Apr 12 18:49:42.115604 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024
Apr 12 18:49:42.115647 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf
Apr 12 18:49:42.115667 kernel: BIOS-provided physical RAM map:
Apr 12 18:49:42.115681 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved
Apr 12 18:49:42.115693 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable
Apr 12 18:49:42.115707 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved
Apr 12 18:49:42.115727 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable
Apr 12 18:49:42.115741 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved
Apr 12 18:49:42.115755 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable
Apr 12 18:49:42.115768 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved
Apr 12 18:49:42.115782 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data
Apr 12 18:49:42.115796 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS
Apr 12 18:49:42.115809 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable
Apr 12 18:49:42.115823 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved
Apr 12 18:49:42.115844 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable
Apr 12 18:49:42.115860 kernel: NX (Execute Disable) protection: active
Apr 12 18:49:42.115875 kernel: efi: EFI v2.70 by EDK II
Apr 12 18:49:42.115890 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9ca000 MEMATTR=0xbe36f198 RNG=0xbfb73018 TPMEventLog=0xbe2b3018 
Apr 12 18:49:42.115905 kernel: random: crng init done
Apr 12 18:49:42.115920 kernel: SMBIOS 2.4 present.
Apr 12 18:49:42.115935 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Apr 12 18:49:42.115950 kernel: Hypervisor detected: KVM
Apr 12 18:49:42.115968 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00
Apr 12 18:49:42.115983 kernel: kvm-clock: cpu 0, msr 172191001, primary cpu clock
Apr 12 18:49:42.115997 kernel: kvm-clock: using sched offset of 13531502109 cycles
Apr 12 18:49:42.116014 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns
Apr 12 18:49:42.116058 kernel: tsc: Detected 2299.998 MHz processor
Apr 12 18:49:42.116075 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
Apr 12 18:49:42.116100 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable
Apr 12 18:49:42.116115 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000
Apr 12 18:49:42.116131 kernel: x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
Apr 12 18:49:42.116146 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000
Apr 12 18:49:42.116165 kernel: Using GB pages for direct mapping
Apr 12 18:49:42.116181 kernel: Secure boot disabled
Apr 12 18:49:42.116196 kernel: ACPI: Early table checksum verification disabled
Apr 12 18:49:42.116210 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google)
Apr 12 18:49:42.116226 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001      01000013)
Apr 12 18:49:42.116241 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001)
Apr 12 18:49:42.116256 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001)
Apr 12 18:49:42.116272 kernel: ACPI: FACS 0x00000000BFBF2000 000040
Apr 12 18:49:42.116298 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217)
Apr 12 18:49:42.116314 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE          00000001 GOOG 00000001)
Apr 12 18:49:42.116331 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001)
Apr 12 18:49:42.116347 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001)
Apr 12 18:49:42.116365 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001)
Apr 12 18:49:42.116381 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001)
Apr 12 18:49:42.116401 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3]
Apr 12 18:49:42.116418 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63]
Apr 12 18:49:42.116434 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f]
Apr 12 18:49:42.116451 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315]
Apr 12 18:49:42.116467 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033]
Apr 12 18:49:42.116483 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7]
Apr 12 18:49:42.116500 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075]
Apr 12 18:49:42.116517 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f]
Apr 12 18:49:42.116533 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027]
Apr 12 18:49:42.116553 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0
Apr 12 18:49:42.116569 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0
Apr 12 18:49:42.116585 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff]
Apr 12 18:49:42.116602 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff]
Apr 12 18:49:42.116618 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff]
Apr 12 18:49:42.116635 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff]
Apr 12 18:49:42.116652 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff]
Apr 12 18:49:42.116668 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff]
Apr 12 18:49:42.116685 kernel: Zone ranges:
Apr 12 18:49:42.116705 kernel:   DMA      [mem 0x0000000000001000-0x0000000000ffffff]
Apr 12 18:49:42.116721 kernel:   DMA32    [mem 0x0000000001000000-0x00000000ffffffff]
Apr 12 18:49:42.116738 kernel:   Normal   [mem 0x0000000100000000-0x000000021fffffff]
Apr 12 18:49:42.116754 kernel: Movable zone start for each node
Apr 12 18:49:42.116770 kernel: Early memory node ranges
Apr 12 18:49:42.116786 kernel:   node   0: [mem 0x0000000000001000-0x0000000000054fff]
Apr 12 18:49:42.116803 kernel:   node   0: [mem 0x0000000000060000-0x0000000000097fff]
Apr 12 18:49:42.116819 kernel:   node   0: [mem 0x0000000000100000-0x00000000bf8ecfff]
Apr 12 18:49:42.116835 kernel:   node   0: [mem 0x00000000bfbff000-0x00000000bffdffff]
Apr 12 18:49:42.116855 kernel:   node   0: [mem 0x0000000100000000-0x000000021fffffff]
Apr 12 18:49:42.116871 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff]
Apr 12 18:49:42.116888 kernel: On node 0, zone DMA: 1 pages in unavailable ranges
Apr 12 18:49:42.116904 kernel: On node 0, zone DMA: 11 pages in unavailable ranges
Apr 12 18:49:42.116920 kernel: On node 0, zone DMA: 104 pages in unavailable ranges
Apr 12 18:49:42.116937 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges
Apr 12 18:49:42.116953 kernel: On node 0, zone Normal: 32 pages in unavailable ranges
Apr 12 18:49:42.116969 kernel: ACPI: PM-Timer IO Port: 0xb008
Apr 12 18:49:42.116986 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1])
Apr 12 18:49:42.117006 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23
Apr 12 18:49:42.117022 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level)
Apr 12 18:49:42.117057 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
Apr 12 18:49:42.117070 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level)
Apr 12 18:49:42.117084 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level)
Apr 12 18:49:42.117099 kernel: ACPI: Using ACPI (MADT) for SMP configuration information
Apr 12 18:49:42.117113 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs
Apr 12 18:49:42.117127 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices
Apr 12 18:49:42.117141 kernel: Booting paravirtualized kernel on KVM
Apr 12 18:49:42.117160 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
Apr 12 18:49:42.117175 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1
Apr 12 18:49:42.117190 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576
Apr 12 18:49:42.117206 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152
Apr 12 18:49:42.117220 kernel: pcpu-alloc: [0] 0 1 
Apr 12 18:49:42.117233 kernel: kvm-guest: PV spinlocks enabled
Apr 12 18:49:42.117248 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear)
Apr 12 18:49:42.117262 kernel: Built 1 zonelists, mobility grouping on.  Total pages: 1931256
Apr 12 18:49:42.117276 kernel: Policy zone: Normal
Apr 12 18:49:42.117298 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf
Apr 12 18:49:42.117314 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space.
Apr 12 18:49:42.117329 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear)
Apr 12 18:49:42.117345 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear)
Apr 12 18:49:42.117360 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off
Apr 12 18:49:42.117375 kernel: Memory: 7534432K/7860584K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 325892K reserved, 0K cma-reserved)
Apr 12 18:49:42.117391 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
Apr 12 18:49:42.117406 kernel: Kernel/User page tables isolation: enabled
Apr 12 18:49:42.117425 kernel: ftrace: allocating 34508 entries in 135 pages
Apr 12 18:49:42.117440 kernel: ftrace: allocated 135 pages with 4 groups
Apr 12 18:49:42.117455 kernel: rcu: Hierarchical RCU implementation.
Apr 12 18:49:42.117471 kernel: rcu:         RCU event tracing is enabled.
Apr 12 18:49:42.117487 kernel: rcu:         RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2.
Apr 12 18:49:42.117502 kernel:         Rude variant of Tasks RCU enabled.
Apr 12 18:49:42.117517 kernel:         Tracing variant of Tasks RCU enabled.
Apr 12 18:49:42.117533 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Apr 12 18:49:42.117548 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2
Apr 12 18:49:42.117567 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16
Apr 12 18:49:42.117595 kernel: Console: colour dummy device 80x25
Apr 12 18:49:42.117611 kernel: printk: console [ttyS0] enabled
Apr 12 18:49:42.117630 kernel: ACPI: Core revision 20210730
Apr 12 18:49:42.117646 kernel: APIC: Switch to symmetric I/O mode setup
Apr 12 18:49:42.117663 kernel: x2apic enabled
Apr 12 18:49:42.117679 kernel: Switched APIC routing to physical x2apic.
Apr 12 18:49:42.117694 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1
Apr 12 18:49:42.117711 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns
Apr 12 18:49:42.117728 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998)
Apr 12 18:49:42.117747 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024
Apr 12 18:49:42.117763 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4
Apr 12 18:49:42.117780 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Apr 12 18:49:42.117795 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit
Apr 12 18:49:42.117811 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall
Apr 12 18:49:42.117827 kernel: Spectre V2 : Mitigation: IBRS
Apr 12 18:49:42.117848 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
Apr 12 18:49:42.117864 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT
Apr 12 18:49:42.117880 kernel: RETBleed: Mitigation: IBRS
Apr 12 18:49:42.117896 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier
Apr 12 18:49:42.117913 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl
Apr 12 18:49:42.117929 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp
Apr 12 18:49:42.117945 kernel: MDS: Mitigation: Clear CPU buffers
Apr 12 18:49:42.117961 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode
Apr 12 18:49:42.117978 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Apr 12 18:49:42.117997 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Apr 12 18:49:42.118013 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Apr 12 18:49:42.118050 kernel: x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
Apr 12 18:49:42.118067 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format.
Apr 12 18:49:42.118083 kernel: Freeing SMP alternatives memory: 32K
Apr 12 18:49:42.118100 kernel: pid_max: default: 32768 minimum: 301
Apr 12 18:49:42.118116 kernel: LSM: Security Framework initializing
Apr 12 18:49:42.118132 kernel: SELinux:  Initializing.
Apr 12 18:49:42.118148 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear)
Apr 12 18:49:42.118175 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear)
Apr 12 18:49:42.118195 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0)
Apr 12 18:49:42.118212 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only.
Apr 12 18:49:42.118227 kernel: signal: max sigframe size: 1776
Apr 12 18:49:42.118244 kernel: rcu: Hierarchical SRCU implementation.
Apr 12 18:49:42.118259 kernel: NMI watchdog: Perf NMI watchdog permanently disabled
Apr 12 18:49:42.118275 kernel: smp: Bringing up secondary CPUs ...
Apr 12 18:49:42.118291 kernel: x86: Booting SMP configuration:
Apr 12 18:49:42.118307 kernel: .... node  #0, CPUs:      #1
Apr 12 18:49:42.118327 kernel: kvm-clock: cpu 1, msr 172191041, secondary cpu clock
Apr 12 18:49:42.118344 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details.
Apr 12 18:49:42.118361 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details.
Apr 12 18:49:42.118377 kernel: smp: Brought up 1 node, 2 CPUs
Apr 12 18:49:42.118392 kernel: smpboot: Max logical packages: 1
Apr 12 18:49:42.118408 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS)
Apr 12 18:49:42.118424 kernel: devtmpfs: initialized
Apr 12 18:49:42.118438 kernel: x86/mm: Memory block size: 128MB
Apr 12 18:49:42.118454 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes)
Apr 12 18:49:42.118474 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Apr 12 18:49:42.118490 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear)
Apr 12 18:49:42.118505 kernel: pinctrl core: initialized pinctrl subsystem
Apr 12 18:49:42.118521 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
Apr 12 18:49:42.118536 kernel: audit: initializing netlink subsys (disabled)
Apr 12 18:49:42.118550 kernel: audit: type=2000 audit(1712947780.892:1): state=initialized audit_enabled=0 res=1
Apr 12 18:49:42.118564 kernel: thermal_sys: Registered thermal governor 'step_wise'
Apr 12 18:49:42.118579 kernel: thermal_sys: Registered thermal governor 'user_space'
Apr 12 18:49:42.118598 kernel: cpuidle: using governor menu
Apr 12 18:49:42.118615 kernel: ACPI: bus type PCI registered
Apr 12 18:49:42.118631 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Apr 12 18:49:42.118646 kernel: dca service started, version 1.12.1
Apr 12 18:49:42.118663 kernel: PCI: Using configuration type 1 for base access
Apr 12 18:49:42.118681 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible.
Apr 12 18:49:42.118698 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages
Apr 12 18:49:42.118715 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages
Apr 12 18:49:42.118731 kernel: ACPI: Added _OSI(Module Device)
Apr 12 18:49:42.118747 kernel: ACPI: Added _OSI(Processor Device)
Apr 12 18:49:42.118767 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Apr 12 18:49:42.118783 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Apr 12 18:49:42.118800 kernel: ACPI: Added _OSI(Linux-Dell-Video)
Apr 12 18:49:42.118817 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
Apr 12 18:49:42.118834 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
Apr 12 18:49:42.118850 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded
Apr 12 18:49:42.118867 kernel: ACPI: Interpreter enabled
Apr 12 18:49:42.118883 kernel: ACPI: PM: (supports S0 S3 S5)
Apr 12 18:49:42.118899 kernel: ACPI: Using IOAPIC for interrupt routing
Apr 12 18:49:42.118919 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
Apr 12 18:49:42.118936 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F
Apr 12 18:49:42.118953 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
Apr 12 18:49:42.125267 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3]
Apr 12 18:49:42.125459 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge.
