.scope: Deactivated successfully. Apr 12 19:02:02.746000 audit: BPF prog-id=86 op=UNLOAD Apr 12 19:02:02.837804 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-101eb4c6fcf58caf28fdcdd86a1d904eaacc96bc92cc6b406b686a2e8ec01281-rootfs.mount: Deactivated successfully. Apr 12 19:02:02.960423 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Apr 12 19:02:02.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:02:02.983000 audit: BPF prog-id=66 op=UNLOAD Apr 12 19:02:02.983000 audit: BPF prog-id=65 op=UNLOAD Apr 12 19:02:02.983000 audit: BPF prog-id=64 op=UNLOAD Apr 12 19:02:03.338497 kubelet[1521]: E0412 19:02:03.338431 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:03.482589 env[1131]: time="2024-04-12T19:02:03.482518586Z" level=info msg="shim disconnected" id=101eb4c6fcf58caf28fdcdd86a1d904eaacc96bc92cc6b406b686a2e8ec01281 Apr 12 19:02:03.482589 env[1131]: time="2024-04-12T19:02:03.482586603Z" level=warning msg="cleaning up after shim disconnected" id=101eb4c6fcf58caf28fdcdd86a1d904eaacc96bc92cc6b406b686a2e8ec01281 namespace=k8s.io Apr 12 19:02:03.482589 env[1131]: time="2024-04-12T19:02:03.482601622Z" level=info msg="cleaning up dead shim" Apr 12 19:02:03.494478 env[1131]: time="2024-04-12T19:02:03.494409565Z" level=warning msg="cleanup warnings time=\"2024-04-12T19:02:03Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1976 runtime=io.containerd.runc.v2\n" Apr 12 19:02:03.588202 env[1131]: time="2024-04-12T19:02:03.588085336Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 19:02:03.682074 kubelet[1521]: I0412 19:02:03.682004 1521 topology_manager.go:215] "Topology Admit Handler" podUID="2a2a3421-e3ac-4670-9fae-7caab615ead6" podNamespace="default" podName="nginx-deployment-6d5f899847-hc7hg" Apr 12 19:02:03.696759 systemd[1]: Created slice kubepods-besteffort-pod2a2a3421_e3ac_4670_9fae_7caab615ead6.slice. Apr 12 19:02:03.863302 kubelet[1521]: I0412 19:02:03.863229 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w2m8k\" (UniqueName: \"kubernetes.io/projected/2a2a3421-e3ac-4670-9fae-7caab615ead6-kube-api-access-w2m8k\") pod \"nginx-deployment-6d5f899847-hc7hg\" (UID: \"2a2a3421-e3ac-4670-9fae-7caab615ead6\") " pod="default/nginx-deployment-6d5f899847-hc7hg" Apr 12 19:02:04.002930 env[1131]: time="2024-04-12T19:02:04.002760929Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-hc7hg,Uid:2a2a3421-e3ac-4670-9fae-7caab615ead6,Namespace:default,Attempt:0,}" Apr 12 19:02:04.095494 env[1131]: time="2024-04-12T19:02:04.095383553Z" level=error msg="Failed to destroy network for sandbox \"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:02:04.099146 env[1131]: time="2024-04-12T19:02:04.098484190Z" level=error msg="encountered an error cleaning up failed sandbox \"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:02:04.099146 env[1131]: time="2024-04-12T19:02:04.098574375Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-hc7hg,Uid:2a2a3421-e3ac-4670-9fae-7caab615ead6,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:02:04.099423 kubelet[1521]: E0412 19:02:04.098886 1521 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:02:04.099423 kubelet[1521]: E0412 19:02:04.098966 1521 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-hc7hg" Apr 12 19:02:04.099423 kubelet[1521]: E0412 19:02:04.098997 1521 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-hc7hg" Apr 12 19:02:04.097868 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a-shm.mount: Deactivated successfully. Apr 12 19:02:04.099885 kubelet[1521]: E0412 19:02:04.099084 1521 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-hc7hg_default(2a2a3421-e3ac-4670-9fae-7caab615ead6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-hc7hg_default(2a2a3421-e3ac-4670-9fae-7caab615ead6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-hc7hg" podUID="2a2a3421-e3ac-4670-9fae-7caab615ead6" Apr 12 19:02:04.339303 kubelet[1521]: E0412 19:02:04.339091 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:04.534524 systemd[1]: Created slice kubepods-besteffort-podf39ba5a1_f691_4b08_a934_e09b8435cf50.slice. Apr 12 19:02:04.540704 env[1131]: time="2024-04-12T19:02:04.540655202Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7mwbm,Uid:f39ba5a1-f691-4b08-a934-e09b8435cf50,Namespace:calico-system,Attempt:0,}" Apr 12 19:02:04.592820 kubelet[1521]: I0412 19:02:04.590887 1521 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Apr 12 19:02:04.593499 env[1131]: time="2024-04-12T19:02:04.593433787Z" level=info msg="StopPodSandbox for \"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\"" Apr 12 19:02:04.685163 env[1131]: time="2024-04-12T19:02:04.685051876Z" level=error msg="StopPodSandbox for \"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\" failed" error="failed to destroy network for sandbox \"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:02:04.685547 kubelet[1521]: E0412 19:02:04.685496 1521 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Apr 12 19:02:04.685677 kubelet[1521]: E0412 19:02:04.685636 1521 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a"} Apr 12 19:02:04.685743 kubelet[1521]: E0412 19:02:04.685700 1521 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2a2a3421-e3ac-4670-9fae-7caab615ead6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 19:02:04.685879 kubelet[1521]: E0412 19:02:04.685765 1521 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2a2a3421-e3ac-4670-9fae-7caab615ead6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-hc7hg" podUID="2a2a3421-e3ac-4670-9fae-7caab615ead6" Apr 12 19:02:04.761780 env[1131]: time="2024-04-12T19:02:04.761654434Z" level=error msg="Failed to destroy network for sandbox \"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:02:04.762750 env[1131]: time="2024-04-12T19:02:04.762611906Z" level=error msg="encountered an error cleaning up failed sandbox \"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:02:04.762990 env[1131]: time="2024-04-12T19:02:04.762778655Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7mwbm,Uid:f39ba5a1-f691-4b08-a934-e09b8435cf50,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:02:04.763202 kubelet[1521]: E0412 19:02:04.763113 1521 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:02:04.763341 kubelet[1521]: E0412 19:02:04.763208 1521 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7mwbm" Apr 12 19:02:04.763341 kubelet[1521]: E0412 19:02:04.763243 1521 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7mwbm" Apr 12 19:02:04.763478 kubelet[1521]: E0412 19:02:04.763415 1521 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-7mwbm_calico-system(f39ba5a1-f691-4b08-a934-e09b8435cf50)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-7mwbm_calico-system(f39ba5a1-f691-4b08-a934-e09b8435cf50)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7mwbm" podUID="f39ba5a1-f691-4b08-a934-e09b8435cf50" Apr 12 19:02:04.982989 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042-shm.mount: Deactivated successfully. Apr 12 19:02:05.339945 kubelet[1521]: E0412 19:02:05.339763 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:05.594298 kubelet[1521]: I0412 19:02:05.594116 1521 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Apr 12 19:02:05.595391 env[1131]: time="2024-04-12T19:02:05.595326085Z" level=info msg="StopPodSandbox for \"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\"" Apr 12 19:02:05.700254 env[1131]: time="2024-04-12T19:02:05.700149258Z" level=error msg="StopPodSandbox for \"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\" failed" error="failed to destroy network for sandbox \"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:02:05.700638 kubelet[1521]: E0412 19:02:05.700590 1521 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Apr 12 19:02:05.700767 kubelet[1521]: E0412 19:02:05.700682 1521 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042"} Apr 12 19:02:05.700767 kubelet[1521]: E0412 19:02:05.700747 1521 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f39ba5a1-f691-4b08-a934-e09b8435cf50\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 19:02:05.700966 kubelet[1521]: E0412 19:02:05.700798 1521 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f39ba5a1-f691-4b08-a934-e09b8435cf50\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7mwbm" podUID="f39ba5a1-f691-4b08-a934-e09b8435cf50" Apr 12 19:02:06.340217 kubelet[1521]: E0412 19:02:06.340098 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:07.340995 kubelet[1521]: E0412 19:02:07.340892 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:08.342133 kubelet[1521]: E0412 19:02:08.342054 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:09.326131 kubelet[1521]: E0412 19:02:09.326063 1521 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:09.342606 kubelet[1521]: E0412 19:02:09.342505 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:10.053902 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2207566730.mount: Deactivated successfully. Apr 12 19:02:10.122158 env[1131]: time="2024-04-12T19:02:10.122035340Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:10.125412 env[1131]: time="2024-04-12T19:02:10.125341989Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:10.128119 env[1131]: time="2024-04-12T19:02:10.128068697Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:10.130499 env[1131]: time="2024-04-12T19:02:10.130456963Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:10.131182 env[1131]: time="2024-04-12T19:02:10.131129655Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\"" Apr 12 19:02:10.156309 env[1131]: time="2024-04-12T19:02:10.156196929Z" level=info msg="CreateContainer within sandbox \"9b250ef1fcfdfb8bedd6f402f07240b06f01d31da4ebc3ac32a05b055cca909a\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 19:02:10.182037 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4197874721.mount: Deactivated successfully. Apr 12 19:02:10.192147 env[1131]: time="2024-04-12T19:02:10.192060147Z" level=info msg="CreateContainer within sandbox \"9b250ef1fcfdfb8bedd6f402f07240b06f01d31da4ebc3ac32a05b055cca909a\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"96242d2636863ea1a59aea845834da67406a555e776bff7b0c7a7ca959e89211\"" Apr 12 19:02:10.193298 env[1131]: time="2024-04-12T19:02:10.193211420Z" level=info msg="StartContainer for \"96242d2636863ea1a59aea845834da67406a555e776bff7b0c7a7ca959e89211\"" Apr 12 19:02:10.220779 systemd[1]: Started cri-containerd-96242d2636863ea1a59aea845834da67406a555e776bff7b0c7a7ca959e89211.scope. Apr 12 19:02:10.260000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.267705 kernel: kauditd_printk_skb: 38 callbacks suppressed Apr 12 19:02:10.267799 kernel: audit: type=1400 audit(1712948530.260:728): avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.260000 audit[2103]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f86cd8ffa08 items=0 ppid=1599 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:10.321743 kernel: audit: type=1300 audit(1712948530.260:728): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f86cd8ffa08 items=0 ppid=1599 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:10.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936323432643236333638363365613161353961656138343538333464 Apr 12 19:02:10.355239 kernel: audit: type=1327 audit(1712948530.260:728): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936323432643236333638363365613161353961656138343538333464 Apr 12 19:02:10.355555 kernel: audit: type=1400 audit(1712948530.260:729): avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.260000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.355796 kubelet[1521]: E0412 19:02:10.353531 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:10.363934 env[1131]: time="2024-04-12T19:02:10.363861153Z" level=info msg="StartContainer for \"96242d2636863ea1a59aea845834da67406a555e776bff7b0c7a7ca959e89211\" returns successfully" Apr 12 19:02:10.260000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.397100 kernel: audit: type=1400 audit(1712948530.260:729): avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.260000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.260000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.440080 kernel: audit: type=1400 audit(1712948530.260:729): avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.440356 kernel: audit: type=1400 audit(1712948530.260:729): avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.462622 kernel: audit: type=1400 audit(1712948530.260:729): avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.260000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.260000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.489514 kernel: audit: type=1400 audit(1712948530.260:729): avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.489743 kernel: audit: type=1400 audit(1712948530.260:729): avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.260000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.260000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.260000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.260000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.260000 audit: BPF prog-id=87 op=LOAD Apr 12 19:02:10.260000 audit[2103]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00039ab68 items=0 ppid=1599 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:10.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936323432643236333638363365613161353961656138343538333464 Apr 12 19:02:10.260000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.260000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.260000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.260000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.260000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.260000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.260000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.260000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.260000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.260000 audit: BPF prog-id=88 op=LOAD Apr 12 19:02:10.260000 audit[2103]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00039abb8 items=0 ppid=1599 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:10.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936323432643236333638363365613161353961656138343538333464 Apr 12 19:02:10.260000 audit: BPF prog-id=88 op=UNLOAD Apr 12 19:02:10.261000 audit: BPF prog-id=87 op=UNLOAD Apr 12 19:02:10.261000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.261000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.261000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.261000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.261000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.261000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.261000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.261000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.261000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.261000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:10.261000 audit: BPF prog-id=89 op=LOAD Apr 12 19:02:10.261000 audit[2103]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00039ac48 items=0 ppid=1599 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:10.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936323432643236333638363365613161353961656138343538333464 Apr 12 19:02:10.563553 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 19:02:10.563785 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 19:02:10.636186 kubelet[1521]: I0412 19:02:10.636109 1521 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-wr5zv" podStartSLOduration=4.086034081 podStartE2EDuration="21.636044395s" podCreationTimestamp="2024-04-12 19:01:49 +0000 UTC" firstStartedPulling="2024-04-12 19:01:52.581598939 +0000 UTC m=+3.806055592" lastFinishedPulling="2024-04-12 19:02:10.131609241 +0000 UTC m=+21.356065906" observedRunningTime="2024-04-12 19:02:10.635818976 +0000 UTC m=+21.860275648" watchObservedRunningTime="2024-04-12 19:02:10.636044395 +0000 UTC m=+21.860501057" Apr 12 19:02:11.354812 kubelet[1521]: E0412 19:02:11.354724 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:11.612413 kubelet[1521]: I0412 19:02:11.612203 1521 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 19:02:11.937000 audit[2200]: AVC avc: denied { write } for pid=2200 comm="tee" name="fd" dev="proc" ino=19718 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:02:11.937000 audit[2200]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc754cd960 a2=241 a3=1b6 items=1 ppid=2177 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:11.937000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 19:02:11.937000 audit: PATH item=0 name="/dev/fd/63" inode=19704 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:02:11.937000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:02:11.944000 audit[2219]: AVC avc: denied { write } for pid=2219 comm="tee" name="fd" dev="proc" ino=19725 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:02:11.944000 audit[2219]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe0687960 a2=241 a3=1b6 items=1 ppid=2172 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:11.944000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 19:02:11.944000 audit: PATH item=0 name="/dev/fd/63" inode=19711 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:02:11.944000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:02:11.954000 audit[2226]: AVC avc: denied { write } for pid=2226 comm="tee" name="fd" dev="proc" ino=19731 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:02:11.954000 audit[2226]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc3fbdb950 a2=241 a3=1b6 items=1 ppid=2167 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:11.954000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 19:02:11.954000 audit: PATH item=0 name="/dev/fd/63" inode=19717 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:02:11.954000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:02:11.960000 audit[2210]: AVC avc: denied { write } for pid=2210 comm="tee" name="fd" dev="proc" ino=19017 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:02:11.961000 audit[2231]: AVC avc: denied { write } for pid=2231 comm="tee" name="fd" dev="proc" ino=19020 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:02:11.960000 audit[2210]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe4688960 a2=241 a3=1b6 items=1 ppid=2179 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:11.960000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 19:02:11.960000 audit: PATH item=0 name="/dev/fd/63" inode=19000 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:02:11.960000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:02:11.961000 audit[2231]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff028d6962 a2=241 a3=1b6 items=1 ppid=2168 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:11.961000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 19:02:11.966000 audit[2221]: AVC avc: denied { write } for pid=2221 comm="tee" name="fd" dev="proc" ino=19737 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:02:11.966000 audit[2221]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff93bc8951 a2=241 a3=1b6 items=1 ppid=2171 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:11.966000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 19:02:11.966000 audit: PATH item=0 name="/dev/fd/63" inode=19714 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:02:11.966000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:02:11.961000 audit: PATH item=0 name="/dev/fd/63" inode=19009 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:02:11.961000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:02:11.977000 audit[2242]: AVC avc: denied { write } for pid=2242 comm="tee" name="fd" dev="proc" ino=19741 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:02:11.977000 audit[2242]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff30b24961 a2=241 a3=1b6 items=1 ppid=2182 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:11.977000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 19:02:11.977000 audit: PATH item=0 name="/dev/fd/63" inode=19736 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:02:11.977000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:02:12.328991 kernel: Initializing XFRM netlink socket Apr 12 19:02:12.355934 kubelet[1521]: E0412 19:02:12.355861 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:12.530000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.530000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.530000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.530000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.530000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.530000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.530000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.530000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.530000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.530000 