Apr 12 18:49:42.125483 kernel: PCI host bridge to bus 0000:00
Apr 12 18:49:42.125651 kernel: pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
Apr 12 18:49:42.125822 kernel: pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
Apr 12 18:49:42.125978 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
Apr 12 18:49:42.126158 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window]
Apr 12 18:49:42.126308 kernel: pci_bus 0000:00: root bus resource [bus 00-ff]
Apr 12 18:49:42.126496 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000
Apr 12 18:49:42.126678 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100
Apr 12 18:49:42.126862 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000
Apr 12 18:49:42.132096 kernel: pci 0000:00:01.3: quirk: [io  0xb000-0xb03f] claimed by PIIX4 ACPI
Apr 12 18:49:42.132344 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000
Apr 12 18:49:42.132510 kernel: pci 0000:00:03.0: reg 0x10: [io  0xc040-0xc07f]
Apr 12 18:49:42.132671 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f]
Apr 12 18:49:42.132847 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000
Apr 12 18:49:42.133004 kernel: pci 0000:00:04.0: reg 0x10: [io  0xc000-0xc03f]
Apr 12 18:49:42.133192 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f]
Apr 12 18:49:42.133354 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00
Apr 12 18:49:42.133510 kernel: pci 0000:00:05.0: reg 0x10: [io  0xc080-0xc09f]
Apr 12 18:49:42.133666 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f]
Apr 12 18:49:42.133686 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10
Apr 12 18:49:42.133704 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10
Apr 12 18:49:42.133721 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11
Apr 12 18:49:42.133743 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11
Apr 12 18:49:42.133759 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9
Apr 12 18:49:42.133776 kernel: iommu: Default domain type: Translated 
Apr 12 18:49:42.133793 kernel: iommu: DMA domain TLB invalidation policy: lazy mode 
Apr 12 18:49:42.133810 kernel: vgaarb: loaded
Apr 12 18:49:42.133825 kernel: pps_core: LinuxPPS API ver. 1 registered
Apr 12 18:49:42.133839 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Apr 12 18:49:42.133853 kernel: PTP clock support registered
Apr 12 18:49:42.133868 kernel: Registered efivars operations
Apr 12 18:49:42.133887 kernel: PCI: Using ACPI for IRQ routing
Apr 12 18:49:42.133901 kernel: PCI: pci_cache_line_size set to 64 bytes
Apr 12 18:49:42.133916 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff]
Apr 12 18:49:42.133932 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff]
Apr 12 18:49:42.133948 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff]
Apr 12 18:49:42.133964 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff]
Apr 12 18:49:42.133980 kernel: clocksource: Switched to clocksource kvm-clock
Apr 12 18:49:42.133997 kernel: VFS: Disk quotas dquot_6.6.0
Apr 12 18:49:42.134015 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Apr 12 18:49:42.134056 kernel: pnp: PnP ACPI init
Apr 12 18:49:42.134071 kernel: pnp: PnP ACPI: found 7 devices
Apr 12 18:49:42.134087 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
Apr 12 18:49:42.134102 kernel: NET: Registered PF_INET protocol family
Apr 12 18:49:42.134119 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear)
Apr 12 18:49:42.134136 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear)
Apr 12 18:49:42.134152 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Apr 12 18:49:42.134169 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear)
Apr 12 18:49:42.134185 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear)
Apr 12 18:49:42.134207 kernel: TCP: Hash tables configured (established 65536 bind 65536)
Apr 12 18:49:42.134223 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear)
Apr 12 18:49:42.134239 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear)
Apr 12 18:49:42.134254 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
Apr 12 18:49:42.134270 kernel: NET: Registered PF_XDP protocol family
Apr 12 18:49:42.134456 kernel: pci_bus 0000:00: resource 4 [io  0x0000-0x0cf7 window]
Apr 12 18:49:42.134602 kernel: pci_bus 0000:00: resource 5 [io  0x0d00-0xffff window]
Apr 12 18:49:42.134748 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window]
Apr 12 18:49:42.134893 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window]
Apr 12 18:49:42.135085 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers
Apr 12 18:49:42.135108 kernel: PCI: CLS 0 bytes, default 64
Apr 12 18:49:42.135125 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
Apr 12 18:49:42.135142 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB)
Apr 12 18:49:42.135158 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer
Apr 12 18:49:42.135175 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns
Apr 12 18:49:42.135191 kernel: clocksource: Switched to clocksource tsc
Apr 12 18:49:42.135212 kernel: Initialise system trusted keyrings
Apr 12 18:49:42.135228 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0
Apr 12 18:49:42.135244 kernel: Key type asymmetric registered
Apr 12 18:49:42.135260 kernel: Asymmetric key parser 'x509' registered
Apr 12 18:49:42.135276 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249)
Apr 12 18:49:42.135293 kernel: io scheduler mq-deadline registered
Apr 12 18:49:42.135309 kernel: io scheduler kyber registered
Apr 12 18:49:42.135325 kernel: io scheduler bfq registered
Apr 12 18:49:42.135343 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00
Apr 12 18:49:42.135363 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11
Apr 12 18:49:42.135523 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver
Apr 12 18:49:42.135546 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10
Apr 12 18:49:42.135706 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver
Apr 12 18:49:42.135727 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10
Apr 12 18:49:42.135885 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver
Apr 12 18:49:42.135906 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
Apr 12 18:49:42.135925 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
Apr 12 18:49:42.135942 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A
Apr 12 18:49:42.135965 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A
Apr 12 18:49:42.135984 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A
Apr 12 18:49:42.136171 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0)
Apr 12 18:49:42.136197 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12
Apr 12 18:49:42.136215 kernel: i8042: Warning: Keylock active
Apr 12 18:49:42.136232 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1
Apr 12 18:49:42.136250 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12
Apr 12 18:49:42.136404 kernel: rtc_cmos 00:00: RTC can wake from S4
Apr 12 18:49:42.136555 kernel: rtc_cmos 00:00: registered as rtc0
Apr 12 18:49:42.136699 kernel: rtc_cmos 00:00: setting system clock to 2024-04-12T18:49:41 UTC (1712947781)
Apr 12 18:49:42.136890 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram
Apr 12 18:49:42.136913 kernel: intel_pstate: CPU model not supported
Apr 12 18:49:42.136928 kernel: pstore: Registered efi as persistent store backend
Apr 12 18:49:42.136944 kernel: NET: Registered PF_INET6 protocol family
Apr 12 18:49:42.136962 kernel: Segment Routing with IPv6
Apr 12 18:49:42.136979 kernel: In-situ OAM (IOAM) with IPv6
Apr 12 18:49:42.136999 kernel: NET: Registered PF_PACKET protocol family
Apr 12 18:49:42.137015 kernel: Key type dns_resolver registered
Apr 12 18:49:42.137055 kernel: IPI shorthand broadcast: enabled
Apr 12 18:49:42.137071 kernel: sched_clock: Marking stable (745482096, 169364429)->(993356589, -78510064)
Apr 12 18:49:42.137085 kernel: registered taskstats version 1
Apr 12 18:49:42.137099 kernel: Loading compiled-in X.509 certificates
Apr 12 18:49:42.137113 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0
Apr 12 18:49:42.137130 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4'
Apr 12 18:49:42.137146 kernel: Key type .fscrypt registered
Apr 12 18:49:42.137166 kernel: Key type fscrypt-provisioning registered
Apr 12 18:49:42.137181 kernel: pstore: Using crash dump compression: deflate
Apr 12 18:49:42.137196 kernel: ima: Allocated hash algorithm: sha1
Apr 12 18:49:42.137211 kernel: ima: No architecture policies found
Apr 12 18:49:42.137225 kernel: Freeing unused kernel image (initmem) memory: 47440K
Apr 12 18:49:42.137240 kernel: Write protecting the kernel read-only data: 28672k
Apr 12 18:49:42.137255 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K
Apr 12 18:49:42.137270 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K
Apr 12 18:49:42.137290 kernel: Run /init as init process
Apr 12 18:49:42.137306 kernel:   with arguments:
Apr 12 18:49:42.137324 kernel:     /init
Apr 12 18:49:42.137339 kernel:   with environment:
Apr 12 18:49:42.137355 kernel:     HOME=/
Apr 12 18:49:42.137372 kernel:     TERM=linux
Apr 12 18:49:42.137389 kernel:     BOOT_IMAGE=/flatcar/vmlinuz-a
Apr 12 18:49:42.137408 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Apr 12 18:49:42.137433 systemd[1]: Detected virtualization kvm.
Apr 12 18:49:42.137450 systemd[1]: Detected architecture x86-64.
Apr 12 18:49:42.137466 systemd[1]: Running in initrd.
Apr 12 18:49:42.137483 systemd[1]: No hostname configured, using default hostname.
Apr 12 18:49:42.137498 systemd[1]: Hostname set to <localhost>.
Apr 12 18:49:42.137515 systemd[1]: Initializing machine ID from VM UUID.
Apr 12 18:49:42.137532 systemd[1]: Queued start job for default target initrd.target.
Apr 12 18:49:42.137549 systemd[1]: Started systemd-ask-password-console.path.
Apr 12 18:49:42.137570 systemd[1]: Reached target cryptsetup.target.
Apr 12 18:49:42.137588 systemd[1]: Reached target paths.target.
Apr 12 18:49:42.137603 systemd[1]: Reached target slices.target.
Apr 12 18:49:42.137620 systemd[1]: Reached target swap.target.
Apr 12 18:49:42.137636 systemd[1]: Reached target timers.target.
Apr 12 18:49:42.137654 systemd[1]: Listening on iscsid.socket.
Apr 12 18:49:42.137672 systemd[1]: Listening on iscsiuio.socket.
Apr 12 18:49:42.137693 systemd[1]: Listening on systemd-journald-audit.socket.
Apr 12 18:49:42.137710 systemd[1]: Listening on systemd-journald-dev-log.socket.
Apr 12 18:49:42.137728 systemd[1]: Listening on systemd-journald.socket.
Apr 12 18:49:42.137744 systemd[1]: Listening on systemd-networkd.socket.
Apr 12 18:49:42.137761 systemd[1]: Listening on systemd-udevd-control.socket.
Apr 12 18:49:42.137778 systemd[1]: Listening on systemd-udevd-kernel.socket.
Apr 12 18:49:42.137796 systemd[1]: Reached target sockets.target.
Apr 12 18:49:42.137813 systemd[1]: Starting kmod-static-nodes.service...
Apr 12 18:49:42.137830 systemd[1]: Finished network-cleanup.service.
Apr 12 18:49:42.137851 systemd[1]: Starting systemd-fsck-usr.service...
Apr 12 18:49:42.137868 systemd[1]: Starting systemd-journald.service...
Apr 12 18:49:42.137886 systemd[1]: Starting systemd-modules-load.service...
Apr 12 18:49:42.137921 kernel: audit: type=1334 audit(1712947782.106:2): prog-id=6 op=LOAD
Apr 12 18:49:42.137942 systemd[1]: Starting systemd-resolved.service...
Apr 12 18:49:42.137960 systemd[1]: Starting systemd-vconsole-setup.service...
Apr 12 18:49:42.137978 systemd[1]: Finished kmod-static-nodes.service.
Apr 12 18:49:42.137999 systemd[1]: Finished systemd-fsck-usr.service.
Apr 12 18:49:42.138031 systemd-journald[189]: Journal started
Apr 12 18:49:42.138142 systemd-journald[189]: Runtime Journal (/run/log/journal/1f6b6d5bbc164ddbfb9739a5c4130a39) is 8.0M, max 148.8M, 140.8M free.
Apr 12 18:49:42.106000 audit: BPF prog-id=6 op=LOAD
Apr 12 18:49:42.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:42.143818 kernel: audit: type=1130 audit(1712947782.136:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:42.144299 systemd-modules-load[190]: Inserted module 'overlay'
Apr 12 18:49:42.156185 systemd[1]: Started systemd-journald.service.
Apr 12 18:49:42.156223 kernel: audit: type=1130 audit(1712947782.147:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:42.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:42.160697 systemd[1]: Finished systemd-vconsole-setup.service.
Apr 12 18:49:42.177415 kernel: audit: type=1130 audit(1712947782.159:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:42.177455 kernel: audit: type=1130 audit(1712947782.169:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:42.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:42.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:42.172267 systemd[1]: Starting dracut-cmdline-ask.service...
Apr 12 18:49:42.179529 systemd-resolved[191]: Positive Trust Anchors:
Apr 12 18:49:42.179543 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Apr 12 18:49:42.179606 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Apr 12 18:49:42.183401 systemd[1]: Starting systemd-tmpfiles-setup-dev.service...
Apr 12 18:49:42.194265 systemd-resolved[191]: Defaulting to hostname 'linux'.
Apr 12 18:49:42.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:42.197301 systemd[1]: Finished systemd-tmpfiles-setup-dev.service.
Apr 12 18:49:42.197829 systemd[1]: Started systemd-resolved.service.
Apr 12 18:49:42.203101 kernel: audit: type=1130 audit(1712947782.196:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:42.202998 systemd[1]: Reached target nss-lookup.target.
Apr 12 18:49:42.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:42.210168 kernel: audit: type=1130 audit(1712947782.201:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:42.224444 systemd[1]: Finished dracut-cmdline-ask.service.
Apr 12 18:49:42.237317 kernel: audit: type=1130 audit(1712947782.227:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:42.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:42.229540 systemd[1]: Starting dracut-cmdline.service...
Apr 12 18:49:42.243165 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Apr 12 18:49:42.249080 dracut-cmdline[206]: dracut-dracut-053
Apr 12 18:49:42.254655 kernel: Bridge firewalling registered
Apr 12 18:49:42.254691 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf
Apr 12 18:49:42.249448 systemd-modules-load[190]: Inserted module 'br_netfilter'
Apr 12 18:49:42.284064 kernel: SCSI subsystem initialized
Apr 12 18:49:42.303076 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log.
Apr 12 18:49:42.303164 kernel: device-mapper: uevent: version 1.0.3
Apr 12 18:49:42.306075 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com
Apr 12 18:49:42.310010 systemd-modules-load[190]: Inserted module 'dm_multipath'
Apr 12 18:49:42.311486 systemd[1]: Finished systemd-modules-load.service.
Apr 12 18:49:42.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:42.320331 systemd[1]: Starting systemd-sysctl.service...
Apr 12 18:49:42.328163 kernel: audit: type=1130 audit(1712947782.318:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:42.337471 systemd[1]: Finished systemd-sysctl.service.
Apr 12 18:49:42.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:42.353073 kernel: Loading iSCSI transport class v2.0-870.
Apr 12 18:49:42.374079 kernel: iscsi: registered transport (tcp)
Apr 12 18:49:42.401080 kernel: iscsi: registered transport (qla4xxx)
Apr 12 18:49:42.401161 kernel: QLogic iSCSI HBA Driver
Apr 12 18:49:42.445940 systemd[1]: Finished dracut-cmdline.service.