audit: BPF prog-id=90 op=LOAD Apr 12 19:02:12.530000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffefd1de020 a2=70 a3=7f4ae1111000 items=0 ppid=2173 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:12.530000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:02:12.531000 audit: BPF prog-id=90 op=UNLOAD Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit: BPF prog-id=91 op=LOAD Apr 12 19:02:12.531000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffefd1de020 a2=70 a3=6f items=0 ppid=2173 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:12.531000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:02:12.531000 audit: BPF prog-id=91 op=UNLOAD Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffefd1ddfd0 a2=70 a3=7ffefd1de020 items=0 ppid=2173 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:12.531000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit: BPF prog-id=92 op=LOAD Apr 12 19:02:12.531000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffefd1ddfb0 a2=70 a3=7ffefd1de020 items=0 ppid=2173 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:12.531000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:02:12.531000 audit: BPF prog-id=92 op=UNLOAD Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffefd1de090 a2=70 a3=0 items=0 ppid=2173 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:12.531000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffefd1de080 a2=70 a3=0 items=0 ppid=2173 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:12.531000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:02:12.531000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.531000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffefd1ddff0 a2=70 a3=0 items=0 ppid=2173 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:12.531000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:02:12.532000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.532000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffefd1de0c0 a2=70 a3=1676e10 items=0 ppid=2173 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:12.532000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:02:12.532000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.532000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffefd1de0c0 a2=70 a3=1673880 items=0 ppid=2173 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:12.532000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:02:12.532000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.532000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.532000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.532000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.532000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.532000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.532000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.532000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.532000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.532000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.532000 audit: BPF prog-id=93 op=LOAD Apr 12 19:02:12.532000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffefd1ddfe0 a2=70 a3=0 items=0 ppid=2173 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:12.532000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:02:12.561000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.561000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffa4ae7950 a2=70 a3=fff80800 items=0 ppid=2173 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:12.561000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 19:02:12.561000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:12.561000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffa4ae7820 a2=70 a3=3 items=0 ppid=2173 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:12.561000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 19:02:12.573000 audit: BPF prog-id=93 op=UNLOAD Apr 12 19:02:12.665000 audit[2334]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:02:12.665000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffea6d59c70 a2=0 a3=7ffea6d59c5c items=0 ppid=2173 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:12.665000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:02:12.676000 audit[2332]: NETFILTER_CFG table=raw:66 family=2 entries=19 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:02:12.676000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffc05fcbb30 a2=0 a3=7ffc05fcbb1c items=0 ppid=2173 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:12.676000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:02:12.684000 audit[2333]: NETFILTER_CFG table=nat:67 family=2 entries=15 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:02:12.684000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd4345f110 a2=0 a3=7ffd4345f0fc items=0 ppid=2173 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:12.684000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:02:12.686000 audit[2336]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:02:12.686000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffdd281d910 a2=0 a3=7ffdd281d8fc items=0 ppid=2173 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:12.686000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:02:13.348319 systemd-networkd[1016]: vxlan.calico: Link UP Apr 12 19:02:13.348338 systemd-networkd[1016]: vxlan.calico: Gained carrier Apr 12 19:02:13.357507 kubelet[1521]: E0412 19:02:13.357406 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:14.295037 kubelet[1521]: I0412 19:02:14.293607 1521 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 19:02:14.358576 kubelet[1521]: E0412 19:02:14.358382 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:15.153920 systemd-networkd[1016]: vxlan.calico: Gained IPv6LL Apr 12 19:02:15.359024 kubelet[1521]: E0412 19:02:15.358953 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:16.359967 kubelet[1521]: E0412 19:02:16.359892 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:16.527326 env[1131]: time="2024-04-12T19:02:16.527223159Z" level=info msg="StopPodSandbox for \"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\"" Apr 12 19:02:16.636442 env[1131]: 2024-04-12 19:02:16.586 [INFO][2407] k8s.go 585: Cleaning up netns ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Apr 12 19:02:16.636442 env[1131]: 2024-04-12 19:02:16.587 [INFO][2407] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" iface="eth0" netns="/var/run/netns/cni-ab4ade43-9720-4957-92f6-8da41c66fc3f" Apr 12 19:02:16.636442 env[1131]: 2024-04-12 19:02:16.587 [INFO][2407] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" iface="eth0" netns="/var/run/netns/cni-ab4ade43-9720-4957-92f6-8da41c66fc3f" Apr 12 19:02:16.636442 env[1131]: 2024-04-12 19:02:16.588 [INFO][2407] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" iface="eth0" netns="/var/run/netns/cni-ab4ade43-9720-4957-92f6-8da41c66fc3f" Apr 12 19:02:16.636442 env[1131]: 2024-04-12 19:02:16.588 [INFO][2407] k8s.go 592: Releasing IP address(es) ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Apr 12 19:02:16.636442 env[1131]: 2024-04-12 19:02:16.588 [INFO][2407] utils.go 188: Calico CNI releasing IP address ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Apr 12 19:02:16.636442 env[1131]: 2024-04-12 19:02:16.620 [INFO][2413] ipam_plugin.go 415: Releasing address using handleID ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" HandleID="k8s-pod-network.1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Workload="10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0" Apr 12 19:02:16.636442 env[1131]: 2024-04-12 19:02:16.621 [INFO][2413] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:02:16.636442 env[1131]: 2024-04-12 19:02:16.621 [INFO][2413] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:02:16.636442 env[1131]: 2024-04-12 19:02:16.630 [WARNING][2413] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" HandleID="k8s-pod-network.1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Workload="10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0" Apr 12 19:02:16.636442 env[1131]: 2024-04-12 19:02:16.630 [INFO][2413] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" HandleID="k8s-pod-network.1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Workload="10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0" Apr 12 19:02:16.636442 env[1131]: 2024-04-12 19:02:16.633 [INFO][2413] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:02:16.636442 env[1131]: 2024-04-12 19:02:16.634 [INFO][2407] k8s.go 598: Teardown processing complete. ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Apr 12 19:02:16.641004 env[1131]: time="2024-04-12T19:02:16.639422159Z" level=info msg="TearDown network for sandbox \"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\" successfully" Apr 12 19:02:16.641004 env[1131]: time="2024-04-12T19:02:16.639488466Z" level=info msg="StopPodSandbox for \"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\" returns successfully" Apr 12 19:02:16.639966 systemd[1]: run-netns-cni\x2dab4ade43\x2d9720\x2d4957\x2d92f6\x2d8da41c66fc3f.mount: Deactivated successfully. Apr 12 19:02:16.642225 env[1131]: time="2024-04-12T19:02:16.642176902Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-hc7hg,Uid:2a2a3421-e3ac-4670-9fae-7caab615ead6,Namespace:default,Attempt:1,}" Apr 12 19:02:16.817836 systemd-networkd[1016]: calieff4b84e7fd: Link UP Apr 12 19:02:16.825339 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 19:02:16.834351 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calieff4b84e7fd: link becomes ready Apr 12 19:02:16.834781 systemd-networkd[1016]: calieff4b84e7fd: Gained carrier Apr 12 19:02:16.844939 env[1131]: 2024-04-12 19:02:16.717 [INFO][2420] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0 nginx-deployment-6d5f899847- default 2a2a3421-e3ac-4670-9fae-7caab615ead6 1011 0 2024-04-12 19:02:03 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.26 nginx-deployment-6d5f899847-hc7hg eth0 default [] [] [kns.default ksa.default.default] calieff4b84e7fd [] []}} ContainerID="bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673" Namespace="default" Pod="nginx-deployment-6d5f899847-hc7hg" WorkloadEndpoint="10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-" Apr 12 19:02:16.844939 env[1131]: 2024-04-12 19:02:16.718 [INFO][2420] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673" Namespace="default" Pod="nginx-deployment-6d5f899847-hc7hg" WorkloadEndpoint="10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0" Apr 12 19:02:16.844939 env[1131]: 2024-04-12 19:02:16.757 [INFO][2431] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673" HandleID="k8s-pod-network.bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673" Workload="10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0" Apr 12 19:02:16.844939 env[1131]: 2024-04-12 19:02:16.770 [INFO][2431] ipam_plugin.go 268: Auto assigning IP ContainerID="bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673" HandleID="k8s-pod-network.bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673" Workload="10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000281d60), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.26", "pod":"nginx-deployment-6d5f899847-hc7hg", "timestamp":"2024-04-12 19:02:16.757607983 +0000 UTC"}, Hostname:"10.128.0.26", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:02:16.844939 env[1131]: 2024-04-12 19:02:16.770 [INFO][2431] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:02:16.844939 env[1131]: 2024-04-12 19:02:16.770 [INFO][2431] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:02:16.844939 env[1131]: 2024-04-12 19:02:16.770 [INFO][2431] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.26' Apr 12 19:02:16.844939 env[1131]: 2024-04-12 19:02:16.772 [INFO][2431] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673" host="10.128.0.26" Apr 12 19:02:16.844939 env[1131]: 2024-04-12 19:02:16.779 [INFO][2431] ipam.go 372: Looking up existing affinities for host host="10.128.0.26" Apr 12 19:02:16.844939 env[1131]: 2024-04-12 19:02:16.784 [INFO][2431] ipam.go 489: Trying affinity for 192.168.27.192/26 host="10.128.0.26" Apr 12 19:02:16.844939 env[1131]: 2024-04-12 19:02:16.787 [INFO][2431] ipam.go 155: Attempting to load block cidr=192.168.27.192/26 host="10.128.0.26" Apr 12 19:02:16.844939 env[1131]: 2024-04-12 19:02:16.791 [INFO][2431] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.27.192/26 host="10.128.0.26" Apr 12 19:02:16.844939 env[1131]: 2024-04-12 19:02:16.791 [INFO][2431] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.27.192/26 handle="k8s-pod-network.bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673" host="10.128.0.26" Apr 12 19:02:16.844939 env[1131]: 2024-04-12 19:02:16.793 [INFO][2431] ipam.go 1682: Creating new handle: k8s-pod-network.bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673 Apr 12 19:02:16.844939 env[1131]: 2024-04-12 19:02:16.798 [INFO][2431] ipam.go 1203: Writing block in order to claim IPs block=192.168.27.192/26 handle="k8s-pod-network.bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673" host="10.128.0.26" Apr 12 19:02:16.844939 env[1131]: 2024-04-12 19:02:16.809 [INFO][2431] ipam.go 1216: Successfully claimed IPs: [192.168.27.193/26] block=192.168.27.192/26 handle="k8s-pod-network.bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673" host="10.128.0.26" Apr 12 19:02:16.844939 env[1131]: 2024-04-12 19:02:16.809 [INFO][2431] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.27.193/26] handle="k8s-pod-network.bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673" host="10.128.0.26" Apr 12 19:02:16.844939 env[1131]: 2024-04-12 19:02:16.809 [INFO][2431] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:02:16.844939 env[1131]: 2024-04-12 19:02:16.809 [INFO][2431] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.27.193/26] IPv6=[] ContainerID="bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673" HandleID="k8s-pod-network.bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673" Workload="10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0" Apr 12 19:02:16.854003 env[1131]: 2024-04-12 19:02:16.813 [INFO][2420] k8s.go 385: Populated endpoint ContainerID="bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673" Namespace="default" Pod="nginx-deployment-6d5f899847-hc7hg" WorkloadEndpoint="10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"2a2a3421-e3ac-4670-9fae-7caab615ead6", ResourceVersion:"1011", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 2, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.26", ContainerID:"", Pod:"nginx-deployment-6d5f899847-hc7hg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calieff4b84e7fd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:02:16.854003 env[1131]: 2024-04-12 19:02:16.813 [INFO][2420] k8s.go 386: Calico CNI using IPs: [192.168.27.193/32] ContainerID="bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673" Namespace="default" Pod="nginx-deployment-6d5f899847-hc7hg" WorkloadEndpoint="10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0" Apr 12 19:02:16.854003 env[1131]: 2024-04-12 19:02:16.813 [INFO][2420] dataplane_linux.go 68: Setting the host side veth name to calieff4b84e7fd ContainerID="bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673" Namespace="default" Pod="nginx-deployment-6d5f899847-hc7hg" WorkloadEndpoint="10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0" Apr 12 19:02:16.854003 env[1131]: 2024-04-12 19:02:16.835 [INFO][2420] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673" Namespace="default" Pod="nginx-deployment-6d5f899847-hc7hg" WorkloadEndpoint="10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0" Apr 12 19:02:16.854003 env[1131]: 2024-04-12 19:02:16.835 [INFO][2420] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673" Namespace="default" Pod="nginx-deployment-6d5f899847-hc7hg" WorkloadEndpoint="10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"2a2a3421-e3ac-4670-9fae-7caab615ead6", ResourceVersion:"1011", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 2, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.26", ContainerID:"bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673", Pod:"nginx-deployment-6d5f899847-hc7hg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calieff4b84e7fd", MAC:"ce:d8:b8:e9:af:36", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:02:16.854003 env[1131]: 2024-04-12 19:02:16.842 [INFO][2420] k8s.go 498: Wrote updated endpoint to datastore ContainerID="bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673" Namespace="default" Pod="nginx-deployment-6d5f899847-hc7hg" WorkloadEndpoint="10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0" Apr 12 19:02:16.907316 env[1131]: time="2024-04-12T19:02:16.904082986Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:02:16.918800 kernel: kauditd_printk_skb: 157 callbacks suppressed Apr 12 19:02:16.918872 kernel: audit: type=1325 audit(1712948536.905:761): table=filter:69 family=2 entries=36 op=nft_register_chain pid=2466 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:02:16.905000 audit[2466]: NETFILTER_CFG table=filter:69 family=2 entries=36 op=nft_register_chain pid=2466 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:02:16.919111 env[1131]: time="2024-04-12T19:02:16.910359308Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:02:16.919111 env[1131]: time="2024-04-12T19:02:16.910402869Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:02:16.927614 env[1131]: time="2024-04-12T19:02:16.927480157Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673 pid=2462 runtime=io.containerd.runc.v2 Apr 12 19:02:16.905000 audit[2466]: SYSCALL arch=c000003e syscall=46 success=yes exit=20372 a0=3 a1=7ffcc75e4450 a2=0 a3=7ffcc75e443c items=0 ppid=2173 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:16.959485 systemd[1]: Started cri-containerd-bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673.scope. Apr 12 19:02:16.976304 kernel: audit: type=1300 audit(1712948536.905:761): arch=c000003e syscall=46 success=yes exit=20372 a0=3 a1=7ffcc75e4450 a2=0 a3=7ffcc75e443c items=0 ppid=2173 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:16.905000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:02:16.998375 kernel: audit: type=1327 audit(1712948536.905:761): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:02:17.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.032319 kernel: audit: type=1400 audit(1712948537.005:762): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.032503 kernel: audit: type=1400 audit(1712948537.005:763): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.073898 kernel: audit: type=1400 audit(1712948537.005:764): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.096526 kernel: audit: type=1400 audit(1712948537.005:765): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.118944 kernel: audit: type=1400 audit(1712948537.005:766): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.119160 kernel: audit: type=1400 audit(1712948537.005:767): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.139840 kernel: audit: type=1400 audit(1712948537.005:768): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.027000 audit: BPF prog-id=94 op=LOAD Apr 12 19:02:17.037000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.037000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2462 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:17.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264643261306232366564663366356234316137386437353134383966 Apr 12 19:02:17.037000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.037000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2462 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:17.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264643261306232366564663366356234316137386437353134383966 Apr 12 19:02:17.037000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.037000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.037000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.037000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.037000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.037000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.037000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.037000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.037000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.037000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.037000 audit: BPF prog-id=95 op=LOAD Apr 12 19:02:17.037000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000217040 items=0 ppid=2462 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:17.