Apr 12 18:49:42.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:42.448279 systemd[1]: Starting dracut-pre-udev.service...
Apr 12 18:49:42.505131 kernel: raid6: avx2x4   gen() 18209 MB/s
Apr 12 18:49:42.522086 kernel: raid6: avx2x4   xor()  8188 MB/s
Apr 12 18:49:42.539080 kernel: raid6: avx2x2   gen() 18143 MB/s
Apr 12 18:49:42.556114 kernel: raid6: avx2x2   xor() 18602 MB/s
Apr 12 18:49:42.573092 kernel: raid6: avx2x1   gen() 14115 MB/s
Apr 12 18:49:42.594104 kernel: raid6: avx2x1   xor() 15955 MB/s
Apr 12 18:49:42.615089 kernel: raid6: sse2x4   gen() 10984 MB/s
Apr 12 18:49:42.636085 kernel: raid6: sse2x4   xor()  6697 MB/s
Apr 12 18:49:42.657107 kernel: raid6: sse2x2   gen() 11979 MB/s
Apr 12 18:49:42.678099 kernel: raid6: sse2x2   xor()  7391 MB/s
Apr 12 18:49:42.699116 kernel: raid6: sse2x1   gen() 10574 MB/s
Apr 12 18:49:42.725108 kernel: raid6: sse2x1   xor()  5176 MB/s
Apr 12 18:49:42.725196 kernel: raid6: using algorithm avx2x4 gen() 18209 MB/s
Apr 12 18:49:42.725220 kernel: raid6: .... xor() 8188 MB/s, rmw enabled
Apr 12 18:49:42.730227 kernel: raid6: using avx2x2 recovery algorithm
Apr 12 18:49:42.756087 kernel: xor: automatically using best checksumming function   avx       
Apr 12 18:49:42.868081 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no
Apr 12 18:49:42.880405 systemd[1]: Finished dracut-pre-udev.service.
Apr 12 18:49:42.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:42.888000 audit: BPF prog-id=7 op=LOAD
Apr 12 18:49:42.888000 audit: BPF prog-id=8 op=LOAD
Apr 12 18:49:42.890884 systemd[1]: Starting systemd-udevd.service...
Apr 12 18:49:42.908507 systemd-udevd[389]: Using default interface naming scheme 'v252'.
Apr 12 18:49:42.915848 systemd[1]: Started systemd-udevd.service.
Apr 12 18:49:42.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:42.936445 systemd[1]: Starting dracut-pre-trigger.service...
Apr 12 18:49:42.952287 dracut-pre-trigger[399]: rd.md=0: removing MD RAID activation
Apr 12 18:49:42.990325 systemd[1]: Finished dracut-pre-trigger.service.
Apr 12 18:49:42.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:43.001399 systemd[1]: Starting systemd-udev-trigger.service...
Apr 12 18:49:43.070368 systemd[1]: Finished systemd-udev-trigger.service.
Apr 12 18:49:43.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:43.148064 kernel: cryptd: max_cpu_qlen set to 1000
Apr 12 18:49:43.200079 kernel: scsi host0: Virtio SCSI HBA
Apr 12 18:49:43.246162 kernel: AVX2 version of gcm_enc/dec engaged.
Apr 12 18:49:43.259346 kernel: AES CTR mode by8 optimization enabled
Apr 12 18:49:43.273063 kernel: scsi 0:0:1:0: Direct-Access     Google   PersistentDisk   1    PQ: 0 ANSI: 6
Apr 12 18:49:43.344967 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB)
Apr 12 18:49:43.345334 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks
Apr 12 18:49:43.345551 kernel: sd 0:0:1:0: [sda] Write Protect is off
Apr 12 18:49:43.359495 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08
Apr 12 18:49:43.359858 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
Apr 12 18:49:43.378235 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk.
Apr 12 18:49:43.378324 kernel: GPT:17805311 != 25165823
Apr 12 18:49:43.378362 kernel: GPT:Alternate GPT header not at the end of the disk.
Apr 12 18:49:43.384324 kernel: GPT:17805311 != 25165823
Apr 12 18:49:43.388118 kernel: GPT: Use GNU Parted to correct GPT errors.
Apr 12 18:49:43.398613 kernel:  sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9
Apr 12 18:49:43.406856 kernel: sd 0:0:1:0: [sda] Attached SCSI disk
Apr 12 18:49:43.456086 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device.
Apr 12 18:49:43.478084 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (433)
Apr 12 18:49:43.499586 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device.
Apr 12 18:49:43.504192 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device.
Apr 12 18:49:43.515426 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device.
Apr 12 18:49:43.558000 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Apr 12 18:49:43.559288 systemd[1]: Starting disk-uuid.service...
Apr 12 18:49:43.593266 kernel:  sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9
Apr 12 18:49:43.593333 disk-uuid[512]: Primary Header is updated.
Apr 12 18:49:43.593333 disk-uuid[512]: Secondary Entries is updated.
Apr 12 18:49:43.593333 disk-uuid[512]: Secondary Header is updated.
Apr 12 18:49:44.618015 disk-uuid[513]: The operation has completed successfully.
Apr 12 18:49:44.627209 kernel:  sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9
Apr 12 18:49:44.685237 systemd[1]: disk-uuid.service: Deactivated successfully.
Apr 12 18:49:44.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:44.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:44.685380 systemd[1]: Finished disk-uuid.service.
Apr 12 18:49:44.702560 systemd[1]: Starting verity-setup.service...
Apr 12 18:49:44.731097 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2"
Apr 12 18:49:44.810394 systemd[1]: Found device dev-mapper-usr.device.
Apr 12 18:49:44.812799 systemd[1]: Mounting sysusr-usr.mount...
Apr 12 18:49:44.824630 systemd[1]: Finished verity-setup.service.
Apr 12 18:49:44.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:44.918066 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none.
Apr 12 18:49:44.918538 systemd[1]: Mounted sysusr-usr.mount.
Apr 12 18:49:44.925459 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met.
Apr 12 18:49:44.926542 systemd[1]: Starting ignition-setup.service...
Apr 12 18:49:44.972244 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm
Apr 12 18:49:44.972279 kernel: BTRFS info (device sda6): using free space tree
Apr 12 18:49:44.972294 kernel: BTRFS info (device sda6): has skinny extents
Apr 12 18:49:44.984080 kernel: BTRFS info (device sda6): enabling ssd optimizations
Apr 12 18:49:44.985060 systemd[1]: Starting parse-ip-for-networkd.service...
Apr 12 18:49:45.020703 systemd[1]: Finished ignition-setup.service.
Apr 12 18:49:45.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:45.022493 systemd[1]: Starting ignition-fetch-offline.service...
Apr 12 18:49:45.107079 systemd[1]: Finished parse-ip-for-networkd.service.
Apr 12 18:49:45.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:45.107000 audit: BPF prog-id=9 op=LOAD
Apr 12 18:49:45.109465 systemd[1]: Starting systemd-networkd.service...
Apr 12 18:49:45.144707 systemd-networkd[687]: lo: Link UP
Apr 12 18:49:45.144722 systemd-networkd[687]: lo: Gained carrier
Apr 12 18:49:45.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:45.145808 systemd-networkd[687]: Enumeration completed
Apr 12 18:49:45.145956 systemd[1]: Started systemd-networkd.service.
Apr 12 18:49:45.146375 systemd-networkd[687]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Apr 12 18:49:45.148687 systemd-networkd[687]: eth0: Link UP
Apr 12 18:49:45.148694 systemd-networkd[687]: eth0: Gained carrier
Apr 12 18:49:45.152558 systemd[1]: Reached target network.target.
Apr 12 18:49:45.161160 systemd-networkd[687]: eth0: DHCPv4 address 10.128.0.44/32, gateway 10.128.0.1 acquired from 169.254.169.254
Apr 12 18:49:45.185526 systemd[1]: Starting iscsiuio.service...
Apr 12 18:49:45.243417 systemd[1]: Started iscsiuio.service.
Apr 12 18:49:45.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:45.251928 systemd[1]: Starting iscsid.service...
Apr 12 18:49:45.271244 iscsid[696]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi
Apr 12 18:49:45.271244 iscsid[696]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log
Apr 12 18:49:45.271244 iscsid[696]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier].
Apr 12 18:49:45.271244 iscsid[696]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6.
Apr 12 18:49:45.271244 iscsid[696]: If using hardware iscsi like qla4xxx this message can be ignored.
Apr 12 18:49:45.271244 iscsid[696]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi
Apr 12 18:49:45.271244 iscsid[696]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf
Apr 12 18:49:45.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:45.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:45.264492 systemd[1]: Started iscsid.service.
Apr 12 18:49:45.319667 ignition[603]: Ignition 2.14.0
Apr 12 18:49:45.279984 systemd[1]: Starting dracut-initqueue.service...
Apr 12 18:49:45.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:45.319683 ignition[603]: Stage: fetch-offline
Apr 12 18:49:45.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:45.301915 systemd[1]: Finished dracut-initqueue.service.
Apr 12 18:49:45.319770 ignition[603]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Apr 12 18:49:45.343542 systemd[1]: Reached target remote-fs-pre.target.
Apr 12 18:49:45.319813 ignition[603]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6
Apr 12 18:49:45.366252 systemd[1]: Reached target remote-cryptsetup.target.
Apr 12 18:49:45.342879 ignition[603]: no config dir at "/usr/lib/ignition/base.platform.d/gcp"
Apr 12 18:49:45.383252 systemd[1]: Reached target remote-fs.target.
Apr 12 18:49:45.343572 ignition[603]: parsed url from cmdline: ""
Apr 12 18:49:45.402386 systemd[1]: Starting dracut-pre-mount.service...
Apr 12 18:49:45.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:45.343582 ignition[603]: no config URL provided
Apr 12 18:49:45.426674 systemd[1]: Finished ignition-fetch-offline.service.
Apr 12 18:49:45.343592 ignition[603]: reading system config file "/usr/lib/ignition/user.ign"
Apr 12 18:49:45.440645 systemd[1]: Finished dracut-pre-mount.service.
Apr 12 18:49:45.343606 ignition[603]: no config at "/usr/lib/ignition/user.ign"
Apr 12 18:49:45.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:45.458785 systemd[1]: Starting ignition-fetch.service...
Apr 12 18:49:45.343616 ignition[603]: failed to fetch config: resource requires networking
Apr 12 18:49:45.507831 unknown[711]: fetched base config from "system"
Apr 12 18:49:45.343801 ignition[603]: Ignition finished successfully
Apr 12 18:49:45.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:45.507846 unknown[711]: fetched base config from "system"
Apr 12 18:49:45.471546 ignition[711]: Ignition 2.14.0
Apr 12 18:49:45.507859 unknown[711]: fetched user config from "gcp"
Apr 12 18:49:45.471571 ignition[711]: Stage: fetch
Apr 12 18:49:45.513782 systemd[1]: Finished ignition-fetch.service.
Apr 12 18:49:45.471869 ignition[711]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Apr 12 18:49:45.535767 systemd[1]: Starting ignition-kargs.service...
Apr 12 18:49:45.471907 ignition[711]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6
Apr 12 18:49:45.574667 systemd[1]: Finished ignition-kargs.service.
Apr 12 18:49:45.480143 ignition[711]: no config dir at "/usr/lib/ignition/base.platform.d/gcp"
Apr 12 18:49:45.590567 systemd[1]: Starting ignition-disks.service...
Apr 12 18:49:45.480350 ignition[711]: parsed url from cmdline: ""
Apr 12 18:49:45.621521 systemd[1]: Finished ignition-disks.service.
Apr 12 18:49:45.480357 ignition[711]: no config URL provided
Apr 12 18:49:45.636504 systemd[1]: Reached target initrd-root-device.target.
Apr 12 18:49:45.480367 ignition[711]: reading system config file "/usr/lib/ignition/user.ign"
Apr 12 18:49:45.651329 systemd[1]: Reached target local-fs-pre.target.
Apr 12 18:49:45.480380 ignition[711]: no config at "/usr/lib/ignition/user.ign"
Apr 12 18:49:45.658389 systemd[1]: Reached target local-fs.target.
Apr 12 18:49:45.480423 ignition[711]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1
Apr 12 18:49:45.679334 systemd[1]: Reached target sysinit.target.
Apr 12 18:49:45.487255 ignition[711]: GET result: OK
Apr 12 18:49:45.686406 systemd[1]: Reached target basic.target.
Apr 12 18:49:45.487344 ignition[711]: parsing config with SHA512: 507dd7e46c14673a43383fc3e0203ccc9b5199a0fe5de1ec33e7476bc8ec6cf663ea9a1c395cb7803373eba6f5369f5efafe7ad5479292766bafcb4ab5d91a95
Apr 12 18:49:45.705592 systemd[1]: Starting systemd-fsck-root.service...
Apr 12 18:49:45.508560 ignition[711]: fetch: fetch complete
Apr 12 18:49:45.508568 ignition[711]: fetch: fetch passed
Apr 12 18:49:45.508622 ignition[711]: Ignition finished successfully
Apr 12 18:49:45.548896 ignition[717]: Ignition 2.14.0
Apr 12 18:49:45.548907 ignition[717]: Stage: kargs
Apr 12 18:49:45.549059 ignition[717]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Apr 12 18:49:45.549103 ignition[717]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6
Apr 12 18:49:45.556242 ignition[717]: no config dir at "/usr/lib/ignition/base.platform.d/gcp"
Apr 12 18:49:45.557598 ignition[717]: kargs: kargs passed
Apr 12 18:49:45.557651 ignition[717]: Ignition finished successfully
Apr 12 18:49:45.602060 ignition[723]: Ignition 2.14.0
Apr 12 18:49:45.602072 ignition[723]: Stage: disks
Apr 12 18:49:45.602219 ignition[723]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Apr 12 18:49:45.602250 ignition[723]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6
Apr 12 18:49:45.609481 ignition[723]: no config dir at "/usr/lib/ignition/base.platform.d/gcp"
Apr 12 18:49:45.610892 ignition[723]: disks: disks passed
Apr 12 18:49:45.610948 ignition[723]: Ignition finished successfully
Apr 12 18:49:45.746415 systemd-fsck[731]: ROOT: clean, 612/1628000 files, 124056/1617920 blocks
Apr 12 18:49:45.916008 systemd[1]: Finished systemd-fsck-root.service.