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264643261306232366564663366356234316137386437353134383966 Apr 12 19:02:17.050000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.050000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.050000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.050000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.050000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.050000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.050000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.050000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.050000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.050000 audit: BPF prog-id=96 op=LOAD Apr 12 19:02:17.050000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000217088 items=0 ppid=2462 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:17.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264643261306232366564663366356234316137386437353134383966 Apr 12 19:02:17.073000 audit: BPF prog-id=96 op=UNLOAD Apr 12 19:02:17.073000 audit: BPF prog-id=95 op=UNLOAD Apr 12 19:02:17.073000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.073000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.073000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.073000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.073000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.073000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.073000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.073000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.073000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.073000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:17.073000 audit: BPF prog-id=97 op=LOAD Apr 12 19:02:17.073000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000217498 items=0 ppid=2462 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:17.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264643261306232366564663366356234316137386437353134383966 Apr 12 19:02:17.210642 env[1131]: time="2024-04-12T19:02:17.210561701Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-hc7hg,Uid:2a2a3421-e3ac-4670-9fae-7caab615ead6,Namespace:default,Attempt:1,} returns sandbox id \"bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673\"" Apr 12 19:02:17.213828 env[1131]: time="2024-04-12T19:02:17.213763563Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 19:02:17.360463 kubelet[1521]: E0412 19:02:17.360393 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:17.581000 audit[2496]: NETFILTER_CFG table=filter:70 family=2 entries=9 op=nft_register_rule pid=2496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:17.581000 audit[2496]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff87bf5830 a2=0 a3=7fff87bf581c items=0 ppid=1691 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:17.581000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:17.582000 audit[2496]: NETFILTER_CFG table=nat:71 family=2 entries=27 op=nft_register_chain pid=2496 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:17.582000 audit[2496]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff87bf5830 a2=0 a3=7fff87bf581c items=0 ppid=1691 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:17.582000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:17.630000 audit[2498]: NETFILTER_CFG table=filter:72 family=2 entries=8 op=nft_register_rule pid=2498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:17.630000 audit[2498]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc3e93c950 a2=0 a3=7ffc3e93c93c items=0 ppid=1691 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:17.630000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:17.632000 audit[2498]: NETFILTER_CFG table=nat:73 family=2 entries=34 op=nft_register_chain pid=2498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:17.632000 audit[2498]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc3e93c950 a2=0 a3=7ffc3e93c93c items=0 ppid=1691 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:17.632000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:17.666096 update_engine[1123]: I0412 19:02:17.665402 1123 update_attempter.cc:509] Updating boot flags... Apr 12 19:02:17.969784 systemd-networkd[1016]: calieff4b84e7fd: Gained IPv6LL Apr 12 19:02:18.360908 kubelet[1521]: E0412 19:02:18.360804 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:18.531378 env[1131]: time="2024-04-12T19:02:18.531311262Z" level=info msg="StopPodSandbox for \"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\"" Apr 12 19:02:18.740088 env[1131]: 2024-04-12 19:02:18.668 [INFO][2532] k8s.go 585: Cleaning up netns ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Apr 12 19:02:18.740088 env[1131]: 2024-04-12 19:02:18.668 [INFO][2532] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" iface="eth0" netns="/var/run/netns/cni-d83d4005-ac27-b90e-d92e-ad1b34e10656" Apr 12 19:02:18.740088 env[1131]: 2024-04-12 19:02:18.669 [INFO][2532] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" iface="eth0" netns="/var/run/netns/cni-d83d4005-ac27-b90e-d92e-ad1b34e10656" Apr 12 19:02:18.740088 env[1131]: 2024-04-12 19:02:18.669 [INFO][2532] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" iface="eth0" netns="/var/run/netns/cni-d83d4005-ac27-b90e-d92e-ad1b34e10656" Apr 12 19:02:18.740088 env[1131]: 2024-04-12 19:02:18.669 [INFO][2532] k8s.go 592: Releasing IP address(es) ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Apr 12 19:02:18.740088 env[1131]: 2024-04-12 19:02:18.670 [INFO][2532] utils.go 188: Calico CNI releasing IP address ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Apr 12 19:02:18.740088 env[1131]: 2024-04-12 19:02:18.719 [INFO][2539] ipam_plugin.go 415: Releasing address using handleID ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" HandleID="k8s-pod-network.448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Workload="10.128.0.26-k8s-csi--node--driver--7mwbm-eth0" Apr 12 19:02:18.740088 env[1131]: 2024-04-12 19:02:18.720 [INFO][2539] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:02:18.740088 env[1131]: 2024-04-12 19:02:18.720 [INFO][2539] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:02:18.740088 env[1131]: 2024-04-12 19:02:18.729 [WARNING][2539] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" HandleID="k8s-pod-network.448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Workload="10.128.0.26-k8s-csi--node--driver--7mwbm-eth0" Apr 12 19:02:18.740088 env[1131]: 2024-04-12 19:02:18.729 [INFO][2539] ipam_plugin.go 443: Releasing address using workloadID ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" HandleID="k8s-pod-network.448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Workload="10.128.0.26-k8s-csi--node--driver--7mwbm-eth0" Apr 12 19:02:18.740088 env[1131]: 2024-04-12 19:02:18.732 [INFO][2539] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:02:18.740088 env[1131]: 2024-04-12 19:02:18.734 [INFO][2532] k8s.go 598: Teardown processing complete. ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Apr 12 19:02:18.739825 systemd[1]: run-netns-cni\x2dd83d4005\x2dac27\x2db90e\x2dd92e\x2dad1b34e10656.mount: Deactivated successfully. Apr 12 19:02:18.741978 env[1131]: time="2024-04-12T19:02:18.740777105Z" level=info msg="TearDown network for sandbox \"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\" successfully" Apr 12 19:02:18.741978 env[1131]: time="2024-04-12T19:02:18.740850763Z" level=info msg="StopPodSandbox for \"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\" returns successfully" Apr 12 19:02:18.742341 env[1131]: time="2024-04-12T19:02:18.742257503Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7mwbm,Uid:f39ba5a1-f691-4b08-a934-e09b8435cf50,Namespace:calico-system,Attempt:1,}" Apr 12 19:02:18.959655 systemd-networkd[1016]: calie365d5aef47: Link UP Apr 12 19:02:18.967490 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 19:02:18.967670 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie365d5aef47: link becomes ready Apr 12 19:02:18.977562 systemd-networkd[1016]: calie365d5aef47: Gained carrier Apr 12 19:02:19.001363 env[1131]: 2024-04-12 19:02:18.836 [INFO][2545] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.26-k8s-csi--node--driver--7mwbm-eth0 csi-node-driver- calico-system f39ba5a1-f691-4b08-a934-e09b8435cf50 1034 0 2024-04-12 19:01:49 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.26 csi-node-driver-7mwbm eth0 default [] [] [kns.calico-system ksa.calico-system.default] calie365d5aef47 [] []}} ContainerID="64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338" Namespace="calico-system" Pod="csi-node-driver-7mwbm" WorkloadEndpoint="10.128.0.26-k8s-csi--node--driver--7mwbm-" Apr 12 19:02:19.001363 env[1131]: 2024-04-12 19:02:18.836 [INFO][2545] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338" Namespace="calico-system" Pod="csi-node-driver-7mwbm" WorkloadEndpoint="10.128.0.26-k8s-csi--node--driver--7mwbm-eth0" Apr 12 19:02:19.001363 env[1131]: 2024-04-12 19:02:18.898 [INFO][2560] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338" HandleID="k8s-pod-network.64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338" Workload="10.128.0.26-k8s-csi--node--driver--7mwbm-eth0" Apr 12 19:02:19.001363 env[1131]: 2024-04-12 19:02:18.911 [INFO][2560] ipam_plugin.go 268: Auto assigning IP ContainerID="64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338" HandleID="k8s-pod-network.64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338" Workload="10.128.0.26-k8s-csi--node--driver--7mwbm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005af5c0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.128.0.26", "pod":"csi-node-driver-7mwbm", "timestamp":"2024-04-12 19:02:18.898596511 +0000 UTC"}, Hostname:"10.128.0.26", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:02:19.001363 env[1131]: 2024-04-12 19:02:18.911 [INFO][2560] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:02:19.001363 env[1131]: 2024-04-12 19:02:18.912 [INFO][2560] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:02:19.001363 env[1131]: 2024-04-12 19:02:18.912 [INFO][2560] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.26' Apr 12 19:02:19.001363 env[1131]: 2024-04-12 19:02:18.914 [INFO][2560] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338" host="10.128.0.26" Apr 12 19:02:19.001363 env[1131]: 2024-04-12 19:02:18.919 [INFO][2560] ipam.go 372: Looking up existing affinities for host host="10.128.0.26" Apr 12 19:02:19.001363 env[1131]: 2024-04-12 19:02:18.924 [INFO][2560] ipam.go 489: Trying affinity for 192.168.27.192/26 host="10.128.0.26" Apr 12 19:02:19.001363 env[1131]: 2024-04-12 19:02:18.926 [INFO][2560] ipam.go 155: Attempting to load block cidr=192.168.27.192/26 host="10.128.0.26" Apr 12 19:02:19.001363 env[1131]: 2024-04-12 19:02:18.929 [INFO][2560] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.27.192/26 host="10.128.0.26" Apr 12 19:02:19.001363 env[1131]: 2024-04-12 19:02:18.929 [INFO][2560] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.27.192/26 handle="k8s-pod-network.64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338" host="10.128.0.26" Apr 12 19:02:19.001363 env[1131]: 2024-04-12 19:02:18.932 [INFO][2560] ipam.go 1682: Creating new handle: k8s-pod-network.64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338 Apr 12 19:02:19.001363 env[1131]: 2024-04-12 19:02:18.936 [INFO][2560] ipam.go 1203: Writing block in order to claim IPs block=192.168.27.192/26 handle="k8s-pod-network.64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338" host="10.128.0.26" Apr 12 19:02:19.001363 env[1131]: 2024-04-12 19:02:18.944 [INFO][2560] ipam.go 1216: Successfully claimed IPs: [192.168.27.194/26] block=192.168.27.192/26 handle="k8s-pod-network.64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338" host="10.128.0.26" Apr 12 19:02:19.001363 env[1131]: 2024-04-12 19:02:18.944 [INFO][2560] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.27.194/26] handle="k8s-pod-network.64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338" host="10.128.0.26" Apr 12 19:02:19.001363 env[1131]: 2024-04-12 19:02:18.944 [INFO][2560] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:02:19.001363 env[1131]: 2024-04-12 19:02:18.944 [INFO][2560] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.27.194/26] IPv6=[] ContainerID="64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338" HandleID="k8s-pod-network.64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338" Workload="10.128.0.26-k8s-csi--node--driver--7mwbm-eth0" Apr 12 19:02:19.002790 env[1131]: 2024-04-12 19:02:18.947 [INFO][2545] k8s.go 385: Populated endpoint ContainerID="64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338" Namespace="calico-system" Pod="csi-node-driver-7mwbm" WorkloadEndpoint="10.128.0.26-k8s-csi--node--driver--7mwbm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.26-k8s-csi--node--driver--7mwbm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f39ba5a1-f691-4b08-a934-e09b8435cf50", ResourceVersion:"1034", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.26", ContainerID:"", Pod:"csi-node-driver-7mwbm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie365d5aef47", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:02:19.002790 env[1131]: 2024-04-12 19:02:18.947 [INFO][2545] k8s.go 386: Calico CNI using IPs: [192.168.27.194/32] ContainerID="64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338" Namespace="calico-system" Pod="csi-node-driver-7mwbm" WorkloadEndpoint="10.128.0.26-k8s-csi--node--driver--7mwbm-eth0" Apr 12 19:02:19.002790 env[1131]: 2024-04-12 19:02:18.947 [INFO][2545] dataplane_linux.go 68: Setting the host side veth name to calie365d5aef47 ContainerID="64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338" Namespace="calico-system" Pod="csi-node-driver-7mwbm" WorkloadEndpoint="10.128.0.26-k8s-csi--node--driver--7mwbm-eth0" Apr 12 19:02:19.002790 env[1131]: 2024-04-12 19:02:18.980 [INFO][2545] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338" Namespace="calico-system" Pod="csi-node-driver-7mwbm" WorkloadEndpoint="10.128.0.26-k8s-csi--node--driver--7mwbm-eth0" Apr 12 19:02:19.002790 env[1131]: 2024-04-12 19:02:18.980 [INFO][2545] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338" Namespace="calico-system" Pod="csi-node-driver-7mwbm" WorkloadEndpoint="10.128.0.26-k8s-csi--node--driver--7mwbm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.26-k8s-csi--node--driver--7mwbm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f39ba5a1-f691-4b08-a934-e09b8435cf50", ResourceVersion:"1034", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.26", ContainerID:"64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338", Pod:"csi-node-driver-7mwbm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie365d5aef47", MAC:"ee:d2:08:ab:6e:17", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:02:19.002790 env[1131]: 2024-04-12 19:02:18.991 [INFO][2545] k8s.go 498: Wrote updated endpoint to datastore ContainerID="64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338" Namespace="calico-system" Pod="csi-node-driver-7mwbm" WorkloadEndpoint="10.128.0.26-k8s-csi--node--driver--7mwbm-eth0" Apr 12 19:02:19.040000 audit[2585]: NETFILTER_CFG table=filter:74 family=2 entries=40 op=nft_register_chain pid=2585 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:02:19.040000 audit[2585]: SYSCALL arch=c000003e syscall=46 success=yes exit=21592 a0=3 a1=7ffce1993650 a2=0 a3=7ffce199363c items=0 ppid=2173 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:19.040000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:02:19.077747 env[1131]: time="2024-04-12T19:02:19.077635284Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:02:19.078036 env[1131]: time="2024-04-12T19:02:19.077768829Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:02:19.078036 env[1131]: time="2024-04-12T19:02:19.077807070Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:02:19.078178 env[1131]: time="2024-04-12T19:02:19.078049453Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338 pid=2589 runtime=io.containerd.runc.v2 Apr 12 19:02:19.109816 systemd[1]: Started cri-containerd-64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338.scope. Apr 12 19:02:19.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.139000 audit: BPF prog-id=98 op=LOAD Apr 12 19:02:19.140000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.140000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2589 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:19.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634383233643538646431353130326462356538366564363830386262 Apr 12 19:02:19.140000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.140000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2589 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:19.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634383233643538646431353130326462356538366564363830386262 Apr 12 19:02:19.140000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.140000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.140000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.140000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.140000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.140000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.140000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.140000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.140000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.140000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.140000 audit: BPF prog-id=99 op=LOAD Apr 12 19:02:19.140000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000345cd0 items=0 ppid=2589 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:19.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634383233643538646431353130326462356538366564363830386262 Apr 12 19:02:19.140000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.140000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.140000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.140000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.140000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.140000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.140000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.140000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.140000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.140000 audit: BPF prog-id=100 op=LOAD Apr 12 19:02:19.140000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000345d18 items=0 ppid=2589 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:19.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634383233643538646431353130326462356538366564363830386262 Apr 12 19:02:19.140000 audit: BPF prog-id=100 op=UNLOAD Apr 12 19:02:19.141000 audit: BPF prog-id=99 op=UNLOAD Apr 12 19:02:19.141000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.141000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.141000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.141000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.141000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.141000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.141000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.141000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.141000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.141000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:19.141000 audit: BPF prog-id=101 op=LOAD Apr 12 19:02:19.141000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b4128 items=0 ppid=2589 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:19.