Apr 12 18:49:45.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:45.917217 systemd[1]: Mounting sysroot.mount...
Apr 12 18:49:45.947239 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none.
Apr 12 18:49:45.955465 systemd[1]: Mounted sysroot.mount.
Apr 12 18:49:45.962344 systemd[1]: Reached target initrd-root-fs.target.
Apr 12 18:49:45.976462 systemd[1]: Mounting sysroot-usr.mount...
Apr 12 18:49:45.984878 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met.
Apr 12 18:49:45.984933 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot).
Apr 12 18:49:45.984966 systemd[1]: Reached target ignition-diskful.target.
Apr 12 18:49:46.072205 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (737)
Apr 12 18:49:46.072248 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm
Apr 12 18:49:46.072271 kernel: BTRFS info (device sda6): using free space tree
Apr 12 18:49:46.072293 kernel: BTRFS info (device sda6): has skinny extents
Apr 12 18:49:46.004770 systemd[1]: Mounted sysroot-usr.mount.
Apr 12 18:49:46.028949 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Apr 12 18:49:46.098649 initrd-setup-root[742]: cut: /sysroot/etc/passwd: No such file or directory
Apr 12 18:49:46.108208 kernel: BTRFS info (device sda6): enabling ssd optimizations
Apr 12 18:49:46.053830 systemd[1]: Starting initrd-setup-root.service...
Apr 12 18:49:46.117364 initrd-setup-root[750]: cut: /sysroot/etc/group: No such file or directory
Apr 12 18:49:46.135202 initrd-setup-root[774]: cut: /sysroot/etc/shadow: No such file or directory
Apr 12 18:49:46.126818 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Apr 12 18:49:46.163235 initrd-setup-root[784]: cut: /sysroot/etc/gshadow: No such file or directory
Apr 12 18:49:46.180182 systemd[1]: Finished initrd-setup-root.service.
Apr 12 18:49:46.220376 kernel: kauditd_printk_skb: 24 callbacks suppressed
Apr 12 18:49:46.220427 kernel: audit: type=1130 audit(1712947786.179:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:46.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:46.181725 systemd[1]: Starting ignition-mount.service...
Apr 12 18:49:46.228376 systemd[1]: Starting sysroot-boot.service...
Apr 12 18:49:46.242822 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully.
Apr 12 18:49:46.242967 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully.
Apr 12 18:49:46.268652 ignition[802]: INFO     : Ignition 2.14.0
Apr 12 18:49:46.268652 ignition[802]: INFO     : Stage: mount
Apr 12 18:49:46.268652 ignition[802]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Apr 12 18:49:46.268652 ignition[802]: DEBUG    : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6
Apr 12 18:49:46.321373 kernel: audit: type=1130 audit(1712947786.283:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:46.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:46.278235 systemd[1]: Finished sysroot-boot.service.
Apr 12 18:49:46.373256 kernel: audit: type=1130 audit(1712947786.345:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:46.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:46.373373 ignition[802]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/gcp"
Apr 12 18:49:46.373373 ignition[802]: INFO     : mount: mount passed
Apr 12 18:49:46.373373 ignition[802]: INFO     : Ignition finished successfully
Apr 12 18:49:46.445186 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (812)
Apr 12 18:49:46.445231 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm
Apr 12 18:49:46.445247 kernel: BTRFS info (device sda6): using free space tree
Apr 12 18:49:46.445261 kernel: BTRFS info (device sda6): has skinny extents
Apr 12 18:49:46.445275 kernel: BTRFS info (device sda6): enabling ssd optimizations
Apr 12 18:49:46.284768 systemd[1]: Finished ignition-mount.service.
Apr 12 18:49:46.347917 systemd[1]: Starting ignition-files.service...
Apr 12 18:49:46.384417 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Apr 12 18:49:46.450524 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Apr 12 18:49:46.485231 ignition[831]: INFO     : Ignition 2.14.0
Apr 12 18:49:46.485231 ignition[831]: INFO     : Stage: files
Apr 12 18:49:46.485231 ignition[831]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Apr 12 18:49:46.485231 ignition[831]: DEBUG    : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6
Apr 12 18:49:46.485231 ignition[831]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/gcp"
Apr 12 18:49:46.552224 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (835)
Apr 12 18:49:46.503231 unknown[831]: wrote ssh authorized keys file for user: core
Apr 12 18:49:46.561207 ignition[831]: DEBUG    : files: compiled without relabeling support, skipping
Apr 12 18:49:46.561207 ignition[831]: INFO     : files: ensureUsers: op(1): [started]  creating or modifying user "core"
Apr 12 18:49:46.561207 ignition[831]: DEBUG    : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core"
Apr 12 18:49:46.561207 ignition[831]: INFO     : files: ensureUsers: op(1): [finished] creating or modifying user "core"
Apr 12 18:49:46.561207 ignition[831]: INFO     : files: ensureUsers: op(2): [started]  adding ssh keys to user "core"
Apr 12 18:49:46.561207 ignition[831]: INFO     : files: ensureUsers: op(2): [finished] adding ssh keys to user "core"
Apr 12 18:49:46.561207 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [started]  writing file "/sysroot/etc/hosts"
Apr 12 18:49:46.561207 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition
Apr 12 18:49:46.561207 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(3): op(4): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem2181706417"
Apr 12 18:49:46.561207 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem2181706417": device or resource busy
Apr 12 18:49:46.561207 ignition[831]: ERROR    : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2181706417", trying btrfs: device or resource busy
Apr 12 18:49:46.561207 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(3): op(5): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem2181706417"
Apr 12 18:49:46.561207 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2181706417"
Apr 12 18:49:46.561207 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(3): op(6): [started]  unmounting "/mnt/oem2181706417"
Apr 12 18:49:46.561207 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem2181706417"
Apr 12 18:49:46.561207 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts"
Apr 12 18:49:46.561207 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [started]  writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz"
Apr 12 18:49:46.813235 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(7): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1
Apr 12 18:49:46.848926 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(7): GET result: OK
Apr 12 18:49:47.114001 ignition[831]: DEBUG    : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540
Apr 12 18:49:47.114001 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz"
Apr 12 18:49:47.155206 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [started]  writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz"
Apr 12 18:49:47.155206 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(8): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1
Apr 12 18:49:47.186258 systemd-networkd[687]: eth0: Gained IPv6LL
Apr 12 18:49:47.309391 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(8): GET result: OK
Apr 12 18:49:47.414355 ignition[831]: DEBUG    : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a
Apr 12 18:49:47.438219 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz"
Apr 12 18:49:47.438219 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [started]  writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh"
Apr 12 18:49:47.438219 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(9): oem config not found in "/usr/share/oem", looking on oem partition
Apr 12 18:49:47.438219 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(9): op(a): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem2745353166"
Apr 12 18:49:47.438219 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(9): op(a): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem2745353166": device or resource busy
Apr 12 18:49:47.438219 ignition[831]: ERROR    : files: createFilesystemsFiles: createFiles: op(9): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2745353166", trying btrfs: device or resource busy
Apr 12 18:49:47.438219 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(9): op(b): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem2745353166"
Apr 12 18:49:47.438219 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(9): op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2745353166"
Apr 12 18:49:47.438219 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(9): op(c): [started]  unmounting "/mnt/oem2745353166"
Apr 12 18:49:47.438219 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(9): op(c): [finished] unmounting "/mnt/oem2745353166"
Apr 12 18:49:47.438219 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh"
Apr 12 18:49:47.438219 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(d): [started]  writing file "/sysroot/opt/bin/kubeadm"
Apr 12 18:49:47.438219 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(d): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1
Apr 12 18:49:47.431349 systemd[1]: mnt-oem2745353166.mount: Deactivated successfully.
Apr 12 18:49:47.667246 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(d): GET result: OK
Apr 12 18:49:47.804949 ignition[831]: DEBUG    : files: createFilesystemsFiles: createFiles: op(d): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836
Apr 12 18:49:47.829209 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/opt/bin/kubeadm"
Apr 12 18:49:47.829209 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(e): [started]  writing file "/sysroot/opt/bin/kubelet"
Apr 12 18:49:47.829209 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(e): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1
Apr 12 18:49:47.829209 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(e): GET result: OK
Apr 12 18:49:48.303182 ignition[831]: DEBUG    : files: createFilesystemsFiles: createFiles: op(e): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560
Apr 12 18:49:48.327290 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/bin/kubelet"
Apr 12 18:49:48.327290 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(f): [started]  writing file "/sysroot/home/core/install.sh"
Apr 12 18:49:48.327290 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/home/core/install.sh"
Apr 12 18:49:48.327290 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(10): [started]  writing file "/sysroot/etc/docker/daemon.json"
Apr 12 18:49:48.327290 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/docker/daemon.json"
Apr 12 18:49:48.327290 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(11): [started]  writing file "/sysroot/etc/flatcar/update.conf"
Apr 12 18:49:48.327290 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/flatcar/update.conf"
Apr 12 18:49:48.327290 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(12): [started]  writing file "/sysroot/etc/systemd/system/oem-gce.service"
Apr 12 18:49:48.327290 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition
Apr 12 18:49:48.327290 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(12): op(13): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem3907928391"
Apr 12 18:49:48.327290 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem3907928391": device or resource busy
Apr 12 18:49:48.327290 ignition[831]: ERROR    : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3907928391", trying btrfs: device or resource busy
Apr 12 18:49:48.327290 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(12): op(14): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem3907928391"
Apr 12 18:49:48.327290 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3907928391"
Apr 12 18:49:48.327290 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(12): op(15): [started]  unmounting "/mnt/oem3907928391"
Apr 12 18:49:48.770239 kernel: audit: type=1130 audit(1712947788.379:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.770294 kernel: audit: type=1130 audit(1712947788.473:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.770359 kernel: audit: type=1130 audit(1712947788.518:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.770381 kernel: audit: type=1131 audit(1712947788.518:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.770407 kernel: audit: type=1130 audit(1712947788.643:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.770422 kernel: audit: type=1131 audit(1712947788.643:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.326548 systemd[1]: mnt-oem3907928391.mount: Deactivated successfully.
Apr 12 18:49:48.807242 kernel: audit: type=1130 audit(1712947788.777:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.807398 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem3907928391"
Apr 12 18:49:48.807398 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service"
Apr 12 18:49:48.807398 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(16): [started]  writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service"
Apr 12 18:49:48.807398 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(16): oem config not found in "/usr/share/oem", looking on oem partition
Apr 12 18:49:48.807398 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(16): op(17): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem1996959784"
Apr 12 18:49:48.807398 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(16): op(17): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem1996959784": device or resource busy
Apr 12 18:49:48.807398 ignition[831]: ERROR    : files: createFilesystemsFiles: createFiles: op(16): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1996959784", trying btrfs: device or resource busy
Apr 12 18:49:48.807398 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(16): op(18): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem1996959784"
Apr 12 18:49:48.807398 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(16): op(18): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1996959784"
Apr 12 18:49:48.807398 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(16): op(19): [started]  unmounting "/mnt/oem1996959784"
Apr 12 18:49:48.807398 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(16): op(19): [finished] unmounting "/mnt/oem1996959784"
Apr 12 18:49:48.807398 ignition[831]: INFO     : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service"
Apr 12 18:49:48.807398 ignition[831]: INFO     : files: op(1a): [started]  processing unit "coreos-metadata-sshkeys@.service"
Apr 12 18:49:48.807398 ignition[831]: INFO     : files: op(1a): [finished] processing unit "coreos-metadata-sshkeys@.service"
Apr 12 18:49:48.807398 ignition[831]: INFO     : files: op(1b): [started]  processing unit "oem-gce.service"
Apr 12 18:49:48.807398 ignition[831]: INFO     : files: op(1b): [finished] processing unit "oem-gce.service"
Apr 12 18:49:48.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.352307 systemd[1]: mnt-oem1996959784.mount: Deactivated successfully.
Apr 12 18:49:49.155453 ignition[831]: INFO     : files: op(1c): [started]  processing unit "oem-gce-enable-oslogin.service"
Apr 12 18:49:49.155453 ignition[831]: INFO     : files: op(1c): [finished] processing unit "oem-gce-enable-oslogin.service"
Apr 12 18:49:49.155453 ignition[831]: INFO     : files: op(1d): [started]  processing unit "prepare-cni-plugins.service"
Apr 12 18:49:49.155453 ignition[831]: INFO     : files: op(1d): op(1e): [started]  writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service"
Apr 12 18:49:49.155453 ignition[831]: INFO     : files: op(1d): op(1e): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service"
Apr 12 18:49:49.155453 ignition[831]: INFO     : files: op(1d): [finished] processing unit "prepare-cni-plugins.service"
Apr 12 18:49:49.155453 ignition[831]: INFO     : files: op(1f): [started]  processing unit "prepare-critools.service"
Apr 12 18:49:49.155453 ignition[831]: INFO     : files: op(1f): op(20): [started]  writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service"
Apr 12 18:49:49.155453 ignition[831]: INFO     : files: op(1f): op(20): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service"
Apr 12 18:49:49.155453 ignition[831]: INFO     : files: op(1f): [finished] processing unit "prepare-critools.service"
Apr 12 18:49:49.155453 ignition[831]: INFO     : files: op(21): [started]  setting preset to enabled for "coreos-metadata-sshkeys@.service "
Apr 12 18:49:49.155453 ignition[831]: INFO     : files: op(21): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service "
Apr 12 18:49:49.155453 ignition[831]: INFO     : files: op(22): [started]  setting preset to enabled for "oem-gce.service"
Apr 12 18:49:49.155453 ignition[831]: INFO     : files: op(22): [finished] setting preset to enabled for "oem-gce.service"
Apr 12 18:49:49.155453 ignition[831]: INFO     : files: op(23): [started]  setting preset to enabled for "oem-gce-enable-oslogin.service"
Apr 12 18:49:49.155453 ignition[831]: INFO     : files: op(23): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service"
Apr 12 18:49:49.155453 ignition[831]: INFO     : files: op(24): [started]  setting preset to enabled for "prepare-cni-plugins.service"
Apr 12 18:49:49.155453 ignition[831]: INFO     : files: op(24): [finished] setting preset to enabled for "prepare-cni-plugins.service"
Apr 12 18:49:49.155453 ignition[831]: INFO     : files: op(25): [started]  setting preset to enabled for "prepare-critools.service"
Apr 12 18:49:49.155453 ignition[831]: INFO     : files: op(25): [finished] setting preset to enabled for "prepare-critools.service"
Apr 12 18:49:49.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:49.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:49.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:49.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:49.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:49.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:49.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.365157 systemd[1]: Finished ignition-files.service.