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634383233643538646431353130326462356538366564363830386262 Apr 12 19:02:19.170091 env[1131]: time="2024-04-12T19:02:19.169992501Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7mwbm,Uid:f39ba5a1-f691-4b08-a934-e09b8435cf50,Namespace:calico-system,Attempt:1,} returns sandbox id \"64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338\"" Apr 12 19:02:19.361658 kubelet[1521]: E0412 19:02:19.361577 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:20.340198 systemd-networkd[1016]: calie365d5aef47: Gained IPv6LL Apr 12 19:02:20.362695 kubelet[1521]: E0412 19:02:20.362596 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:20.373774 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3825733605.mount: Deactivated successfully. Apr 12 19:02:21.363104 kubelet[1521]: E0412 19:02:21.362822 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:21.549890 env[1131]: time="2024-04-12T19:02:21.549802728Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:21.553419 env[1131]: time="2024-04-12T19:02:21.553256128Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:21.556517 env[1131]: time="2024-04-12T19:02:21.556456444Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:21.559410 env[1131]: time="2024-04-12T19:02:21.559354688Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:21.560936 env[1131]: time="2024-04-12T19:02:21.560858663Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83\"" Apr 12 19:02:21.563619 env[1131]: time="2024-04-12T19:02:21.563534922Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 19:02:21.564935 env[1131]: time="2024-04-12T19:02:21.564867588Z" level=info msg="CreateContainer within sandbox \"bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Apr 12 19:02:21.585901 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2556502428.mount: Deactivated successfully. Apr 12 19:02:21.599315 env[1131]: time="2024-04-12T19:02:21.599132963Z" level=info msg="CreateContainer within sandbox \"bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"7ead28bcfbc2128d554af45e212ce602d871155241ae3a13127fd43e23723bf0\"" Apr 12 19:02:21.600426 env[1131]: time="2024-04-12T19:02:21.600221568Z" level=info msg="StartContainer for \"7ead28bcfbc2128d554af45e212ce602d871155241ae3a13127fd43e23723bf0\"" Apr 12 19:02:21.634192 systemd[1]: Started cri-containerd-7ead28bcfbc2128d554af45e212ce602d871155241ae3a13127fd43e23723bf0.scope. Apr 12 19:02:21.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.663000 audit: BPF prog-id=102 op=LOAD Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2462 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:21.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765616432386263666263323132386435353461663435653231326365 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2462 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:21.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765616432386263666263323132386435353461663435653231326365 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit: BPF prog-id=103 op=LOAD Apr 12 19:02:21.664000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00025fda0 items=0 ppid=2462 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:21.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765616432386263666263323132386435353461663435653231326365 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit: BPF prog-id=104 op=LOAD Apr 12 19:02:21.664000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00025fde8 items=0 ppid=2462 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:21.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765616432386263666263323132386435353461663435653231326365 Apr 12 19:02:21.664000 audit: BPF prog-id=104 op=UNLOAD Apr 12 19:02:21.664000 audit: BPF prog-id=103 op=UNLOAD Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:21.664000 audit: BPF prog-id=105 op=LOAD Apr 12 19:02:21.664000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003c41f8 items=0 ppid=2462 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:21.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765616432386263666263323132386435353461663435653231326365 Apr 12 19:02:21.692570 env[1131]: time="2024-04-12T19:02:21.692483145Z" level=info msg="StartContainer for \"7ead28bcfbc2128d554af45e212ce602d871155241ae3a13127fd43e23723bf0\" returns successfully" Apr 12 19:02:22.363900 kubelet[1521]: E0412 19:02:22.363789 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:22.675106 kubelet[1521]: I0412 19:02:22.674616 1521 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-hc7hg" podStartSLOduration=15.325721982 podStartE2EDuration="19.674544826s" podCreationTimestamp="2024-04-12 19:02:03 +0000 UTC" firstStartedPulling="2024-04-12 19:02:17.212933625 +0000 UTC m=+28.437390284" lastFinishedPulling="2024-04-12 19:02:21.561756355 +0000 UTC m=+32.786213128" observedRunningTime="2024-04-12 19:02:22.664771542 +0000 UTC m=+33.889228242" watchObservedRunningTime="2024-04-12 19:02:22.674544826 +0000 UTC m=+33.899001500" Apr 12 19:02:22.800453 env[1131]: time="2024-04-12T19:02:22.800368477Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:22.803750 env[1131]: time="2024-04-12T19:02:22.803680992Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:22.806586 env[1131]: time="2024-04-12T19:02:22.806533321Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:22.809136 env[1131]: time="2024-04-12T19:02:22.809072872Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:22.810212 env[1131]: time="2024-04-12T19:02:22.810153051Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\"" Apr 12 19:02:22.813401 env[1131]: time="2024-04-12T19:02:22.813331584Z" level=info msg="CreateContainer within sandbox \"64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 19:02:22.838111 env[1131]: time="2024-04-12T19:02:22.838004996Z" level=info msg="CreateContainer within sandbox \"64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"a1d3d104e24292be10eff13e43496b8dfe16b7f5b3bd49aac73850b81f831291\"" Apr 12 19:02:22.839128 env[1131]: time="2024-04-12T19:02:22.839085749Z" level=info msg="StartContainer for \"a1d3d104e24292be10eff13e43496b8dfe16b7f5b3bd49aac73850b81f831291\"" Apr 12 19:02:22.885160 systemd[1]: Started cri-containerd-a1d3d104e24292be10eff13e43496b8dfe16b7f5b3bd49aac73850b81f831291.scope. Apr 12 19:02:22.932000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.938738 kernel: kauditd_printk_skb: 179 callbacks suppressed Apr 12 19:02:22.938961 kernel: audit: type=1400 audit(1712948542.932:821): avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.932000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f0bc50992f8 items=0 ppid=2589 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:22.993176 kernel: audit: type=1300 audit(1712948542.932:821): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f0bc50992f8 items=0 ppid=2589 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:22.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131643364313034653234323932626531306566663133653433343936 Apr 12 19:02:22.934000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:23.043572 kernel: audit: type=1327 audit(1712948542.932:821): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131643364313034653234323932626531306566663133653433343936 Apr 12 19:02:23.043821 kernel: audit: type=1400 audit(1712948542.934:822): avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.934000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:23.065308 kernel: audit: type=1400 audit(1712948542.934:822): avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:23.088575 kernel: audit: type=1400 audit(1712948542.934:822): avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.934000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.934000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:23.110366 kernel: audit: type=1400 audit(1712948542.934:822): avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:23.110568 kernel: audit: type=1400 audit(1712948542.934:822): avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.934000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:23.121684 env[1131]: time="2024-04-12T19:02:23.121587620Z" level=info msg="StartContainer for \"a1d3d104e24292be10eff13e43496b8dfe16b7f5b3bd49aac73850b81f831291\" returns successfully" Apr 12 19:02:23.125288 env[1131]: time="2024-04-12T19:02:23.125221090Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 19:02:22.934000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.934000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:23.174296 kernel: audit: type=1400 audit(1712948542.934:822): avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:23.174562 kernel: audit: type=1400 audit(1712948542.934:822): avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.934000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.934000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.934000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.934000 audit: BPF prog-id=106 op=LOAD Apr 12 19:02:22.934000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c000024bd8 items=0 ppid=2589 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:22.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131643364313034653234323932626531306566663133653433343936 Apr 12 19:02:22.960000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.960000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.960000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.960000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.960000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.960000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.960000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.960000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.960000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.960000 audit: BPF prog-id=107 op=LOAD Apr 12 19:02:22.960000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000024c28 items=0 ppid=2589 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:22.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131643364313034653234323932626531306566663133653433343936 Apr 12 19:02:22.993000 audit: BPF prog-id=107 op=UNLOAD Apr 12 19:02:22.993000 audit: BPF prog-id=106 op=UNLOAD Apr 12 19:02:22.993000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.993000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.993000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.993000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.993000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.993000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.993000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.993000 audit[2691]: AVC avc: denied { perfmon } for pid=2691 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.993000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.993000 audit[2691]: AVC avc: denied { bpf } for pid=2691 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:22.993000 audit: BPF prog-id=108 op=LOAD Apr 12 19:02:22.993000 audit[2691]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c000024cb8 items=0 ppid=2589 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:22.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131643364313034653234323932626531306566663133653433343936 Apr 12 19:02:23.364139 kubelet[1521]: E0412 19:02:23.364061 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:24.332379 env[1131]: time="2024-04-12T19:02:24.332261678Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:24.336237 env[1131]: time="2024-04-12T19:02:24.336171807Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:24.339645 env[1131]: time="2024-04-12T19:02:24.339582854Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:24.343120 env[1131]: time="2024-04-12T19:02:24.343067644Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:24.343902 env[1131]: time="2024-04-12T19:02:24.343857170Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\"" Apr 12 19:02:24.347140 env[1131]: time="2024-04-12T19:02:24.347089477Z" level=info msg="CreateContainer within sandbox \"64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 19:02:24.368874 kubelet[1521]: E0412 19:02:24.367415 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:24.376577 env[1131]: time="2024-04-12T19:02:24.376460758Z" level=info msg="CreateContainer within sandbox \"64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"d89f991c56632c88779895f325236ee1e717749d5a6ab00869e7e67853f9b2bf\"" Apr 12 19:02:24.377655 env[1131]: time="2024-04-12T19:02:24.377522267Z" level=info msg="StartContainer for \"d89f991c56632c88779895f325236ee1e717749d5a6ab00869e7e67853f9b2bf\"" Apr 12 19:02:24.425070 systemd[1]: run-containerd-runc-k8s.io-d89f991c56632c88779895f325236ee1e717749d5a6ab00869e7e67853f9b2bf-runc.9YEjcK.mount: Deactivated successfully. Apr 12 19:02:24.429849 systemd[1]: Started cri-containerd-d89f991c56632c88779895f325236ee1e717749d5a6ab00869e7e67853f9b2bf.scope. Apr 12 19:02:24.462000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.462000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f172826ecb8 items=0 ppid=2589 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:24.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438396639393163353636333263383837373938393566333235323336 Apr 12 19:02:24.462000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.462000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.462000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.462000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.462000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.462000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.462000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.462000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.462000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.462000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.462000 audit: BPF prog-id=109 op=LOAD Apr 12 19:02:24.462000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003c8488 items=0 ppid=2589 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:24.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438396639393163353636333263383837373938393566333235323336 Apr 12 19:02:24.463000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.463000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.463000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.463000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.463000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.463000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.463000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.463000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.463000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.463000 audit: BPF prog-id=110 op=LOAD Apr 12 19:02:24.463000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003c84d8 items=0 ppid=2589 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:24.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438396639393163353636333263383837373938393566333235323336 Apr 12 19:02:24.463000 audit: BPF prog-id=110 op=UNLOAD Apr 12 19:02:24.463000 audit: BPF prog-id=109 op=UNLOAD Apr 12 19:02:24.463000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.463000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.463000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.463000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.463000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.463000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.463000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.463000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.463000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.463000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:24.463000 audit: BPF prog-id=111 op=LOAD Apr 12 19:02:24.463000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003c8568 items=0 ppid=2589 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:24.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438396639393163353636333263383837373938393566333235323336 Apr 12 19:02:24.490310 env[1131]: time="2024-04-12T19:02:24.490218453Z" level=info msg="StartContainer for \"d89f991c56632c88779895f325236ee1e717749d5a6ab00869e7e67853f9b2bf\" returns successfully" Apr 12 19:02:24.676676 kubelet[1521]: I0412 19:02:24.676597 1521 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-7mwbm" podStartSLOduration=30.504176923 podStartE2EDuration="35.67652823s" podCreationTimestamp="2024-04-12 19:01:49 +0000 UTC" firstStartedPulling="2024-04-12 19:02:19.172054049 +0000 UTC m=+30.396510705" lastFinishedPulling="2024-04-12 19:02:24.344405345 +0000 UTC m=+35.568862012" observedRunningTime="2024-04-12 19:02:24.675843579 +0000 UTC m=+35.900300250" watchObservedRunningTime="2024-04-12 19:02:24.67652823 +0000 UTC m=+35.900984903" Apr 12 19:02:25.368180 kubelet[1521]: E0412 19:02:25.368066 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:25.472604 kubelet[1521]: I0412 19:02:25.472544 1521 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 19:02:25.472604 kubelet[1521]: I0412 19:02:25.472593 1521 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 19:02:26.368969 kubelet[1521]: E0412 19:02:26.368882 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:27.369783 kubelet[1521]: E0412 19:02:27.369701 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:28.370883 kubelet[1521]: E0412 19:02:28.370800 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:29.326943 kubelet[1521]: E0412 19:02:29.326859 1521 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:29.371508 kubelet[1521]: E0412 19:02:29.371446 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:30.372411 kubelet[1521]: E0412 19:02:30.372340 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:31.009000 audit[2771]: NETFILTER_CFG table=filter:75 family=2 entries=20 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:31.016646 kernel: kauditd_printk_skb: 76 callbacks suppressed Apr 12 19:02:31.016799 kernel: audit: type=1325 audit(1712948551.009:833): table=filter:75 family=2 entries=20 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:31.009000 audit[2771]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffef03ebca0 a2=0 a3=7ffef03ebc8c items=0 ppid=1691 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:31.066055 kernel: audit: type=1300 audit(1712948551.009:833): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffef03ebca0 a2=0 a3=7ffef03ebc8c items=0 ppid=1691 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:31.066251 kernel: audit: type=1327 audit(1712948551.009:833): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:31.009000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:31.073964 kubelet[1521]: I0412 19:02:31.073904 1521 topology_manager.go:215] "Topology Admit Handler" podUID="d84a56ce-089f-4e09-8d12-53c59a4d2a08" podNamespace="default" podName="nfs-server-provisioner-0" Apr 12 19:02:31.082232 systemd[1]: Created slice kubepods-besteffort-podd84a56ce_089f_4e09_8d12_53c59a4d2a08.slice. Apr 12 19:02:31.009000 audit[2771]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:31.009000 audit[2771]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffef03ebca0 a2=0 a3=0 items=0 ppid=1691 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:31.135490 kernel: audit: type=1325 audit(1712948551.009:834): table=nat:76 family=2 entries=22 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:31.135680 kernel: audit: type=1300 audit(1712948551.009:834): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffef03ebca0 a2=0 a3=0 items=0 ppid=1691 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:31.135727 kernel: audit: type=1327 audit(1712948551.009:834): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:31.009000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:31.162000 audit[2773]: NETFILTER_CFG table=filter:77 family=2 entries=32 op=nft_register_rule pid=2773 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:31.162000 audit[2773]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff6c0c5d40 a2=0 a3=7fff6c0c5d2c items=0 ppid=1691 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:31.192413 kubelet[1521]: I0412 19:02:31.192347 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rbwhg\" (UniqueName: \"kubernetes.io/projected/d84a56ce-089f-4e09-8d12-53c59a4d2a08-kube-api-access-rbwhg\") pod \"nfs-server-provisioner-0\" (UID: \"d84a56ce-089f-4e09-8d12-53c59a4d2a08\") " pod="default/nfs-server-provisioner-0" Apr 12 19:02:31.192713 kubelet[1521]: I0412 19:02:31.192687 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/d84a56ce-089f-4e09-8d12-53c59a4d2a08-data\") pod \"nfs-server-provisioner-0\" (UID: \"d84a56ce-089f-4e09-8d12-53c59a4d2a08\") " pod="default/nfs-server-provisioner-0" Apr 12 19:02:31.214495 kernel: audit: type=1325 audit(1712948551.162:835): table=filter:77 family=2 entries=32 op=nft_register_rule pid=2773 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:31.214686 kernel: audit: type=1300 audit(1712948551.162:835): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff6c0c5d40 a2=0 a3=7fff6c0c5d2c items=0 ppid=1691 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:31.214729 kernel: audit: type=1327 audit(1712948551.162:835): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:31.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:31.162000 audit[2773]: NETFILTER_CFG table=nat:78 family=2 entries=22 op=nft_register_rule pid=2773 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:31.162000 audit[2773]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff6c0c5d40 a2=0 a3=0 items=0 ppid=1691 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:31.