Apr 12 18:49:49.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:49.523276 initrd-setup-root-after-ignition[854]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory
Apr 12 18:49:49.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:49.545449 iscsid[696]: iscsid shutting down.
Apr 12 18:49:49.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:49.559319 ignition[831]: INFO     : files: createResultFile: createFiles: op(26): [started]  writing file "/sysroot/etc/.ignition-result.json"
Apr 12 18:49:49.559319 ignition[831]: INFO     : files: createResultFile: createFiles: op(26): [finished] writing file "/sysroot/etc/.ignition-result.json"
Apr 12 18:49:49.559319 ignition[831]: INFO     : files: files passed
Apr 12 18:49:49.559319 ignition[831]: INFO     : Ignition finished successfully
Apr 12 18:49:49.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:49.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:49.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.390648 systemd[1]: Starting initrd-setup-root-after-ignition.service...
Apr 12 18:49:49.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.438399 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile).
Apr 12 18:49:48.439642 systemd[1]: Starting ignition-quench.service...
Apr 12 18:49:48.453740 systemd[1]: Finished initrd-setup-root-after-ignition.service.
Apr 12 18:49:48.474954 systemd[1]: ignition-quench.service: Deactivated successfully.
Apr 12 18:49:48.475160 systemd[1]: Finished ignition-quench.service.
Apr 12 18:49:48.519705 systemd[1]: Reached target ignition-complete.target.
Apr 12 18:49:49.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:49.738444 ignition[869]: INFO     : Ignition 2.14.0
Apr 12 18:49:49.738444 ignition[869]: INFO     : Stage: umount
Apr 12 18:49:49.738444 ignition[869]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Apr 12 18:49:49.738444 ignition[869]: DEBUG    : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6
Apr 12 18:49:49.738444 ignition[869]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/gcp"
Apr 12 18:49:49.738444 ignition[869]: INFO     : umount: umount passed
Apr 12 18:49:49.738444 ignition[869]: INFO     : Ignition finished successfully
Apr 12 18:49:49.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:49.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:49.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:49.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.591605 systemd[1]: Starting initrd-parse-etc.service...
Apr 12 18:49:48.630818 systemd[1]: initrd-parse-etc.service: Deactivated successfully.
Apr 12 18:49:49.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.630946 systemd[1]: Finished initrd-parse-etc.service.
Apr 12 18:49:49.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:49.898000 audit: BPF prog-id=6 op=UNLOAD
Apr 12 18:49:48.644470 systemd[1]: Reached target initrd-fs.target.
Apr 12 18:49:48.705491 systemd[1]: Reached target initrd.target.
Apr 12 18:49:48.727549 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met.
Apr 12 18:49:49.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.728877 systemd[1]: Starting dracut-pre-pivot.service...
Apr 12 18:49:49.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.750680 systemd[1]: Finished dracut-pre-pivot.service.
Apr 12 18:49:49.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.779840 systemd[1]: Starting initrd-cleanup.service...
Apr 12 18:49:48.823629 systemd[1]: Stopped target nss-lookup.target.
Apr 12 18:49:50.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.829521 systemd[1]: Stopped target remote-cryptsetup.target.
Apr 12 18:49:48.851635 systemd[1]: Stopped target timers.target.
Apr 12 18:49:48.875592 systemd[1]: dracut-pre-pivot.service: Deactivated successfully.
Apr 12 18:49:50.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.875782 systemd[1]: Stopped dracut-pre-pivot.service.
Apr 12 18:49:50.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.919745 systemd[1]: Stopped target initrd.target.
Apr 12 18:49:50.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:48.939647 systemd[1]: Stopped target basic.target.
Apr 12 18:49:48.965596 systemd[1]: Stopped target ignition-complete.target.
Apr 12 18:49:49.011589 systemd[1]: Stopped target ignition-diskful.target.
Apr 12 18:49:50.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:49.027610 systemd[1]: Stopped target initrd-root-device.target.
Apr 12 18:49:50.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:49.048623 systemd[1]: Stopped target remote-fs.target.
Apr 12 18:49:50.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:50.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:49.080566 systemd[1]: Stopped target remote-fs-pre.target.
Apr 12 18:49:49.093589 systemd[1]: Stopped target sysinit.target.
Apr 12 18:49:49.128527 systemd[1]: Stopped target local-fs.target.
Apr 12 18:49:49.147522 systemd[1]: Stopped target local-fs-pre.target.
Apr 12 18:49:49.163541 systemd[1]: Stopped target swap.target.
Apr 12 18:49:49.194539 systemd[1]: dracut-pre-mount.service: Deactivated successfully.
Apr 12 18:49:50.233213 systemd-journald[189]: Received SIGTERM from PID 1 (n/a).
Apr 12 18:49:49.194735 systemd[1]: Stopped dracut-pre-mount.service.
Apr 12 18:49:49.231584 systemd[1]: Stopped target cryptsetup.target.
Apr 12 18:49:49.267543 systemd[1]: dracut-initqueue.service: Deactivated successfully.
Apr 12 18:49:49.267775 systemd[1]: Stopped dracut-initqueue.service.
Apr 12 18:49:49.278834 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully.
Apr 12 18:49:49.279109 systemd[1]: Stopped initrd-setup-root-after-ignition.service.
Apr 12 18:49:49.302646 systemd[1]: ignition-files.service: Deactivated successfully.
Apr 12 18:49:49.302840 systemd[1]: Stopped ignition-files.service.
Apr 12 18:49:49.329146 systemd[1]: Stopping ignition-mount.service...
Apr 12 18:49:49.351723 systemd[1]: Stopping iscsid.service...
Apr 12 18:49:49.365420 systemd[1]: kmod-static-nodes.service: Deactivated successfully.
Apr 12 18:49:49.365641 systemd[1]: Stopped kmod-static-nodes.service.
Apr 12 18:49:49.403086 systemd[1]: Stopping sysroot-boot.service...
Apr 12 18:49:49.454255 systemd[1]: systemd-udev-trigger.service: Deactivated successfully.
Apr 12 18:49:49.454582 systemd[1]: Stopped systemd-udev-trigger.service.
Apr 12 18:49:49.475566 systemd[1]: dracut-pre-trigger.service: Deactivated successfully.
Apr 12 18:49:49.475839 systemd[1]: Stopped dracut-pre-trigger.service.
Apr 12 18:49:49.500394 systemd[1]: sysroot-boot.mount: Deactivated successfully.
Apr 12 18:49:49.501311 systemd[1]: iscsid.service: Deactivated successfully.
Apr 12 18:49:49.501437 systemd[1]: Stopped iscsid.service.
Apr 12 18:49:49.516945 systemd[1]: ignition-mount.service: Deactivated successfully.
Apr 12 18:49:49.517077 systemd[1]: Stopped ignition-mount.service.
Apr 12 18:49:49.531838 systemd[1]: sysroot-boot.service: Deactivated successfully.
Apr 12 18:49:49.531956 systemd[1]: Stopped sysroot-boot.service.
Apr 12 18:49:49.553033 systemd[1]: ignition-disks.service: Deactivated successfully.
Apr 12 18:49:49.553235 systemd[1]: Stopped ignition-disks.service.
Apr 12 18:49:49.567408 systemd[1]: ignition-kargs.service: Deactivated successfully.
Apr 12 18:49:49.567479 systemd[1]: Stopped ignition-kargs.service.
Apr 12 18:49:49.582505 systemd[1]: ignition-fetch.service: Deactivated successfully.
Apr 12 18:49:49.582574 systemd[1]: Stopped ignition-fetch.service.
Apr 12 18:49:49.603568 systemd[1]: ignition-fetch-offline.service: Deactivated successfully.
Apr 12 18:49:49.603638 systemd[1]: Stopped ignition-fetch-offline.service.
Apr 12 18:49:49.631385 systemd[1]: Stopped target paths.target.
Apr 12 18:49:49.648196 systemd[1]: systemd-ask-password-console.path: Deactivated successfully.
Apr 12 18:49:49.652147 systemd[1]: Stopped systemd-ask-password-console.path.
Apr 12 18:49:49.673216 systemd[1]: Stopped target slices.target.
Apr 12 18:49:49.686244 systemd[1]: Stopped target sockets.target.
Apr 12 18:49:49.700295 systemd[1]: iscsid.socket: Deactivated successfully.
Apr 12 18:49:49.700373 systemd[1]: Closed iscsid.socket.
Apr 12 18:49:49.715270 systemd[1]: ignition-setup.service: Deactivated successfully.
Apr 12 18:49:49.715365 systemd[1]: Stopped ignition-setup.service.
Apr 12 18:49:49.730328 systemd[1]: initrd-setup-root.service: Deactivated successfully.
Apr 12 18:49:49.730418 systemd[1]: Stopped initrd-setup-root.service.
Apr 12 18:49:49.746489 systemd[1]: Stopping iscsiuio.service...
Apr 12 18:49:49.761815 systemd[1]: iscsiuio.service: Deactivated successfully.
Apr 12 18:49:49.761941 systemd[1]: Stopped iscsiuio.service.
Apr 12 18:49:49.775709 systemd[1]: initrd-cleanup.service: Deactivated successfully.
Apr 12 18:49:49.775836 systemd[1]: Finished initrd-cleanup.service.
Apr 12 18:49:49.796389 systemd[1]: Stopped target network.target.
Apr 12 18:49:49.822287 systemd[1]: iscsiuio.socket: Deactivated successfully.
Apr 12 18:49:49.822367 systemd[1]: Closed iscsiuio.socket.
Apr 12 18:49:49.833663 systemd[1]: Stopping systemd-networkd.service...
Apr 12 18:49:49.837119 systemd-networkd[687]: eth0: DHCPv6 lease lost
Apr 12 18:49:49.846542 systemd[1]: Stopping systemd-resolved.service...
Apr 12 18:49:49.867555 systemd[1]: systemd-resolved.service: Deactivated successfully.
Apr 12 18:49:49.867678 systemd[1]: Stopped systemd-resolved.service.
Apr 12 18:49:49.884016 systemd[1]: systemd-networkd.service: Deactivated successfully.
Apr 12 18:49:49.884178 systemd[1]: Stopped systemd-networkd.service.
Apr 12 18:49:49.899894 systemd[1]: systemd-networkd.socket: Deactivated successfully.
Apr 12 18:49:49.899937 systemd[1]: Closed systemd-networkd.socket.
Apr 12 18:49:49.915504 systemd[1]: Stopping network-cleanup.service...
Apr 12 18:49:49.928306 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully.
Apr 12 18:49:49.928414 systemd[1]: Stopped parse-ip-for-networkd.service.
Apr 12 18:49:49.943467 systemd[1]: systemd-sysctl.service: Deactivated successfully.
Apr 12 18:49:49.943540 systemd[1]: Stopped systemd-sysctl.service.
Apr 12 18:49:49.962493 systemd[1]: systemd-modules-load.service: Deactivated successfully.
Apr 12 18:49:49.962562 systemd[1]: Stopped systemd-modules-load.service.
Apr 12 18:49:49.978532 systemd[1]: Stopping systemd-udevd.service...
Apr 12 18:49:49.993943 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully.
Apr 12 18:49:49.994626 systemd[1]: systemd-udevd.service: Deactivated successfully.
Apr 12 18:49:49.994787 systemd[1]: Stopped systemd-udevd.service.
Apr 12 18:49:50.008879 systemd[1]: systemd-udevd-control.socket: Deactivated successfully.
Apr 12 18:49:50.008984 systemd[1]: Closed systemd-udevd-control.socket.
Apr 12 18:49:50.023365 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully.
Apr 12 18:49:50.023426 systemd[1]: Closed systemd-udevd-kernel.socket.
Apr 12 18:49:50.040273 systemd[1]: dracut-pre-udev.service: Deactivated successfully.
Apr 12 18:49:50.040379 systemd[1]: Stopped dracut-pre-udev.service.
Apr 12 18:49:50.055476 systemd[1]: dracut-cmdline.service: Deactivated successfully.
Apr 12 18:49:50.055560 systemd[1]: Stopped dracut-cmdline.service.
Apr 12 18:49:50.071367 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully.
Apr 12 18:49:50.071443 systemd[1]: Stopped dracut-cmdline-ask.service.
Apr 12 18:49:50.087605 systemd[1]: Starting initrd-udevadm-cleanup-db.service...
Apr 12 18:49:50.100546 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully.
Apr 12 18:49:50.100625 systemd[1]: Stopped systemd-vconsole-setup.service.
Apr 12 18:49:50.123014 systemd[1]: network-cleanup.service: Deactivated successfully.
Apr 12 18:49:50.123203 systemd[1]: Stopped network-cleanup.service.
Apr 12 18:49:50.139726 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully.
Apr 12 18:49:50.139854 systemd[1]: Finished initrd-udevadm-cleanup-db.service.
Apr 12 18:49:50.155586 systemd[1]: Reached target initrd-switch-root.target.
Apr 12 18:49:50.172320 systemd[1]: Starting initrd-switch-root.service...
Apr 12 18:49:50.196154 systemd[1]: Switching root.