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:31.247371 kernel: audit: type=1325 audit(1712948551.162:836): table=nat:78 family=2 entries=22 op=nft_register_rule pid=2773 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:31.373308 kubelet[1521]: E0412 19:02:31.373187 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:31.390799 env[1131]: time="2024-04-12T19:02:31.390723146Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:d84a56ce-089f-4e09-8d12-53c59a4d2a08,Namespace:default,Attempt:0,}" Apr 12 19:02:31.574245 systemd-networkd[1016]: cali60e51b789ff: Link UP Apr 12 19:02:31.590845 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 19:02:31.591243 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Apr 12 19:02:31.591811 systemd-networkd[1016]: cali60e51b789ff: Gained carrier Apr 12 19:02:31.606646 env[1131]: 2024-04-12 19:02:31.466 [INFO][2775] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.26-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default d84a56ce-089f-4e09-8d12-53c59a4d2a08 1107 0 2024-04-12 19:02:31 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.128.0.26 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.26-k8s-nfs--server--provisioner--0-" Apr 12 19:02:31.606646 env[1131]: 2024-04-12 19:02:31.466 [INFO][2775] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.26-k8s-nfs--server--provisioner--0-eth0" Apr 12 19:02:31.606646 env[1131]: 2024-04-12 19:02:31.506 [INFO][2787] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a" HandleID="k8s-pod-network.db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a" Workload="10.128.0.26-k8s-nfs--server--provisioner--0-eth0" Apr 12 19:02:31.606646 env[1131]: 2024-04-12 19:02:31.530 [INFO][2787] ipam_plugin.go 268: Auto assigning IP ContainerID="db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a" HandleID="k8s-pod-network.db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a" Workload="10.128.0.26-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000281c30), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.26", "pod":"nfs-server-provisioner-0", "timestamp":"2024-04-12 19:02:31.506744566 +0000 UTC"}, Hostname:"10.128.0.26", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:02:31.606646 env[1131]: 2024-04-12 19:02:31.530 [INFO][2787] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:02:31.606646 env[1131]: 2024-04-12 19:02:31.531 [INFO][2787] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:02:31.606646 env[1131]: 2024-04-12 19:02:31.531 [INFO][2787] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.26' Apr 12 19:02:31.606646 env[1131]: 2024-04-12 19:02:31.533 [INFO][2787] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a" host="10.128.0.26" Apr 12 19:02:31.606646 env[1131]: 2024-04-12 19:02:31.539 [INFO][2787] ipam.go 372: Looking up existing affinities for host host="10.128.0.26" Apr 12 19:02:31.606646 env[1131]: 2024-04-12 19:02:31.544 [INFO][2787] ipam.go 489: Trying affinity for 192.168.27.192/26 host="10.128.0.26" Apr 12 19:02:31.606646 env[1131]: 2024-04-12 19:02:31.547 [INFO][2787] ipam.go 155: Attempting to load block cidr=192.168.27.192/26 host="10.128.0.26" Apr 12 19:02:31.606646 env[1131]: 2024-04-12 19:02:31.549 [INFO][2787] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.27.192/26 host="10.128.0.26" Apr 12 19:02:31.606646 env[1131]: 2024-04-12 19:02:31.550 [INFO][2787] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.27.192/26 handle="k8s-pod-network.db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a" host="10.128.0.26" Apr 12 19:02:31.606646 env[1131]: 2024-04-12 19:02:31.553 [INFO][2787] ipam.go 1682: Creating new handle: k8s-pod-network.db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a Apr 12 19:02:31.606646 env[1131]: 2024-04-12 19:02:31.560 [INFO][2787] ipam.go 1203: Writing block in order to claim IPs block=192.168.27.192/26 handle="k8s-pod-network.db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a" host="10.128.0.26" Apr 12 19:02:31.606646 env[1131]: 2024-04-12 19:02:31.566 [INFO][2787] ipam.go 1216: Successfully claimed IPs: [192.168.27.195/26] block=192.168.27.192/26 handle="k8s-pod-network.db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a" host="10.128.0.26" Apr 12 19:02:31.606646 env[1131]: 2024-04-12 19:02:31.566 [INFO][2787] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.27.195/26] handle="k8s-pod-network.db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a" host="10.128.0.26" Apr 12 19:02:31.606646 env[1131]: 2024-04-12 19:02:31.566 [INFO][2787] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:02:31.606646 env[1131]: 2024-04-12 19:02:31.566 [INFO][2787] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.27.195/26] IPv6=[] ContainerID="db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a" HandleID="k8s-pod-network.db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a" Workload="10.128.0.26-k8s-nfs--server--provisioner--0-eth0" Apr 12 19:02:31.614482 env[1131]: 2024-04-12 19:02:31.568 [INFO][2775] k8s.go 385: Populated endpoint ContainerID="db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.26-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.26-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"d84a56ce-089f-4e09-8d12-53c59a4d2a08", ResourceVersion:"1107", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 2, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.26", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.27.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:02:31.614482 env[1131]: 2024-04-12 19:02:31.568 [INFO][2775] k8s.go 386: Calico CNI using IPs: [192.168.27.195/32] ContainerID="db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.26-k8s-nfs--server--provisioner--0-eth0" Apr 12 19:02:31.614482 env[1131]: 2024-04-12 19:02:31.569 [INFO][2775] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.26-k8s-nfs--server--provisioner--0-eth0" Apr 12 19:02:31.614482 env[1131]: 2024-04-12 19:02:31.593 [INFO][2775] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.26-k8s-nfs--server--provisioner--0-eth0" Apr 12 19:02:31.615007 env[1131]: 2024-04-12 19:02:31.594 [INFO][2775] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.26-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.26-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"d84a56ce-089f-4e09-8d12-53c59a4d2a08", ResourceVersion:"1107", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 2, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.26", ContainerID:"db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.27.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"92:51:8c:1a:96:5f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:02:31.615007 env[1131]: 2024-04-12 19:02:31.603 [INFO][2775] k8s.go 498: Wrote updated endpoint to datastore ContainerID="db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.26-k8s-nfs--server--provisioner--0-eth0" Apr 12 19:02:31.664000 audit[2809]: NETFILTER_CFG table=filter:79 family=2 entries=44 op=nft_register_chain pid=2809 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:02:31.664000 audit[2809]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7fff622da400 a2=0 a3=7fff622da3ec items=0 ppid=2173 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:31.664000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:02:31.677206 env[1131]: time="2024-04-12T19:02:31.677083994Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:02:31.677555 env[1131]: time="2024-04-12T19:02:31.677502472Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:02:31.677753 env[1131]: time="2024-04-12T19:02:31.677715988Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:02:31.679887 env[1131]: time="2024-04-12T19:02:31.678767135Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a pid=2816 runtime=io.containerd.runc.v2 Apr 12 19:02:31.715041 systemd[1]: Started cri-containerd-db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a.scope. Apr 12 19:02:31.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.746000 audit: BPF prog-id=112 op=LOAD Apr 12 19:02:31.747000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.747000 audit[2827]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2816 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:31.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462313763646631373234303566653562363230386566613865623136 Apr 12 19:02:31.747000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.747000 audit[2827]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2816 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:31.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462313763646631373234303566653562363230386566613865623136 Apr 12 19:02:31.747000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.747000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.747000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.747000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.747000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.747000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.747000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.747000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.747000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.747000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.747000 audit: BPF prog-id=113 op=LOAD Apr 12 19:02:31.747000 audit[2827]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002b4190 items=0 ppid=2816 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:31.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462313763646631373234303566653562363230386566613865623136 Apr 12 19:02:31.748000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.748000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.748000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.748000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.748000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.748000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.748000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.748000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.748000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.748000 audit: BPF prog-id=114 op=LOAD Apr 12 19:02:31.748000 audit[2827]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002b41d8 items=0 ppid=2816 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:31.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462313763646631373234303566653562363230386566613865623136 Apr 12 19:02:31.748000 audit: BPF prog-id=114 op=UNLOAD Apr 12 19:02:31.748000 audit: BPF prog-id=113 op=UNLOAD Apr 12 19:02:31.748000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.748000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.748000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.748000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.748000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.748000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.748000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.748000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.748000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.748000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:31.748000 audit: BPF prog-id=115 op=LOAD Apr 12 19:02:31.748000 audit[2827]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002b45e8 items=0 ppid=2816 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:31.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462313763646631373234303566653562363230386566613865623136 Apr 12 19:02:31.797732 env[1131]: time="2024-04-12T19:02:31.797414145Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:d84a56ce-089f-4e09-8d12-53c59a4d2a08,Namespace:default,Attempt:0,} returns sandbox id \"db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a\"" Apr 12 19:02:31.801518 env[1131]: time="2024-04-12T19:02:31.801457005Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Apr 12 19:02:32.310425 systemd[1]: run-containerd-runc-k8s.io-db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a-runc.sUNVpV.mount: Deactivated successfully. Apr 12 19:02:32.375224 kubelet[1521]: E0412 19:02:32.375132 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:32.690407 systemd-networkd[1016]: cali60e51b789ff: Gained IPv6LL Apr 12 19:02:33.375637 kubelet[1521]: E0412 19:02:33.375532 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:34.376673 kubelet[1521]: E0412 19:02:34.376599 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:34.690960 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4115713120.mount: Deactivated successfully. Apr 12 19:02:35.377106 kubelet[1521]: E0412 19:02:35.376989 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:36.378222 kubelet[1521]: E0412 19:02:36.378098 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:37.378410 kubelet[1521]: E0412 19:02:37.378329 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:37.379487 env[1131]: time="2024-04-12T19:02:37.379419627Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:37.382483 env[1131]: time="2024-04-12T19:02:37.382425793Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:37.386169 env[1131]: time="2024-04-12T19:02:37.386112246Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:37.393706 env[1131]: time="2024-04-12T19:02:37.393636578Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Apr 12 19:02:37.394889 env[1131]: time="2024-04-12T19:02:37.394833352Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:37.399593 env[1131]: time="2024-04-12T19:02:37.399504073Z" level=info msg="CreateContainer within sandbox \"db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Apr 12 19:02:37.417818 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1986749776.mount: Deactivated successfully. Apr 12 19:02:37.431624 env[1131]: time="2024-04-12T19:02:37.431404329Z" level=info msg="CreateContainer within sandbox \"db17cdf172405fe5b6208efa8eb1602ad64111e55e532841a53c99d4f526170a\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"5680321b5668603fa2d7ef7c588965c54929533d58cb439e0c270f2000a35532\"" Apr 12 19:02:37.432756 env[1131]: time="2024-04-12T19:02:37.432710075Z" level=info msg="StartContainer for \"5680321b5668603fa2d7ef7c588965c54929533d58cb439e0c270f2000a35532\"" Apr 12 19:02:37.464474 systemd[1]: Started cri-containerd-5680321b5668603fa2d7ef7c588965c54929533d58cb439e0c270f2000a35532.scope. Apr 12 19:02:37.515584 kernel: kauditd_printk_skb: 62 callbacks suppressed Apr 12 19:02:37.515913 kernel: audit: type=1400 audit(1712948557.487:856): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.538410 kernel: audit: type=1400 audit(1712948557.487:857): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.562470 kernel: audit: type=1400 audit(1712948557.487:858): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.568789 env[1131]: time="2024-04-12T19:02:37.568703290Z" level=info msg="StartContainer for \"5680321b5668603fa2d7ef7c588965c54929533d58cb439e0c270f2000a35532\" returns successfully" Apr 12 19:02:37.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.596316 kernel: audit: type=1400 audit(1712948557.487:859): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.596548 kernel: audit: type=1400 audit(1712948557.487:860): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.638941 kernel: audit: type=1400 audit(1712948557.487:861): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.660534 kernel: audit: type=1400 audit(1712948557.487:862): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.703323 kernel: audit: type=1400 audit(1712948557.487:863): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.703522 kernel: audit: type=1400 audit(1712948557.487:864): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.725309 kernel: audit: type=1400 audit(1712948557.488:865): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.488000 audit: BPF prog-id=116 op=LOAD Apr 12 19:02:37.489000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.489000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2816 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:37.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536383033323162353636383630336661326437656637633538383936 Apr 12 19:02:37.489000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.489000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2816 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:37.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536383033323162353636383630336661326437656637633538383936 Apr 12 19:02:37.489000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.489000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.489000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.489000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.489000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.489000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.489000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.489000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.489000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.489000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.489000 audit: BPF prog-id=117 op=LOAD Apr 12 19:02:37.489000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000312370 items=0 ppid=2816 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:37.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536383033323162353636383630336661326437656637633538383936 Apr 12 19:02:37.514000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.514000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.514000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.514000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.514000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.514000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.514000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.514000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.514000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.514000 audit: BPF prog-id=118 op=LOAD Apr 12 19:02:37.514000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003123b8 items=0 ppid=2816 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:37.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536383033323162353636383630336661326437656637633538383936 Apr 12 19:02:37.514000 audit: BPF prog-id=118 op=UNLOAD Apr 12 19:02:37.514000 audit: BPF prog-id=117 op=UNLOAD Apr 12 19:02:37.514000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.514000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.514000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.514000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.514000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.514000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.514000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.514000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.514000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.514000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:37.514000 audit: BPF prog-id=119 op=LOAD Apr 12 19:02:37.514000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003127c8 items=0 ppid=2816 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:37.