Apr 12 18:49:50.245169 systemd-journald[189]: Journal stopped
Apr 12 18:49:55.000432 kernel: SELinux:  Class mctp_socket not defined in policy.
Apr 12 18:49:55.000555 kernel: SELinux:  Class anon_inode not defined in policy.
Apr 12 18:49:55.000587 kernel: SELinux: the above unknown classes and permissions will be allowed
Apr 12 18:49:55.000608 kernel: SELinux:  policy capability network_peer_controls=1
Apr 12 18:49:55.000631 kernel: SELinux:  policy capability open_perms=1
Apr 12 18:49:55.000653 kernel: SELinux:  policy capability extended_socket_class=1
Apr 12 18:49:55.000680 kernel: SELinux:  policy capability always_check_network=0
Apr 12 18:49:55.000704 kernel: SELinux:  policy capability cgroup_seclabel=1
Apr 12 18:49:55.000742 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Apr 12 18:49:55.000768 kernel: SELinux:  policy capability genfs_seclabel_symlinks=0
Apr 12 18:49:55.000804 kernel: SELinux:  policy capability ioctl_skip_cloexec=0
Apr 12 18:49:55.000831 systemd[1]: Successfully loaded SELinux policy in 111.045ms.
Apr 12 18:49:55.000879 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.817ms.
Apr 12 18:49:55.000905 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Apr 12 18:49:55.000930 systemd[1]: Detected virtualization kvm.
Apr 12 18:49:55.001082 systemd[1]: Detected architecture x86-64.
Apr 12 18:49:55.001115 systemd[1]: Detected first boot.
Apr 12 18:49:55.001142 systemd[1]: Initializing machine ID from VM UUID.
Apr 12 18:49:55.001165 kernel: SELinux:  Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped).
Apr 12 18:49:55.001180 systemd[1]: Populated /etc with preset unit settings.
Apr 12 18:49:55.001196 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Apr 12 18:49:55.001220 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Apr 12 18:49:55.001237 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Apr 12 18:49:55.001257 kernel: kauditd_printk_skb: 51 callbacks suppressed
Apr 12 18:49:55.001271 kernel: audit: type=1334 audit(1712947794.063:89): prog-id=12 op=LOAD
Apr 12 18:49:55.001288 kernel: audit: type=1334 audit(1712947794.063:90): prog-id=3 op=UNLOAD
Apr 12 18:49:55.001302 kernel: audit: type=1334 audit(1712947794.068:91): prog-id=13 op=LOAD
Apr 12 18:49:55.001315 kernel: audit: type=1334 audit(1712947794.076:92): prog-id=14 op=LOAD
Apr 12 18:49:55.001330 systemd[1]: initrd-switch-root.service: Deactivated successfully.
Apr 12 18:49:55.001344 kernel: audit: type=1334 audit(1712947794.076:93): prog-id=4 op=UNLOAD
Apr 12 18:49:55.001359 kernel: audit: type=1334 audit(1712947794.076:94): prog-id=5 op=UNLOAD
Apr 12 18:49:55.001374 kernel: audit: type=1131 audit(1712947794.076:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.001395 systemd[1]: Stopped initrd-switch-root.service.
Apr 12 18:49:55.001423 kernel: audit: type=1334 audit(1712947794.146:96): prog-id=12 op=UNLOAD
Apr 12 18:49:55.001446 kernel: audit: type=1130 audit(1712947794.162:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.001546 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1.
Apr 12 18:49:55.001570 kernel: audit: type=1131 audit(1712947794.162:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.001586 systemd[1]: Created slice system-addon\x2dconfig.slice.
Apr 12 18:49:55.001602 systemd[1]: Created slice system-addon\x2drun.slice.
Apr 12 18:49:55.001617 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice.
Apr 12 18:49:55.001633 systemd[1]: Created slice system-getty.slice.
Apr 12 18:49:55.001651 systemd[1]: Created slice system-modprobe.slice.
Apr 12 18:49:55.001667 systemd[1]: Created slice system-serial\x2dgetty.slice.
Apr 12 18:49:55.001682 systemd[1]: Created slice system-system\x2dcloudinit.slice.
Apr 12 18:49:55.001696 systemd[1]: Created slice system-systemd\x2dfsck.slice.
Apr 12 18:49:55.001711 systemd[1]: Created slice user.slice.
Apr 12 18:49:55.001726 systemd[1]: Started systemd-ask-password-console.path.
Apr 12 18:49:55.001745 systemd[1]: Started systemd-ask-password-wall.path.
Apr 12 18:49:55.001760 systemd[1]: Set up automount boot.automount.
Apr 12 18:49:55.001779 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount.
Apr 12 18:49:55.001801 systemd[1]: Stopped target initrd-switch-root.target.
Apr 12 18:49:55.001815 systemd[1]: Stopped target initrd-fs.target.
Apr 12 18:49:55.001829 systemd[1]: Stopped target initrd-root-fs.target.
Apr 12 18:49:55.001845 systemd[1]: Reached target integritysetup.target.
Apr 12 18:49:55.001865 systemd[1]: Reached target remote-cryptsetup.target.
Apr 12 18:49:55.001880 systemd[1]: Reached target remote-fs.target.
Apr 12 18:49:55.001895 systemd[1]: Reached target slices.target.
Apr 12 18:49:55.001911 systemd[1]: Reached target swap.target.
Apr 12 18:49:55.001926 systemd[1]: Reached target torcx.target.
Apr 12 18:49:55.001951 systemd[1]: Reached target veritysetup.target.
Apr 12 18:49:55.001974 systemd[1]: Listening on systemd-coredump.socket.
Apr 12 18:49:55.001998 systemd[1]: Listening on systemd-initctl.socket.
Apr 12 18:49:55.002062 systemd[1]: Listening on systemd-networkd.socket.
Apr 12 18:49:55.002614 systemd[1]: Listening on systemd-udevd-control.socket.
Apr 12 18:49:55.002636 systemd[1]: Listening on systemd-udevd-kernel.socket.
Apr 12 18:49:55.002651 systemd[1]: Listening on systemd-userdbd.socket.
Apr 12 18:49:55.002666 systemd[1]: Mounting dev-hugepages.mount...
Apr 12 18:49:55.002681 systemd[1]: Mounting dev-mqueue.mount...
Apr 12 18:49:55.002702 systemd[1]: Mounting media.mount...
Apr 12 18:49:55.002717 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Apr 12 18:49:55.002732 systemd[1]: Mounting sys-kernel-debug.mount...
Apr 12 18:49:55.002747 systemd[1]: Mounting sys-kernel-tracing.mount...
Apr 12 18:49:55.002761 systemd[1]: Mounting tmp.mount...
Apr 12 18:49:55.002775 systemd[1]: Starting flatcar-tmpfiles.service...
Apr 12 18:49:55.002802 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Apr 12 18:49:55.002818 systemd[1]: Starting kmod-static-nodes.service...
Apr 12 18:49:55.002832 systemd[1]: Starting modprobe@configfs.service...
Apr 12 18:49:55.002853 systemd[1]: Starting modprobe@dm_mod.service...
Apr 12 18:49:55.002868 systemd[1]: Starting modprobe@drm.service...
Apr 12 18:49:55.002883 systemd[1]: Starting modprobe@efi_pstore.service...
Apr 12 18:49:55.002897 systemd[1]: Starting modprobe@fuse.service...
Apr 12 18:49:55.002912 systemd[1]: Starting modprobe@loop.service...
Apr 12 18:49:55.002927 kernel: fuse: init (API version 7.34)
Apr 12 18:49:55.002943 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf).
Apr 12 18:49:55.002958 kernel: loop: module loaded
Apr 12 18:49:55.002973 systemd[1]: systemd-fsck-root.service: Deactivated successfully.
Apr 12 18:49:55.002991 systemd[1]: Stopped systemd-fsck-root.service.
Apr 12 18:49:55.003005 systemd[1]: systemd-fsck-usr.service: Deactivated successfully.
Apr 12 18:49:55.003020 systemd[1]: Stopped systemd-fsck-usr.service.
Apr 12 18:49:55.003034 systemd[1]: Stopped systemd-journald.service.
Apr 12 18:49:55.003087 systemd[1]: Starting systemd-journald.service...
Apr 12 18:49:55.003108 systemd[1]: Starting systemd-modules-load.service...
Apr 12 18:49:55.003124 systemd[1]: Starting systemd-network-generator.service...
Apr 12 18:49:55.003144 systemd-journald[994]: Journal started
Apr 12 18:49:55.003211 systemd-journald[994]: Runtime Journal (/run/log/journal/1f6b6d5bbc164ddbfb9739a5c4130a39) is 8.0M, max 148.8M, 140.8M free.
Apr 12 18:49:50.244000 audit: BPF prog-id=9 op=UNLOAD
Apr 12 18:49:50.572000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1
Apr 12 18:49:50.722000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Apr 12 18:49:50.722000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Apr 12 18:49:50.722000 audit: BPF prog-id=10 op=LOAD
Apr 12 18:49:50.722000 audit: BPF prog-id=10 op=UNLOAD
Apr 12 18:49:50.722000 audit: BPF prog-id=11 op=LOAD
Apr 12 18:49:50.722000 audit: BPF prog-id=11 op=UNLOAD
Apr 12 18:49:50.888000 audit[902]: AVC avc:  denied  { associate } for  pid=902 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023"
Apr 12 18:49:50.888000 audit[902]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=885 pid=902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:49:50.888000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Apr 12 18:49:50.900000 audit[902]: AVC avc:  denied  { associate } for  pid=902 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1
Apr 12 18:49:50.900000 audit[902]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=885 pid=902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:49:50.900000 audit: CWD cwd="/"
Apr 12 18:49:50.900000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:50.900000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:50.900000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Apr 12 18:49:54.063000 audit: BPF prog-id=12 op=LOAD
Apr 12 18:49:54.063000 audit: BPF prog-id=3 op=UNLOAD
Apr 12 18:49:54.068000 audit: BPF prog-id=13 op=LOAD
Apr 12 18:49:54.076000 audit: BPF prog-id=14 op=LOAD
Apr 12 18:49:54.076000 audit: BPF prog-id=4 op=UNLOAD
Apr 12 18:49:54.076000 audit: BPF prog-id=5 op=UNLOAD
Apr 12 18:49:54.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:54.146000 audit: BPF prog-id=12 op=UNLOAD
Apr 12 18:49:54.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:54.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:54.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:54.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:54.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:54.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:54.953000 audit: BPF prog-id=15 op=LOAD
Apr 12 18:49:54.953000 audit: BPF prog-id=16 op=LOAD
Apr 12 18:49:54.953000 audit: BPF prog-id=17 op=LOAD
Apr 12 18:49:54.953000 audit: BPF prog-id=13 op=UNLOAD
Apr 12 18:49:54.953000 audit: BPF prog-id=14 op=UNLOAD
Apr 12 18:49:54.996000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1
Apr 12 18:49:54.996000 audit[994]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffdec244be0 a2=4000 a3=7ffdec244c7c items=0 ppid=1 pid=994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:49:54.996000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald"
Apr 12 18:49:54.061009 systemd[1]: Queued start job for default target multi-user.target.
Apr 12 18:49:50.880533 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]"
Apr 12 18:49:54.078565 systemd[1]: systemd-journald.service: Deactivated successfully.
Apr 12 18:49:50.884695 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:50Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Apr 12 18:49:50.884731 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:50Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Apr 12 18:49:50.884796 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:50Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12"
Apr 12 18:49:50.884816 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:50Z" level=debug msg="skipped missing lower profile" missing profile=oem
Apr 12 18:49:50.884914 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:50Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory"
Apr 12 18:49:50.884940 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:50Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)=
Apr 12 18:49:50.885305 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:50Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack
Apr 12 18:49:50.885392 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:50Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Apr 12 18:49:50.885421 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:50Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Apr 12 18:49:50.887835 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:50Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10
Apr 12 18:49:50.887888 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:50Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl
Apr 12 18:49:50.887913 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:50Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3
Apr 12 18:49:50.887932 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:50Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store
Apr 12 18:49:50.887956 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:50Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3
Apr 12 18:49:50.887977 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:50Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store
Apr 12 18:49:53.418142 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:53Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Apr 12 18:49:53.418447 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:53Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Apr 12 18:49:53.418584 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:53Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Apr 12 18:49:53.418817 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:53Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Apr 12 18:49:53.418876 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:53Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile=
Apr 12 18:49:53.418959 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-04-12T18:49:53Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx
Apr 12 18:49:55.014227 systemd[1]: Starting systemd-remount-fs.service...
Apr 12 18:49:55.029110 systemd[1]: Starting systemd-udev-trigger.service...
Apr 12 18:49:55.043627 systemd[1]: verity-setup.service: Deactivated successfully.
Apr 12 18:49:55.043742 systemd[1]: Stopped verity-setup.service.
Apr 12 18:49:55.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.069059 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Apr 12 18:49:55.079080 systemd[1]: Started systemd-journald.service.
Apr 12 18:49:55.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.089812 systemd[1]: Mounted dev-hugepages.mount.
Apr 12 18:49:55.097381 systemd[1]: Mounted dev-mqueue.mount.
Apr 12 18:49:55.104425 systemd[1]: Mounted media.mount.
Apr 12 18:49:55.112389 systemd[1]: Mounted sys-kernel-debug.mount.
Apr 12 18:49:55.121387 systemd[1]: Mounted sys-kernel-tracing.mount.
Apr 12 18:49:55.130471 systemd[1]: Mounted tmp.mount.
Apr 12 18:49:55.137527 systemd[1]: Finished flatcar-tmpfiles.service.
Apr 12 18:49:55.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.146596 systemd[1]: Finished kmod-static-nodes.service.
Apr 12 18:49:55.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.155570 systemd[1]: modprobe@configfs.service: Deactivated successfully.
Apr 12 18:49:55.155794 systemd[1]: Finished modprobe@configfs.service.
Apr 12 18:49:55.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.164767 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Apr 12 18:49:55.165031 systemd[1]: Finished modprobe@dm_mod.service.
Apr 12 18:49:55.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.173638 systemd[1]: modprobe@drm.service: Deactivated successfully.
Apr 12 18:49:55.173862 systemd[1]: Finished modprobe@drm.service.
Apr 12 18:49:55.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.182610 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Apr 12 18:49:55.182821 systemd[1]: Finished modprobe@efi_pstore.service.
Apr 12 18:49:55.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.191639 systemd[1]: modprobe@fuse.service: Deactivated successfully.
Apr 12 18:49:55.191870 systemd[1]: Finished modprobe@fuse.service.
Apr 12 18:49:55.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.200613 systemd[1]: modprobe@loop.service: Deactivated successfully.
Apr 12 18:49:55.200824 systemd[1]: Finished modprobe@loop.service.
Apr 12 18:49:55.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.209646 systemd[1]: Finished systemd-modules-load.service.
Apr 12 18:49:55.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.218613 systemd[1]: Finished systemd-network-generator.service.
Apr 12 18:49:55.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.227779 systemd[1]: Finished systemd-remount-fs.service.
Apr 12 18:49:55.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.236659 systemd[1]: Finished systemd-udev-trigger.service.
Apr 12 18:49:55.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.245999 systemd[1]: Reached target network-pre.target.
Apr 12 18:49:55.257032 systemd[1]: Mounting sys-fs-fuse-connections.mount...
Apr 12 18:49:55.267721 systemd[1]: Mounting sys-kernel-config.mount...
Apr 12 18:49:55.275213 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/).
Apr 12 18:49:55.278282 systemd[1]: Starting systemd-hwdb-update.service...
Apr 12 18:49:55.286942 systemd[1]: Starting systemd-journal-flush.service...
Apr 12 18:49:55.295244 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Apr 12 18:49:55.297107 systemd[1]: Starting systemd-random-seed.service...
Apr 12 18:49:55.297914 systemd-journald[994]: Time spent on flushing to /var/log/journal/1f6b6d5bbc164ddbfb9739a5c4130a39 is 70.968ms for 1155 entries.
Apr 12 18:49:55.297914 systemd-journald[994]: System Journal (/var/log/journal/1f6b6d5bbc164ddbfb9739a5c4130a39) is 8.0M, max 584.8M, 576.8M free.
Apr 12 18:49:55.397023 systemd-journald[994]: Received client request to flush runtime journal.
Apr 12 18:49:55.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.313275 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Apr 12 18:49:55.315223 systemd[1]: Starting systemd-sysctl.service...
Apr 12 18:49:55.324995 systemd[1]: Starting systemd-sysusers.service...
Apr 12 18:49:55.333944 systemd[1]: Starting systemd-udev-settle.service...
Apr 12 18:49:55.344772 systemd[1]: Mounted sys-fs-fuse-connections.mount.
Apr 12 18:49:55.399133 udevadm[1008]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in.
Apr 12 18:49:55.353357 systemd[1]: Mounted sys-kernel-config.mount.
Apr 12 18:49:55.363583 systemd[1]: Finished systemd-random-seed.service.
Apr 12 18:49:55.377003 systemd[1]: Finished systemd-sysctl.service.
Apr 12 18:49:55.385479 systemd[1]: Reached target first-boot-complete.target.
Apr 12 18:49:55.398369 systemd[1]: Finished systemd-journal-flush.service.
Apr 12 18:49:55.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:55.407820 systemd[1]: Finished systemd-sysusers.service.
Apr 12 18:49:55.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:56.016201 systemd[1]: Finished systemd-hwdb-update.service.
Apr 12 18:49:56.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:56.024000 audit: BPF prog-id=18 op=LOAD
Apr 12 18:49:56.024000 audit: BPF prog-id=19 op=LOAD
Apr 12 18:49:56.024000 audit: BPF prog-id=7 op=UNLOAD
Apr 12 18:49:56.024000 audit: BPF prog-id=8 op=UNLOAD
Apr 12 18:49:56.026237 systemd[1]: Starting systemd-udevd.service...
Apr 12 18:49:56.049513 systemd-udevd[1011]: Using default interface naming scheme 'v252'.
Apr 12 18:49:56.102160 systemd[1]: Started systemd-udevd.service.
Apr 12 18:49:56.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:56.112000 audit: BPF prog-id=20 op=LOAD
Apr 12 18:49:56.114280 systemd[1]: Starting systemd-networkd.service...
Apr 12 18:49:56.126000 audit: BPF prog-id=21 op=LOAD
Apr 12 18:49:56.126000 audit: BPF prog-id=22 op=LOAD
Apr 12 18:49:56.126000 audit: BPF prog-id=23 op=LOAD
Apr 12 18:49:56.128427 systemd[1]: Starting systemd-userdbd.service...
Apr 12 18:49:56.166717 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped.
Apr 12 18:49:56.201152 systemd[1]: Started systemd-userdbd.service.
Apr 12 18:49:56.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:56.292721 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2
Apr 12 18:49:56.308069 kernel: ACPI: button: Power Button [PWRF]
Apr 12 18:49:56.361087 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1026)
Apr 12 18:49:56.364329 systemd-networkd[1023]: lo: Link UP
Apr 12 18:49:56.364342 systemd-networkd[1023]: lo: Gained carrier
Apr 12 18:49:56.365086 systemd-networkd[1023]: Enumeration completed
Apr 12 18:49:56.365214 systemd[1]: Started systemd-networkd.service.
Apr 12 18:49:56.366818 systemd-networkd[1023]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Apr 12 18:49:56.368919 systemd-networkd[1023]: eth0: Link UP
Apr 12 18:49:56.368938 systemd-networkd[1023]: eth0: Gained carrier
Apr 12 18:49:56.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:56.386252 systemd-networkd[1023]: eth0: DHCPv4 address 10.128.0.44/32, gateway 10.128.0.1 acquired from 169.254.169.254
Apr 12 18:49:56.417080 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3
Apr 12 18:49:56.403000 audit[1012]: AVC avc:  denied  { confidentiality } for  pid=1012 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1
Apr 12 18:49:56.403000 audit[1012]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55efccd0c190 a1=32194 a2=7f12c56c7bc5 a3=5 items=108 ppid=1011 pid=1012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:49:56.403000 audit: CWD cwd="/"
Apr 12 18:49:56.403000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=1 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=2 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=3 name=(null) inode=14593 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=4 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=5 name=(null) inode=14594 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.423360 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Apr 12 18:49:56.403000 audit: PATH item=6 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=7 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=8 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=9 name=(null) inode=14596 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=10 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=11 name=(null) inode=14597 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=12 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=13 name=(null) inode=14598 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=14 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=15 name=(null) inode=14599 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=16 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=17 name=(null) inode=14600 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=18 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=19 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=20 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=21 name=(null) inode=14602 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=22 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=23 name=(null) inode=14603 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=24 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=25 name=(null) inode=14604 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=26 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=27 name=(null) inode=14605 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=28 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=29 name=(null) inode=14606 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=30 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=31 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=32 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=33 name=(null) inode=14608 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=34 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=35 name=(null) inode=14609 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=36 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=37 name=(null) inode=14610 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=38 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=39 name=(null) inode=14611 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=40 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=41 name=(null) inode=14612 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=42 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=43 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=44 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=45 name=(null) inode=14614 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=46 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=47 name=(null) inode=14615 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=48 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=49 name=(null) inode=14616 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=50 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=51 name=(null) inode=14617 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=52 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=53 name=(null) inode=14618 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=55 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=56 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=57 name=(null) inode=14620 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=58 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=59 name=(null) inode=14621 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=60 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=61 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=62 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=63 name=(null) inode=14623 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=64 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=65 name=(null) inode=14624 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=66 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=67 name=(null) inode=14625 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=68 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=69 name=(null) inode=14626 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=70 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=71 name=(null) inode=14627 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=72 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=73 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=74 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=75 name=(null) inode=14629 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=76 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=77 name=(null) inode=14630 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=78 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=79 name=(null) inode=14631 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=80 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=81 name=(null) inode=14632 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=82 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=83 name=(null) inode=14633 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=84 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=85 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=86 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=87 name=(null) inode=14635 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=88 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=89 name=(null) inode=14636 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.438081 kernel: ACPI: button: Sleep Button [SLPF]
Apr 12 18:49:56.403000 audit: PATH item=90 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=91 name=(null) inode=14637 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=92 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=93 name=(null) inode=14638 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=94 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=95 name=(null) inode=14639 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=96 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=97 name=(null) inode=14640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=98 name=(null) inode=14640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=99 name=(null) inode=14641 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=100 name=(null) inode=14640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=101 name=(null) inode=14642 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=102 name=(null) inode=14640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=103 name=(null) inode=14643 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=104 name=(null) inode=14640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=105 name=(null) inode=14644 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=106 name=(null) inode=14640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PATH item=107 name=(null) inode=14645 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:49:56.403000 audit: PROCTITLE proctitle="(udev-worker)"
Apr 12 18:49:56.455076 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr
Apr 12 18:49:56.465067 kernel: EDAC MC: Ver: 3.0.0
Apr 12 18:49:56.486071 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4
Apr 12 18:49:56.509086 kernel: mousedev: PS/2 mouse device common for all mice
Apr 12 18:49:56.524586 systemd[1]: Finished systemd-udev-settle.service.
Apr 12 18:49:56.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:56.534897 systemd[1]: Starting lvm2-activation-early.service...
Apr 12 18:49:56.564879 lvm[1048]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Apr 12 18:49:56.596436 systemd[1]: Finished lvm2-activation-early.service.
Apr 12 18:49:56.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:56.605409 systemd[1]: Reached target cryptsetup.target.
Apr 12 18:49:56.615746 systemd[1]: Starting lvm2-activation.service...
Apr 12 18:49:56.621102 lvm[1049]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Apr 12 18:49:56.653629 systemd[1]: Finished lvm2-activation.service.
Apr 12 18:49:56.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:56.662413 systemd[1]: Reached target local-fs-pre.target.
Apr 12 18:49:56.671224 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw).
Apr 12 18:49:56.671291 systemd[1]: Reached target local-fs.target.
Apr 12 18:49:56.680218 systemd[1]: Reached target machines.target.
Apr 12 18:49:56.689835 systemd[1]: Starting ldconfig.service...
Apr 12 18:49:56.699405 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Apr 12 18:49:56.699491 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Apr 12 18:49:56.701066 systemd[1]: Starting systemd-boot-update.service...
Apr 12 18:49:56.710255 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service...
Apr 12 18:49:56.722409 systemd[1]: Starting systemd-machine-id-commit.service...
Apr 12 18:49:56.731384 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met.
Apr 12 18:49:56.731469 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met.
Apr 12 18:49:56.733059 systemd[1]: Starting systemd-tmpfiles-setup.service...
Apr 12 18:49:56.733948 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1051 (bootctl)
Apr 12 18:49:56.736996 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service...
Apr 12 18:49:56.758023 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service.
Apr 12 18:49:56.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:56.778383 systemd-tmpfiles[1055]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring.
Apr 12 18:49:56.788076 systemd-tmpfiles[1055]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring.
Apr 12 18:49:56.804272 systemd-tmpfiles[1055]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring.
Apr 12 18:49:56.915879 systemd-fsck[1060]: fsck.fat 4.2 (2021-01-31)
Apr 12 18:49:56.915879 systemd-fsck[1060]: /dev/sda1: 789 files, 119240/258078 clusters
Apr 12 18:49:56.919567 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service.
Apr 12 18:49:56.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:56.933890 systemd[1]: Mounting boot.mount...
Apr 12 18:49:56.982693 systemd[1]: Mounted boot.mount.
Apr 12 18:49:57.013741 systemd[1]: Finished systemd-boot-update.service.
Apr 12 18:49:57.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:57.112633 systemd[1]: Finished systemd-tmpfiles-setup.service.
Apr 12 18:49:57.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:57.123157 systemd[1]: Starting audit-rules.service...
Apr 12 18:49:57.131727 systemd[1]: Starting clean-ca-certificates.service...
Apr 12 18:49:57.141854 systemd[1]: Starting oem-gce-enable-oslogin.service...
Apr 12 18:49:57.152033 systemd[1]: Starting systemd-journal-catalog-update.service...
Apr 12 18:49:57.161000 audit: BPF prog-id=24 op=LOAD
Apr 12 18:49:57.163367 systemd[1]: Starting systemd-resolved.service...
Apr 12 18:49:57.170000 audit: BPF prog-id=25 op=LOAD
Apr 12 18:49:57.172548 systemd[1]: Starting systemd-timesyncd.service...
Apr 12 18:49:57.180901 systemd[1]: Starting systemd-update-utmp.service...
Apr 12 18:49:57.189031 systemd[1]: Finished clean-ca-certificates.service.
Apr 12 18:49:57.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:57.197893 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Apr 12 18:49:57.277000 audit[1072]: SYSTEM_BOOT pid=1072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:57.286726 systemd[1]: Finished systemd-update-utmp.service.
Apr 12 18:49:57.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:57.296110 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully.
Apr 12 18:49:57.296356 systemd[1]: Finished oem-gce-enable-oslogin.service.
Apr 12 18:49:57.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:57.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:57.319558 systemd[1]: Started systemd-timesyncd.service.
Apr 12 18:49:57.325928 systemd-timesyncd[1071]: Contacted time server 169.254.169.254:123 (169.254.169.254).
Apr 12 18:49:57.326724 systemd-timesyncd[1071]: Initial clock synchronization to Fri 2024-04-12 18:49:57.404676 UTC.
Apr 12 18:49:57.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:49:57.328484 systemd[1]: Reached target time-set.target.
Apr 12 18:49:57.354275 systemd[1]: Finished systemd-journal-catalog-update.service.
Apr 12 18:49:57.359000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1
Apr 12 18:49:57.359000 audit[1095]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd7024af50 a2=420 a3=0 items=0 ppid=1064 pid=1095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:49:57.359000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573
Apr 12 18:49:57.360823 augenrules[1095]: No rules
Apr 12 18:49:57.365527 systemd[1]: Finished audit-rules.service.