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536383033323162353636383630336661326437656637633538383936 Apr 12 19:02:37.659000 audit[2903]: AVC avc: denied { search } for pid=2903 comm="rpcbind" name="crypto" dev="proc" ino=22245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c519,c707 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 19:02:37.659000 audit[2903]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f19960b40c0 a2=0 a3=0 items=0 ppid=2883 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c519,c707 key=(null) Apr 12 19:02:37.659000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Apr 12 19:02:37.742000 audit[2908]: AVC avc: denied { search } for pid=2908 comm="dbus-daemon" name="crypto" dev="proc" ino=22245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c519,c707 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 19:02:37.742000 audit[2908]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f253cdb10c0 a2=0 a3=0 items=0 ppid=2883 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c519,c707 key=(null) Apr 12 19:02:37.742000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 19:02:37.746660 kubelet[1521]: I0412 19:02:37.746608 1521 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.152192519 podStartE2EDuration="6.746525223s" podCreationTimestamp="2024-04-12 19:02:31 +0000 UTC" firstStartedPulling="2024-04-12 19:02:31.800239402 +0000 UTC m=+43.024696049" lastFinishedPulling="2024-04-12 19:02:37.394572094 +0000 UTC m=+48.619028753" observedRunningTime="2024-04-12 19:02:37.746359013 +0000 UTC m=+48.970815690" watchObservedRunningTime="2024-04-12 19:02:37.746525223 +0000 UTC m=+48.970981896" Apr 12 19:02:37.747000 audit[2909]: AVC avc: denied { watch } for pid=2909 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538067 scontext=system_u:system_r:svirt_lxc_net_t:s0:c519,c707 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c519,c707 tclass=dir permissive=0 Apr 12 19:02:37.747000 audit[2909]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=5651ccb990b0 a2=2c8 a3=7ffeeb2df05c items=0 ppid=2883 pid=2909 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c519,c707 key=(null) Apr 12 19:02:37.747000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 19:02:37.753000 audit[2910]: AVC avc: denied { read } for pid=2910 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22317 scontext=system_u:system_r:svirt_lxc_net_t:s0:c519,c707 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Apr 12 19:02:37.753000 audit[2910]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f3767ee9320 a1=80000 a2=d a3=7ffd98ab7380 items=0 ppid=2883 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c519,c707 key=(null) Apr 12 19:02:37.753000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 19:02:37.757000 audit[2910]: AVC avc: denied { search } for pid=2910 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c519,c707 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 19:02:37.757000 audit[2910]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f376743d0c0 a2=0 a3=0 items=0 ppid=2883 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c519,c707 key=(null) Apr 12 19:02:37.757000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 19:02:37.767000 audit[2915]: NETFILTER_CFG table=filter:80 family=2 entries=20 op=nft_register_rule pid=2915 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:37.767000 audit[2915]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd4e67a190 a2=0 a3=7ffd4e67a17c items=0 ppid=1691 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:37.767000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:37.773000 audit[2915]: NETFILTER_CFG table=nat:81 family=2 entries=106 op=nft_register_chain pid=2915 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:02:37.773000 audit[2915]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd4e67a190 a2=0 a3=7ffd4e67a17c items=0 ppid=1691 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:37.773000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:02:38.379299 kubelet[1521]: E0412 19:02:38.379191 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:39.379510 kubelet[1521]: E0412 19:02:39.379428 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:40.380049 kubelet[1521]: E0412 19:02:40.379976 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:41.381286 kubelet[1521]: E0412 19:02:41.381192 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:42.382002 kubelet[1521]: E0412 19:02:42.381936 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:43.382728 kubelet[1521]: E0412 19:02:43.382647 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:44.383593 kubelet[1521]: E0412 19:02:44.383531 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:45.384099 kubelet[1521]: E0412 19:02:45.384032 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:46.384407 kubelet[1521]: E0412 19:02:46.384331 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:47.385167 kubelet[1521]: E0412 19:02:47.385080 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:47.516322 kubelet[1521]: I0412 19:02:47.516230 1521 topology_manager.go:215] "Topology Admit Handler" podUID="304b5b1e-923a-4041-b6f6-5d20b02ff68e" podNamespace="default" podName="test-pod-1" Apr 12 19:02:47.526331 systemd[1]: Created slice kubepods-besteffort-pod304b5b1e_923a_4041_b6f6_5d20b02ff68e.slice. Apr 12 19:02:47.701683 kubelet[1521]: I0412 19:02:47.701471 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-1ea06758-8619-430e-b4c0-11ecc834b125\" (UniqueName: \"kubernetes.io/nfs/304b5b1e-923a-4041-b6f6-5d20b02ff68e-pvc-1ea06758-8619-430e-b4c0-11ecc834b125\") pod \"test-pod-1\" (UID: \"304b5b1e-923a-4041-b6f6-5d20b02ff68e\") " pod="default/test-pod-1" Apr 12 19:02:47.702563 kubelet[1521]: I0412 19:02:47.702524 1521 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7sc48\" (UniqueName: \"kubernetes.io/projected/304b5b1e-923a-4041-b6f6-5d20b02ff68e-kube-api-access-7sc48\") pod \"test-pod-1\" (UID: \"304b5b1e-923a-4041-b6f6-5d20b02ff68e\") " pod="default/test-pod-1" Apr 12 19:02:47.859050 kernel: Failed to create system directory netfs Apr 12 19:02:47.859585 kernel: kauditd_printk_skb: 68 callbacks suppressed Apr 12 19:02:47.860179 kernel: audit: type=1400 audit(1712948567.842:881): avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:47.860290 kernel: Failed to create system directory netfs Apr 12 19:02:47.842000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:47.903162 kernel: audit: type=1400 audit(1712948567.842:881): avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:47.903439 kernel: Failed to create system directory netfs Apr 12 19:02:47.842000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:47.935734 kernel: audit: type=1400 audit(1712948567.842:881): avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:47.935999 kernel: Failed to create system directory netfs Apr 12 19:02:47.842000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.001761 kernel: audit: type=1400 audit(1712948567.842:881): avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:47.842000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:47.842000 audit[3018]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562542d965e0 a1=153bc a2=5625426352b0 a3=5 items=0 ppid=9 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:48.067625 kernel: audit: type=1300 audit(1712948567.842:881): arch=c000003e syscall=175 success=yes exit=0 a0=562542d965e0 a1=153bc a2=5625426352b0 a3=5 items=0 ppid=9 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:48.067885 kernel: Failed to create system directory fscache Apr 12 19:02:48.067936 kernel: audit: type=1327 audit(1712948567.842:881): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 19:02:47.842000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 19:02:48.087418 kernel: Failed to create system directory fscache Apr 12 19:02:48.087676 kernel: audit: type=1400 audit(1712948568.019:882): avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.019000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.126174 kernel: Failed to create system directory fscache Apr 12 19:02:48.126414 kernel: audit: type=1400 audit(1712948568.019:882): avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.019000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.159933 kernel: Failed to create system directory fscache Apr 12 19:02:48.160148 kernel: audit: type=1400 audit(1712948568.019:882): avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.019000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.201031 kernel: Failed to create system directory fscache Apr 12 19:02:48.201301 kernel: audit: type=1400 audit(1712948568.019:882): avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.019000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.230384 kernel: Failed to create system directory fscache Apr 12 19:02:48.019000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.019000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.019000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.241578 kernel: Failed to create system directory fscache Apr 12 19:02:48.241827 kernel: Failed to create system directory fscache Apr 12 19:02:48.019000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.019000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.253004 kernel: Failed to create system directory fscache Apr 12 19:02:48.253215 kernel: Failed to create system directory fscache Apr 12 19:02:48.019000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.019000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.265924 kernel: Failed to create system directory fscache Apr 12 19:02:48.266150 kernel: Failed to create system directory fscache Apr 12 19:02:48.019000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.019000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.277575 kernel: Failed to create system directory fscache Apr 12 19:02:48.277803 kernel: Failed to create system directory fscache Apr 12 19:02:48.019000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.019000 audit[3018]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562542fab9c0 a1=4c0fc a2=5625426352b0 a3=5 items=0 ppid=9 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:48.019000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 19:02:48.290460 kernel: FS-Cache: Loaded Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.351604 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.351865 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.351911 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.366350 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.366584 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.379700 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.379951 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.386217 kubelet[1521]: E0412 19:02:48.386150 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:48.386979 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.398634 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.398920 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.409404 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.409706 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.420652 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.420934 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.432288 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.432500 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.443182 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.443464 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.455551 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.455794 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.466132 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.466511 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.477801 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.478001 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.490136 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.490362 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.509776 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.510069 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.524851 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.525108 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.540726 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.542652 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.557371 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.557634 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.572816 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.573100 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.590316 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.590616 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.605052 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.605722 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.614891 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.627746 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.627984 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.641218 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.641543 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.654174 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.654429 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.669919 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.670294 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.677485 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.694195 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.694501 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.706731 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.707208 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.721044 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.721314 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.732967 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.733194 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.752023 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.752501 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.760387 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.764418 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.776120 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.776347 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.793253 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.793487 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.793564 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.804435 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.804667 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.817614 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.817828 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.832946 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.833199 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.847580 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.847861 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.859582 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.859769 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.877080 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.877331 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.877417 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.888223 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.888513 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.899302 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.899511 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.909611 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.909831 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.922550 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.922780 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.933410 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.933626 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.939126 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.945171 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.955881 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.956196 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.972312 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.972698 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.985047 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.985243 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.996045 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.996349 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.008742 kernel: Failed to create system directory sunrpc Apr 12 19:02:49.008965 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.023993 kernel: Failed to create system directory sunrpc Apr 12 19:02:49.024372 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.031045 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.040223 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.053634 kernel: Failed to create system directory sunrpc Apr 12 19:02:49.053868 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.065049 kernel: Failed to create system directory sunrpc Apr 12 19:02:49.065283 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.078435 kernel: Failed to create system directory sunrpc Apr 12 19:02:49.078694 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.081570 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.093042 kernel: Failed to create system directory sunrpc Apr 12 19:02:49.093294 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.103566 kernel: Failed to create system directory sunrpc Apr 12 19:02:49.103761 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.114936 kernel: Failed to create system directory sunrpc Apr 12 19:02:49.115211 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.126508 kernel: Failed to create system directory sunrpc Apr 12 19:02:49.126737 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.136882 kernel: Failed to create system directory sunrpc Apr 12 19:02:49.137110 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.148265 kernel: Failed to create system directory sunrpc Apr 12 19:02:49.148516 kernel: Failed to create system directory sunrpc Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:48.322000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.154443 kernel: Failed to create system directory sunrpc Apr 12 19:02:49.181003 kernel: RPC: Registered named UNIX socket transport module. Apr 12 19:02:49.181212 kernel: RPC: Registered udp transport module. Apr 12 19:02:49.181311 kernel: RPC: Registered tcp transport module. Apr 12 19:02:49.186181 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Apr 12 19:02:48.322000 audit[3018]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562542ff7ad0 a1=1a7e9c a2=5625426352b0 a3=5 items=6 ppid=9 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:48.322000 audit: CWD cwd="/" Apr 12 19:02:48.322000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:02:48.322000 audit: PATH item=1 name=(null) inode=22523 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:02:48.322000 audit: PATH item=2 name=(null) inode=22523 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:02:48.322000 audit: PATH item=3 name=(null) inode=22524 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:02:48.322000 audit: PATH item=4 name=(null) inode=22523 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:02:48.322000 audit: PATH item=5 name=(null) inode=22525 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:02:48.322000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.258403 kernel: Failed to create system directory nfs Apr 12 19:02:49.258655 kernel: Failed to create system directory nfs Apr 12 19:02:49.258698 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.269105 kernel: Failed to create system directory nfs Apr 12 19:02:49.269254 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.279793 kernel: Failed to create system directory nfs Apr 12 19:02:49.280004 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.291865 kernel: Failed to create system directory nfs Apr 12 19:02:49.292053 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.301766 kernel: Failed to create system directory nfs Apr 12 19:02:49.301946 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.312619 kernel: Failed to create system directory nfs Apr 12 19:02:49.312781 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.318473 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.326861 kubelet[1521]: E0412 19:02:49.326740 1521 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:49.328606 kernel: Failed to create system directory nfs Apr 12 19:02:49.328702 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.342555 kernel: Failed to create system directory nfs Apr 12 19:02:49.342771 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.352096 kernel: Failed to create system directory nfs Apr 12 19:02:49.352374 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.352604 env[1131]: time="2024-04-12T19:02:49.347792152Z" level=info msg="StopPodSandbox for \"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\"" Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.364146 kernel: Failed to create system directory nfs Apr 12 19:02:49.364358 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.377265 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.383576 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.389082 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.389382 kubelet[1521]: E0412 19:02:49.389294 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.399717 kernel: Failed to create system directory nfs Apr 12 19:02:49.399910 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.404944 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.415772 kernel: Failed to create system directory nfs Apr 12 19:02:49.415938 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.422961 kernel: Failed to create system directory nfs Apr 12 19:02:49.423190 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.435495 kernel: Failed to create system directory nfs Apr 12 19:02:49.436490 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.446371 kernel: Failed to create system directory nfs Apr 12 19:02:49.446570 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.453373 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.469131 kernel: Failed to create system directory nfs Apr 12 19:02:49.469395 kernel: Failed to create system directory nfs Apr 12 19:02:49.469441 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.479827 kernel: Failed to create system directory nfs Apr 12 19:02:49.480119 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.490545 kernel: Failed to create system directory nfs Apr 12 19:02:49.490811 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.495936 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.506687 kernel: Failed to create system directory nfs Apr 12 19:02:49.506904 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.524111 kernel: Failed to create system directory nfs Apr 12 19:02:49.524363 kernel: Failed to create system directory nfs Apr 12 19:02:49.524434 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.543560 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.552402 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.560317 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.571479 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.581383 kernel: Failed to create system directory nfs Apr 12 19:02:49.581615 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.596373 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.600676 env[1131]: 2024-04-12 19:02:49.468 [WARNING][3035] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"2a2a3421-e3ac-4670-9fae-7caab615ead6", ResourceVersion:"1060", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 2, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.26", ContainerID:"bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673", Pod:"nginx-deployment-6d5f899847-hc7hg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calieff4b84e7fd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:02:49.600676 env[1131]: 2024-04-12 19:02:49.470 [INFO][3035] k8s.go 585: Cleaning up netns ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Apr 12 19:02:49.600676 env[1131]: 2024-04-12 19:02:49.470 [INFO][3035] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" iface="eth0" netns="" Apr 12 19:02:49.600676 env[1131]: 2024-04-12 19:02:49.470 [INFO][3035] k8s.go 592: Releasing IP address(es) ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Apr 12 19:02:49.600676 env[1131]: 2024-04-12 19:02:49.470 [INFO][3035] utils.go 188: Calico CNI releasing IP address ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Apr 12 19:02:49.600676 env[1131]: 2024-04-12 19:02:49.568 [INFO][3041] ipam_plugin.go 415: Releasing address using handleID ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" HandleID="k8s-pod-network.1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Workload="10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0" Apr 12 19:02:49.600676 env[1131]: 2024-04-12 19:02:49.569 [INFO][3041] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:02:49.600676 env[1131]: 2024-04-12 19:02:49.569 [INFO][3041] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:02:49.600676 env[1131]: 2024-04-12 19:02:49.588 [WARNING][3041] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" HandleID="k8s-pod-network.1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Workload="10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0" Apr 12 19:02:49.600676 env[1131]: 2024-04-12 19:02:49.588 [INFO][3041] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" HandleID="k8s-pod-network.1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Workload="10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0" Apr 12 19:02:49.600676 env[1131]: 2024-04-12 19:02:49.596 [INFO][3041] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:02:49.600676 env[1131]: 2024-04-12 19:02:49.598 [INFO][3035] k8s.go 598: Teardown processing complete. ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Apr 12 19:02:49.601842 env[1131]: time="2024-04-12T19:02:49.601781949Z" level=info msg="TearDown network for sandbox \"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\" successfully" Apr 12 19:02:49.601985 env[1131]: time="2024-04-12T19:02:49.601955335Z" level=info msg="StopPodSandbox for \"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\" returns successfully" Apr 12 19:02:49.603103 env[1131]: time="2024-04-12T19:02:49.603053480Z" level=info msg="RemovePodSandbox for \"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\"" Apr 12 19:02:49.603527 env[1131]: time="2024-04-12T19:02:49.603460307Z" level=info msg="Forcibly stopping sandbox \"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\"" Apr 12 19:02:49.605597 kernel: Failed to create system directory nfs Apr 12 19:02:49.605716 kernel: Failed to create system directory nfs Apr 12 19:02:49.237000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.650335 kernel: FS-Cache: Netfs 'nfs' registered for caching Apr 12 19:02:49.237000 audit[3018]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562543218670 a1=16d85c a2=5625426352b0 a3=5 items=0 ppid=9 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:49.237000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.742834 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.743090 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.743133 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.757239 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.757491 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.771611 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.771895 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.787164 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.787410 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.803868 env[1131]: 2024-04-12 19:02:49.675 [WARNING][3064] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"2a2a3421-e3ac-4670-9fae-7caab615ead6", ResourceVersion:"1060", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 2, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.26", ContainerID:"bdd2a0b26edf3f5b41a78d751489faa471b343c307ec2c023d660b7b39ce3673", Pod:"nginx-deployment-6d5f899847-hc7hg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calieff4b84e7fd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:02:49.803868 env[1131]: 2024-04-12 19:02:49.676 [INFO][3064] k8s.go 585: Cleaning up netns ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Apr 12 19:02:49.803868 env[1131]: 2024-04-12 19:02:49.676 [INFO][3064] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" iface="eth0" netns="" Apr 12 19:02:49.803868 env[1131]: 2024-04-12 19:02:49.676 [INFO][3064] k8s.go 592: Releasing IP address(es) ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Apr 12 19:02:49.803868 env[1131]: 2024-04-12 19:02:49.676 [INFO][3064] utils.go 188: Calico CNI releasing IP address ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Apr 12 19:02:49.803868 env[1131]: 2024-04-12 19:02:49.733 [INFO][3072] ipam_plugin.go 415: Releasing address using handleID ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" HandleID="k8s-pod-network.1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Workload="10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0" Apr 12 19:02:49.803868 env[1131]: 2024-04-12 19:02:49.734 [INFO][3072] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:02:49.803868 env[1131]: 2024-04-12 19:02:49.734 [INFO][3072] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:02:49.803868 env[1131]: 2024-04-12 19:02:49.792 [WARNING][3072] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" HandleID="k8s-pod-network.1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Workload="10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0" Apr 12 19:02:49.803868 env[1131]: 2024-04-12 19:02:49.793 [INFO][3072] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" HandleID="k8s-pod-network.1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Workload="10.128.0.26-k8s-nginx--deployment--6d5f899847--hc7hg-eth0" Apr 12 19:02:49.803868 env[1131]: 2024-04-12 19:02:49.799 [INFO][3072] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:02:49.803868 env[1131]: 2024-04-12 19:02:49.802 [INFO][3064] k8s.go 598: Teardown processing complete. ContainerID="1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a" Apr 12 19:02:49.805005 env[1131]: time="2024-04-12T19:02:49.804943424Z" level=info msg="TearDown network for sandbox \"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\" successfully" Apr 12 19:02:49.805931 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.806077 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.824487 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.824754 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.833016 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.839978 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.857158 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.857469 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.874163 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.874545 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.875957 env[1131]: time="2024-04-12T19:02:49.875854293Z" level=info msg="RemovePodSandbox \"1789b323e4e0f3e52b331030f3be91384e3f6b21792e16dd288e13f2ec169f3a\" returns successfully" Apr 12 19:02:49.877642 env[1131]: time="2024-04-12T19:02:49.877595744Z" level=info msg="StopPodSandbox for \"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\"" Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.892382 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.892651 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.906206 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.906645 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.919605 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.919892 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.940128 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.940414 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.940458 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.954810 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.954999 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.968048 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.968443 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.984010 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.984258 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.996794 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.997067 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.009027 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.024661 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.024940 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.025008 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.040665 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.040965 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.055672 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.063258 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.063624 env[1131]: 2024-04-12 19:02:49.979 [WARNING][3093] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.26-k8s-csi--node--driver--7mwbm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f39ba5a1-f691-4b08-a934-e09b8435cf50", ResourceVersion:"1073", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.26", ContainerID:"64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338", Pod:"csi-node-driver-7mwbm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie365d5aef47", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:02:50.063624 env[1131]: 2024-04-12 19:02:49.979 [INFO][3093] k8s.go 585: Cleaning up netns ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Apr 12 19:02:50.063624 env[1131]: 2024-04-12 19:02:49.979 [INFO][3093] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" iface="eth0" netns="" Apr 12 19:02:50.063624 env[1131]: 2024-04-12 19:02:49.979 [INFO][3093] k8s.go 592: Releasing IP address(es) ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Apr 12 19:02:50.063624 env[1131]: 2024-04-12 19:02:49.980 [INFO][3093] utils.go 188: Calico CNI releasing IP address ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Apr 12 19:02:50.063624 env[1131]: 2024-04-12 19:02:50.036 [INFO][3099] ipam_plugin.go 415: Releasing address using handleID ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" HandleID="k8s-pod-network.448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Workload="10.128.0.26-k8s-csi--node--driver--7mwbm-eth0" Apr 12 19:02:50.063624 env[1131]: 2024-04-12 19:02:50.037 [INFO][3099] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:02:50.063624 env[1131]: 2024-04-12 19:02:50.037 [INFO][3099] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:02:50.063624 env[1131]: 2024-04-12 19:02:50.051 [WARNING][3099] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" HandleID="k8s-pod-network.448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Workload="10.128.0.26-k8s-csi--node--driver--7mwbm-eth0" Apr 12 19:02:50.063624 env[1131]: 2024-04-12 19:02:50.052 [INFO][3099] ipam_plugin.go 443: Releasing address using workloadID ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" HandleID="k8s-pod-network.448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Workload="10.128.0.26-k8s-csi--node--driver--7mwbm-eth0" Apr 12 19:02:50.063624 env[1131]: 2024-04-12 19:02:50.055 [INFO][3099] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:02:50.063624 env[1131]: 2024-04-12 19:02:50.061 [INFO][3093] k8s.go 598: Teardown processing complete. ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Apr 12 19:02:50.063624 env[1131]: time="2024-04-12T19:02:50.063107358Z" level=info msg="TearDown network for sandbox \"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\" successfully" Apr 12 19:02:50.063624 env[1131]: time="2024-04-12T19:02:50.063164511Z" level=info msg="StopPodSandbox for \"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\" returns successfully" Apr 12 19:02:50.064803 env[1131]: time="2024-04-12T19:02:50.064309406Z" level=info msg="RemovePodSandbox for \"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\"" Apr 12 19:02:50.064803 env[1131]: time="2024-04-12T19:02:50.064362792Z" level=info msg="Forcibly stopping sandbox \"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\"" Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.075477 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.075692 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.075740 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.086071 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.086312 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.097367 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.103004 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.103244 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.115796 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.116093 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.128061 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.128726 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.141033 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.141383 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.160323 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.160661 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.160709 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.172994 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.173229 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.184722 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.185040 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.201826 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.202126 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.202182 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.213389 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.219098 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.219419 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.230613 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.230794 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.241881 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.242194 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.253011 env[1131]: 2024-04-12 19:02:50.169 [WARNING][3120] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.26-k8s-csi--node--driver--7mwbm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f39ba5a1-f691-4b08-a934-e09b8435cf50", ResourceVersion:"1073", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 1, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.26", ContainerID:"64823d58dd15102db5e86ed6808bb536c993e707235468a74a955bbee20dc338", Pod:"csi-node-driver-7mwbm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie365d5aef47", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:02:50.253011 env[1131]: 2024-04-12 19:02:50.170 [INFO][3120] k8s.go 585: Cleaning up netns ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Apr 12 19:02:50.253011 env[1131]: 2024-04-12 19:02:50.170 [INFO][3120] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" iface="eth0" netns="" Apr 12 19:02:50.253011 env[1131]: 2024-04-12 19:02:50.170 [INFO][3120] k8s.go 592: Releasing IP address(es) ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Apr 12 19:02:50.253011 env[1131]: 2024-04-12 19:02:50.170 [INFO][3120] utils.go 188: Calico CNI releasing IP address ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Apr 12 19:02:50.253011 env[1131]: 2024-04-12 19:02:50.224 [INFO][3126] ipam_plugin.go 415: Releasing address using handleID ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" HandleID="k8s-pod-network.448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Workload="10.128.0.26-k8s-csi--node--driver--7mwbm-eth0" Apr 12 19:02:50.253011 env[1131]: 2024-04-12 19:02:50.225 [INFO][3126] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:02:50.253011 env[1131]: 2024-04-12 19:02:50.225 [INFO][3126] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:02:50.253011 env[1131]: 2024-04-12 19:02:50.243 [WARNING][3126] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" HandleID="k8s-pod-network.448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Workload="10.128.0.26-k8s-csi--node--driver--7mwbm-eth0" Apr 12 19:02:50.253011 env[1131]: 2024-04-12 19:02:50.243 [INFO][3126] ipam_plugin.go 443: Releasing address using workloadID ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" HandleID="k8s-pod-network.448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Workload="10.128.0.26-k8s-csi--node--driver--7mwbm-eth0" Apr 12 19:02:50.253011 env[1131]: 2024-04-12 19:02:50.248 [INFO][3126] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:02:50.253011 env[1131]: 2024-04-12 19:02:50.251 [INFO][3120] k8s.go 598: Teardown processing complete. ContainerID="448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042" Apr 12 19:02:50.254131 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.254192 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.254701 env[1131]: time="2024-04-12T19:02:50.254623161Z" level=info msg="TearDown network for sandbox \"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\" successfully" Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.264533 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.264730 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.276834 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.277075 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.287455 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.287682 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.298619 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.298820 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.299470 env[1131]: time="2024-04-12T19:02:50.299398852Z" level=info msg="RemovePodSandbox \"448ecb93bca3ef0a38c5a336649536e1764789a4438577e37964b9f2be8f4042\" returns successfully" Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.309094 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.309341 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.322061 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.322286 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.331538 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.331721 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.344154 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.344402 kernel: Failed to create system directory nfs4 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:49.705000 audit[3070]: AVC avc: denied { confidentiality } for pid=3070 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.355718 kernel: Failed to create system directory nfs4 Apr 12 19:02:50.389912 kubelet[1521]: E0412 19:02:50.389800 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:50.516436 kernel: NFS: Registering the id_resolver key type Apr 12 19:02:50.516640 kernel: Key type id_resolver registered Apr 12 19:02:50.516689 kernel: Key type id_legacy registered Apr 12 19:02:49.705000 audit[3070]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fa58633a010 a1=208ac4 a2=5648f873a2b0 a3=5 items=0 ppid=9 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:49.705000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.552903 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.553109 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.553150 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.563451 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.563654 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.574194 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.574440 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.579947 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.590192 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.590411 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.595495 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.602631 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.607292 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.613353 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.618709 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.623925 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.630218 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.637892 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.643678 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.651286 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.656751 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.662841 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.668344 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.674343 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.679861 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.537000 audit[3132]: AVC avc: denied { confidentiality } for pid=3132 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:02:50.692301 kernel: Failed to create system directory rpcgss Apr 12 19:02:50.537000 audit[3132]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7ff6446b9010 a1=70c3c a2=564247c0b2b0 a3=5 items=0 ppid=9 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:50.537000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Apr 12 19:02:50.733934 nfsidmap[3141]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Apr 12 19:02:50.747627 nfsidmap[3142]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Apr 12 19:02:50.764000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2603 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 19:02:50.764000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2603 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 19:02:50.764000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2603 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 19:02:50.764000 audit[1261]: AVC avc: denied { watch_reads } for pid=1261 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2603 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 19:02:50.764000 audit[1261]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55dff62a2350 a2=10 a3=5477596803f3deba items=0 ppid=1 pid=1261 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:50.764000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 19:02:50.764000 audit[1261]: AVC avc: denied { watch_reads } for pid=1261 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2603 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 19:02:50.764000 audit[1261]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55dff62a2350 a2=10 a3=5477596803f3deba items=0 ppid=1 pid=1261 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:50.764000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 19:02:50.764000 audit[1261]: AVC avc: denied { watch_reads } for pid=1261 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2603 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 19:02:50.764000 audit[1261]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55dff62a2350 a2=10 a3=5477596803f3deba items=0 ppid=1 pid=1261 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:50.764000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 19:02:50.833976 env[1131]: time="2024-04-12T19:02:50.833668572Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:304b5b1e-923a-4041-b6f6-5d20b02ff68e,Namespace:default,Attempt:0,}" Apr 12 19:02:51.030493 systemd-networkd[1016]: cali5ec59c6bf6e: Link UP Apr 12 19:02:51.037463 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 19:02:51.046367 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Apr 12 19:02:51.046236 systemd-networkd[1016]: cali5ec59c6bf6e: Gained carrier Apr 12 19:02:51.059378 env[1131]: 2024-04-12 19:02:50.923 [INFO][3144] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.26-k8s-test--pod--1-eth0 default 304b5b1e-923a-4041-b6f6-5d20b02ff68e 1176 0 2024-04-12 19:02:31 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.26 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.26-k8s-test--pod--1-" Apr 12 19:02:51.059378 env[1131]: 2024-04-12 19:02:50.923 [INFO][3144] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.26-k8s-test--pod--1-eth0" Apr 12 19:02:51.059378 env[1131]: 2024-04-12 19:02:50.964 [INFO][3155] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27" HandleID="k8s-pod-network.26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27" Workload="10.128.0.26-k8s-test--pod--1-eth0" Apr 12 19:02:51.059378 env[1131]: 2024-04-12 19:02:50.981 [INFO][3155] ipam_plugin.go 268: Auto assigning IP ContainerID="26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27" HandleID="k8s-pod-network.26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27" Workload="10.128.0.26-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b03e0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.26", "pod":"test-pod-1", "timestamp":"2024-04-12 19:02:50.964879669 +0000 UTC"}, Hostname:"10.128.0.26", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:02:51.059378 env[1131]: 2024-04-12 19:02:50.981 [INFO][3155] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:02:51.059378 env[1131]: 2024-04-12 19:02:50.982 [INFO][3155] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:02:51.059378 env[1131]: 2024-04-12 19:02:50.982 [INFO][3155] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.26' Apr 12 19:02:51.059378 env[1131]: 2024-04-12 19:02:50.984 [INFO][3155] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27" host="10.128.0.26" Apr 12 19:02:51.059378 env[1131]: 2024-04-12 19:02:50.990 [INFO][3155] ipam.go 372: Looking up existing affinities for host host="10.128.0.26" Apr 12 19:02:51.059378 env[1131]: 2024-04-12 19:02:50.996 [INFO][3155] ipam.go 489: Trying affinity for 192.168.27.192/26 host="10.128.0.26" Apr 12 19:02:51.059378 env[1131]: 2024-04-12 19:02:51.001 [INFO][3155] ipam.go 155: Attempting to load block cidr=192.168.27.192/26 host="10.128.0.26" Apr 12 19:02:51.059378 env[1131]: 2024-04-12 19:02:51.006 [INFO][3155] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.27.192/26 host="10.128.0.26" Apr 12 19:02:51.059378 env[1131]: 2024-04-12 19:02:51.006 [INFO][3155] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.27.192/26 handle="k8s-pod-network.26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27" host="10.128.0.26" Apr 12 19:02:51.059378 env[1131]: 2024-04-12 19:02:51.009 [INFO][3155] ipam.go 1682: Creating new handle: k8s-pod-network.26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27 Apr 12 19:02:51.059378 env[1131]: 2024-04-12 19:02:51.013 [INFO][3155] ipam.go 1203: Writing block in order to claim IPs block=192.168.27.192/26 handle="k8s-pod-network.26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27" host="10.128.0.26" Apr 12 19:02:51.059378 env[1131]: 2024-04-12 19:02:51.021 [INFO][3155] ipam.go 1216: Successfully claimed IPs: [192.168.27.196/26] block=192.168.27.192/26 handle="k8s-pod-network.26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27" host="10.128.0.26" Apr 12 19:02:51.059378 env[1131]: 2024-04-12 19:02:51.021 [INFO][3155] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.27.196/26] handle="k8s-pod-network.26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27" host="10.128.0.26" Apr 12 19:02:51.059378 env[1131]: 2024-04-12 19:02:51.021 [INFO][3155] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:02:51.059378 env[1131]: 2024-04-12 19:02:51.021 [INFO][3155] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.27.196/26] IPv6=[] ContainerID="26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27" HandleID="k8s-pod-network.26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27" Workload="10.128.0.26-k8s-test--pod--1-eth0" Apr 12 19:02:51.059378 env[1131]: 2024-04-12 19:02:51.024 [INFO][3144] k8s.go 385: Populated endpoint ContainerID="26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.26-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.26-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"304b5b1e-923a-4041-b6f6-5d20b02ff68e", ResourceVersion:"1176", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 2, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.26", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:02:51.059378 env[1131]: 2024-04-12 19:02:51.024 [INFO][3144] k8s.go 386: Calico CNI using IPs: [192.168.27.196/32] ContainerID="26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.26-k8s-test--pod--1-eth0" Apr 12 19:02:51.061680 env[1131]: 2024-04-12 19:02:51.024 [INFO][3144] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.26-k8s-test--pod--1-eth0" Apr 12 19:02:51.061680 env[1131]: 2024-04-12 19:02:51.048 [INFO][3144] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.26-k8s-test--pod--1-eth0" Apr 12 19:02:51.061680 env[1131]: 2024-04-12 19:02:51.049 [INFO][3144] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.26-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.26-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"304b5b1e-923a-4041-b6f6-5d20b02ff68e", ResourceVersion:"1176", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 2, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.26", ContainerID:"26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"46:96:61:39:33:dc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:02:51.061680 env[1131]: 2024-04-12 19:02:51.057 [INFO][3144] k8s.go 498: Wrote updated endpoint to datastore ContainerID="26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.26-k8s-test--pod--1-eth0" Apr 12 19:02:51.094000 audit[3171]: NETFILTER_CFG table=filter:82 family=2 entries=34 op=nft_register_chain pid=3171 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:02:51.094000 audit[3171]: SYSCALL arch=c000003e syscall=46 success=yes exit=18196 a0=3 a1=7fffd32341d0 a2=0 a3=7fffd32341bc items=0 ppid=2173 pid=3171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:51.094000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:02:51.110336 env[1131]: time="2024-04-12T19:02:51.110079623Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:02:51.112083 env[1131]: time="2024-04-12T19:02:51.111229787Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:02:51.112083 env[1131]: time="2024-04-12T19:02:51.112017804Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:02:51.113154 env[1131]: time="2024-04-12T19:02:51.113017618Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27 pid=3182 runtime=io.containerd.runc.v2 Apr 12 19:02:51.143472 systemd[1]: Started cri-containerd-26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27.scope. Apr 12 19:02:51.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.172000 audit: BPF prog-id=120 op=LOAD Apr 12 19:02:51.173000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.173000 audit[3193]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3182 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:51.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236643036616564386461663764383662316136386236393562663134 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3182 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:51.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236643036616564386461663764383662316136386236393562663134 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit: BPF prog-id=121 op=LOAD Apr 12 19:02:51.174000 audit[3193]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00027cbe0 items=0 ppid=3182 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:51.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236643036616564386461663764383662316136386236393562663134 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit: BPF prog-id=122 op=LOAD Apr 12 19:02:51.174000 audit[3193]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00027cc28 items=0 ppid=3182 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:51.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236643036616564386461663764383662316136386236393562663134 Apr 12 19:02:51.174000 audit: BPF prog-id=122 op=UNLOAD Apr 12 19:02:51.174000 audit: BPF prog-id=121 op=UNLOAD Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.174000 audit: BPF prog-id=123 op=LOAD Apr 12 19:02:51.174000 audit[3193]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00027d038 items=0 ppid=3182 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:51.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236643036616564386461663764383662316136386236393562663134 Apr 12 19:02:51.219049 env[1131]: time="2024-04-12T19:02:51.218976892Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:304b5b1e-923a-4041-b6f6-5d20b02ff68e,Namespace:default,Attempt:0,} returns sandbox id \"26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27\"" Apr 12 19:02:51.222570 env[1131]: time="2024-04-12T19:02:51.222456474Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 19:02:51.390568 kubelet[1521]: E0412 19:02:51.390503 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:51.450854 env[1131]: time="2024-04-12T19:02:51.450745647Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:51.455076 env[1131]: time="2024-04-12T19:02:51.454944199Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:51.458540 env[1131]: time="2024-04-12T19:02:51.458466313Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:51.461593 env[1131]: time="2024-04-12T19:02:51.461523097Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:02:51.462529 env[1131]: time="2024-04-12T19:02:51.462478468Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83\"" Apr 12 19:02:51.466113 env[1131]: time="2024-04-12T19:02:51.466053924Z" level=info msg="CreateContainer within sandbox \"26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27\" for container &ContainerMetadata{Name:test,Attempt:0,}" Apr 12 19:02:51.492821 env[1131]: time="2024-04-12T19:02:51.492716695Z" level=info msg="CreateContainer within sandbox \"26d06aed8daf7d86b1a68b695bf14379fff4575d098b12ef97c3cbc784fd4b27\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"00b9e9b0ce3e86368eb5d9ec98da12adf78723a7fe56c7b21fd280f8cc3131fb\"" Apr 12 19:02:51.493888 env[1131]: time="2024-04-12T19:02:51.493763051Z" level=info msg="StartContainer for \"00b9e9b0ce3e86368eb5d9ec98da12adf78723a7fe56c7b21fd280f8cc3131fb\"" Apr 12 19:02:51.527302 systemd[1]: Started cri-containerd-00b9e9b0ce3e86368eb5d9ec98da12adf78723a7fe56c7b21fd280f8cc3131fb.scope. Apr 12 19:02:51.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.558000 audit: BPF prog-id=124 op=LOAD Apr 12 19:02:51.560000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.560000 audit[3224]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3182 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:51.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030623965396230636533653836333638656235643965633938646131 Apr 12 19:02:51.560000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.560000 audit[3224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3182 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:51.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030623965396230636533653836333638656235643965633938646131 Apr 12 19:02:51.560000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.560000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.560000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.560000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.560000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.560000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.560000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.560000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.560000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.560000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.560000 audit: BPF prog-id=125 op=LOAD Apr 12 19:02:51.560000 audit[3224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032fbb0 items=0 ppid=3182 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:51.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030623965396230636533653836333638656235643965633938646131 Apr 12 19:02:51.561000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.561000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.561000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.561000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.561000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.561000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.561000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.561000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.561000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.561000 audit: BPF prog-id=126 op=LOAD Apr 12 19:02:51.561000 audit[3224]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032fbf8 items=0 ppid=3182 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:51.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030623965396230636533653836333638656235643965633938646131 Apr 12 19:02:51.561000 audit: BPF prog-id=126 op=UNLOAD Apr 12 19:02:51.561000 audit: BPF prog-id=125 op=UNLOAD Apr 12 19:02:51.561000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.561000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.561000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.561000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.561000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.561000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.561000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.561000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.561000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.561000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:02:51.561000 audit: BPF prog-id=127 op=LOAD Apr 12 19:02:51.561000 audit[3224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000370008 items=0 ppid=3182 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:02:51.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030623965396230636533653836333638656235643965633938646131 Apr 12 19:02:51.597764 env[1131]: time="2024-04-12T19:02:51.597677783Z" level=info msg="StartContainer for \"00b9e9b0ce3e86368eb5d9ec98da12adf78723a7fe56c7b21fd280f8cc3131fb\" returns successfully" Apr 12 19:02:51.802382 kubelet[1521]: I0412 19:02:51.802016 1521 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=20.560887805 podStartE2EDuration="20.801939216s" podCreationTimestamp="2024-04-12 19:02:31 +0000 UTC" firstStartedPulling="2024-04-12 19:02:51.221962693 +0000 UTC m=+62.446419360" lastFinishedPulling="2024-04-12 19:02:51.463014122 +0000 UTC m=+62.687470771" observedRunningTime="2024-04-12 19:02:51.801505523 +0000 UTC m=+63.025962194" watchObservedRunningTime="2024-04-12 19:02:51.801939216 +0000 UTC m=+63.026395889" Apr 12 19:02:52.390999 kubelet[1521]: E0412 19:02:52.390918 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:52.914398 systemd-networkd[1016]: cali5ec59c6bf6e: Gained IPv6LL Apr 12 19:02:53.391628 kubelet[1521]: E0412 19:02:53.391523 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:54.392466 kubelet[1521]: E0412 19:02:54.392393 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:55.393321 kubelet[1521]: E0412 19:02:55.393228 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:56.394009 kubelet[1521]: E0412 19:02:56.393939 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:57.394623 kubelet[1521]: E0412 19:02:57.394560 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:58.395203 kubelet[1521]: E0412 19:02:58.395126 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:02:59.396348 kubelet[1521]: E0412 19:02:59.396282 1521 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"