Apr 12 18:49:57.446446 systemd-resolved[1070]: Positive Trust Anchors:
Apr 12 18:49:57.447027 systemd-resolved[1070]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Apr 12 18:49:57.447219 systemd-resolved[1070]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Apr 12 18:49:57.482793 systemd-resolved[1070]: Defaulting to hostname 'linux'.
Apr 12 18:49:57.486159 systemd[1]: Started systemd-resolved.service.
Apr 12 18:49:57.494273 systemd[1]: Reached target network.target.
Apr 12 18:49:57.502197 systemd[1]: Reached target nss-lookup.target.
Apr 12 18:49:57.516342 ldconfig[1050]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start.
Apr 12 18:49:57.574767 systemd[1]: Finished ldconfig.service.
Apr 12 18:49:57.584025 systemd[1]: Starting systemd-update-done.service...
Apr 12 18:49:57.593380 systemd[1]: etc-machine\x2did.mount: Deactivated successfully.
Apr 12 18:49:57.594600 systemd[1]: Finished systemd-machine-id-commit.service.
Apr 12 18:49:57.603685 systemd[1]: Finished systemd-update-done.service.
Apr 12 18:49:57.612452 systemd[1]: Reached target sysinit.target.
Apr 12 18:49:57.621324 systemd[1]: Started motdgen.path.
Apr 12 18:49:57.629299 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path.
Apr 12 18:49:57.639457 systemd[1]: Started logrotate.timer.
Apr 12 18:49:57.646345 systemd[1]: Started mdadm.timer.
Apr 12 18:49:57.653243 systemd[1]: Started systemd-tmpfiles-clean.timer.
Apr 12 18:49:57.662186 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate).
Apr 12 18:49:57.662241 systemd[1]: Reached target paths.target.
Apr 12 18:49:57.669182 systemd[1]: Reached target timers.target.
Apr 12 18:49:57.676612 systemd[1]: Listening on dbus.socket.
Apr 12 18:49:57.685593 systemd[1]: Starting docker.socket...
Apr 12 18:49:57.697248 systemd[1]: Listening on sshd.socket.
Apr 12 18:49:57.704316 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Apr 12 18:49:57.705112 systemd[1]: Listening on docker.socket.
Apr 12 18:49:57.712391 systemd[1]: Reached target sockets.target.
Apr 12 18:49:57.721178 systemd[1]: Reached target basic.target.
Apr 12 18:49:57.728224 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met.
Apr 12 18:49:57.728279 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met.
Apr 12 18:49:57.729873 systemd[1]: Starting containerd.service...
Apr 12 18:49:57.739536 systemd[1]: Starting coreos-metadata-sshkeys@core.service...
Apr 12 18:49:57.750831 systemd[1]: Starting dbus.service...
Apr 12 18:49:57.758019 systemd[1]: Starting enable-oem-cloudinit.service...
Apr 12 18:49:57.767779 systemd[1]: Starting extend-filesystems.service...
Apr 12 18:49:57.776202 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment).
Apr 12 18:49:57.779553 jq[1108]: false
Apr 12 18:49:57.778122 systemd[1]: Starting motdgen.service...
Apr 12 18:49:57.788979 systemd[1]: Starting oem-gce.service...
Apr 12 18:49:57.797885 systemd[1]: Starting prepare-cni-plugins.service...
Apr 12 18:49:57.807668 systemd[1]: Starting prepare-critools.service...
Apr 12 18:49:57.811132 extend-filesystems[1109]: Found sda
Apr 12 18:49:57.811132 extend-filesystems[1109]: Found sda1
Apr 12 18:49:57.811132 extend-filesystems[1109]: Found sda2
Apr 12 18:49:57.811132 extend-filesystems[1109]: Found sda3
Apr 12 18:49:57.811132 extend-filesystems[1109]: Found usr
Apr 12 18:49:57.811132 extend-filesystems[1109]: Found sda4
Apr 12 18:49:57.811132 extend-filesystems[1109]: Found sda6
Apr 12 18:49:57.811132 extend-filesystems[1109]: Found sda7
Apr 12 18:49:57.811132 extend-filesystems[1109]: Found sda9
Apr 12 18:49:57.811132 extend-filesystems[1109]: Checking size of /dev/sda9
Apr 12 18:49:57.971439 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks
Apr 12 18:49:57.817236 systemd[1]: Starting ssh-key-proc-cmdline.service...
Apr 12 18:49:57.971903 extend-filesystems[1109]: Resized partition /dev/sda9
Apr 12 18:49:57.826093 systemd[1]: Starting sshd-keygen.service...
Apr 12 18:49:57.986650 extend-filesystems[1146]: resize2fs 1.46.5 (30-Dec-2021)
Apr 12 18:49:57.837271 systemd[1]: Starting systemd-logind.service...
Apr 12 18:49:57.844226 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Apr 12 18:49:57.844334 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2).
Apr 12 18:49:57.845135 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details.
Apr 12 18:49:57.997352 jq[1133]: true
Apr 12 18:49:57.846368 systemd[1]: Starting update-engine.service...
Apr 12 18:49:57.854948 systemd[1]: Starting update-ssh-keys-after-ignition.service...
Apr 12 18:49:57.866344 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'.
Apr 12 18:49:57.998381 tar[1136]: ./
Apr 12 18:49:57.998381 tar[1136]: ./loopback
Apr 12 18:49:57.866650 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped.
Apr 12 18:49:57.873923 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully.
Apr 12 18:49:57.874252 systemd[1]: Finished ssh-key-proc-cmdline.service.
Apr 12 18:49:57.999442 mkfs.ext4[1142]: mke2fs 1.46.5 (30-Dec-2021)
Apr 12 18:49:57.999442 mkfs.ext4[1142]: Discarding device blocks:      0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008             \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done
Apr 12 18:49:57.999442 mkfs.ext4[1142]: Creating filesystem with 262144 4k blocks and 65536 inodes
Apr 12 18:49:57.999442 mkfs.ext4[1142]: Filesystem UUID: d79f284c-23d6-497f-8718-b28befda469b
Apr 12 18:49:57.999442 mkfs.ext4[1142]: Superblock backups stored on blocks:
Apr 12 18:49:57.999442 mkfs.ext4[1142]:         32768, 98304, 163840, 229376
Apr 12 18:49:57.999442 mkfs.ext4[1142]: Allocating group tables: 0/8\u0008\u0008\u0008   \u0008\u0008\u0008done
Apr 12 18:49:57.999442 mkfs.ext4[1142]: Writing inode tables: 0/8\u0008\u0008\u0008   \u0008\u0008\u0008done
Apr 12 18:49:57.999442 mkfs.ext4[1142]: Creating journal (8192 blocks): done
Apr 12 18:49:57.999442 mkfs.ext4[1142]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008   \u0008\u0008\u0008done
Apr 12 18:49:57.961592 systemd[1]: motdgen.service: Deactivated successfully.
Apr 12 18:49:58.000218 jq[1140]: true
Apr 12 18:49:57.961968 systemd[1]: Finished motdgen.service.
Apr 12 18:49:58.003710 umount[1156]: umount: /var/lib/flatcar-oem-gce.img: not mounted.
Apr 12 18:49:58.007792 dbus-daemon[1107]: [system] SELinux support is enabled
Apr 12 18:49:58.008041 systemd[1]: Started dbus.service.
Apr 12 18:49:58.012530 tar[1137]: crictl
Apr 12 18:49:58.021884 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml).
Apr 12 18:49:58.021961 systemd[1]: Reached target system-config.target.
Apr 12 18:49:58.037102 kernel: EXT4-fs (sda9): resized filesystem to 2538491
Apr 12 18:49:58.037218 kernel: loop0: detected capacity change from 0 to 2097152
Apr 12 18:49:58.042303 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url).
Apr 12 18:49:58.042349 systemd[1]: Reached target user-config.target.
Apr 12 18:49:58.140088 update_engine[1131]: I0412 18:49:58.088423  1131 main.cc:92] Flatcar Update Engine starting
Apr 12 18:49:58.140088 update_engine[1131]: I0412 18:49:58.094868  1131 update_check_scheduler.cc:74] Next update check in 3m42s
Apr 12 18:49:58.074089 dbus-daemon[1107]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1023 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0")
Apr 12 18:49:58.139396 systemd[1]: Starting systemd-hostnamed.service...
Apr 12 18:49:58.141959 extend-filesystems[1146]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required
Apr 12 18:49:58.141959 extend-filesystems[1146]: old_desc_blocks = 1, new_desc_blocks = 2
Apr 12 18:49:58.141959 extend-filesystems[1146]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long.
Apr 12 18:49:58.252248 kernel: EXT4-fs (loop0): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none.
Apr 12 18:49:58.252356 env[1141]: time="2024-04-12T18:49:58.228017824Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16
Apr 12 18:49:58.252764 extend-filesystems[1109]: Resized filesystem in /dev/sda9
Apr 12 18:49:58.272306 bash[1171]: Updated "/home/core/.ssh/authorized_keys"
Apr 12 18:49:58.147063 systemd[1]: extend-filesystems.service: Deactivated successfully.
Apr 12 18:49:58.147422 systemd[1]: Finished extend-filesystems.service.
Apr 12 18:49:58.166195 systemd[1]: Finished update-ssh-keys-after-ignition.service.
Apr 12 18:49:58.207672 systemd[1]: Started update-engine.service.
Apr 12 18:49:58.225357 systemd[1]: Started locksmithd.service.
Apr 12 18:49:58.254636 systemd-logind[1129]: Watching system buttons on /dev/input/event1 (Power Button)
Apr 12 18:49:58.254670 systemd-logind[1129]: Watching system buttons on /dev/input/event2 (Sleep Button)
Apr 12 18:49:58.254702 systemd-logind[1129]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard)
Apr 12 18:49:58.272241 systemd-logind[1129]: New seat seat0.
Apr 12 18:49:58.277281 systemd[1]: Started systemd-logind.service.
Apr 12 18:49:58.310680 tar[1136]: ./bandwidth
Apr 12 18:49:58.322283 systemd-networkd[1023]: eth0: Gained IPv6LL
Apr 12 18:49:58.341750 dbus-daemon[1107]: [system] Successfully activated service 'org.freedesktop.hostname1'
Apr 12 18:49:58.341976 systemd[1]: Started systemd-hostnamed.service.
Apr 12 18:49:58.342966 dbus-daemon[1107]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1173 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0")
Apr 12 18:49:58.355018 systemd[1]: Starting polkit.service...
Apr 12 18:49:58.373348 coreos-metadata[1106]: Apr 12 18:49:58.373 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1
Apr 12 18:49:58.381342 coreos-metadata[1106]: Apr 12 18:49:58.381 INFO Fetch failed with 404: resource not found
Apr 12 18:49:58.381594 coreos-metadata[1106]: Apr 12 18:49:58.381 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1
Apr 12 18:49:58.382726 coreos-metadata[1106]: Apr 12 18:49:58.382 INFO Fetch successful
Apr 12 18:49:58.382952 coreos-metadata[1106]: Apr 12 18:49:58.382 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1
Apr 12 18:49:58.384214 coreos-metadata[1106]: Apr 12 18:49:58.384 INFO Fetch failed with 404: resource not found
Apr 12 18:49:58.384460 coreos-metadata[1106]: Apr 12 18:49:58.384 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1
Apr 12 18:49:58.385639 coreos-metadata[1106]: Apr 12 18:49:58.385 INFO Fetch failed with 404: resource not found
Apr 12 18:49:58.385845 coreos-metadata[1106]: Apr 12 18:49:58.385 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1
Apr 12 18:49:58.387141 coreos-metadata[1106]: Apr 12 18:49:58.386 INFO Fetch successful
Apr 12 18:49:58.390046 unknown[1106]: wrote ssh authorized keys file for user: core
Apr 12 18:49:58.431491 update-ssh-keys[1183]: Updated "/home/core/.ssh/authorized_keys"
Apr 12 18:49:58.432745 systemd[1]: Finished coreos-metadata-sshkeys@core.service.
Apr 12 18:49:58.533099 env[1141]: time="2024-04-12T18:49:58.532957621Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1
Apr 12 18:49:58.533252 env[1141]: time="2024-04-12T18:49:58.533193491Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1
Apr 12 18:49:58.535864 env[1141]: time="2024-04-12T18:49:58.535807916Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1
Apr 12 18:49:58.535864 env[1141]: time="2024-04-12T18:49:58.535862788Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1
Apr 12 18:49:58.536253 env[1141]: time="2024-04-12T18:49:58.536211373Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Apr 12 18:49:58.536350 env[1141]: time="2024-04-12T18:49:58.536254158Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1
Apr 12 18:49:58.536350 env[1141]: time="2024-04-12T18:49:58.536277306Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured"
Apr 12 18:49:58.536350 env[1141]: time="2024-04-12T18:49:58.536303800Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1
Apr 12 18:49:58.536499 env[1141]: time="2024-04-12T18:49:58.536426229Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1
Apr 12 18:49:58.536803 env[1141]: time="2024-04-12T18:49:58.536766263Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1
Apr 12 18:49:58.537083 env[1141]: time="2024-04-12T18:49:58.537017257Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Apr 12 18:49:58.537083 env[1141]: time="2024-04-12T18:49:58.537069151Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1
Apr 12 18:49:58.537203 env[1141]: time="2024-04-12T18:49:58.537154025Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured"
Apr 12 18:49:58.537203 env[1141]: time="2024-04-12T18:49:58.537176655Z" level=info msg="metadata content store policy set" policy=shared
Apr 12 18:49:58.545892 env[1141]: time="2024-04-12T18:49:58.545834490Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1
Apr 12 18:49:58.545892 env[1141]: time="2024-04-12T18:49:58.545892448Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1
Apr 12 18:49:58.546106 env[1141]: time="2024-04-12T18:49:58.545915849Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1
Apr 12 18:49:58.546106 env[1141]: time="2024-04-12T18:49:58.545974742Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1
Apr 12 18:49:58.546106 env[1141]: time="2024-04-12T18:49:58.546000814Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1
Apr 12 18:49:58.546255 env[1141]: time="2024-04-12T18:49:58.546102516Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1
Apr 12 18:49:58.546255 env[1141]: time="2024-04-12T18:49:58.546128019Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1
Apr 12 18:49:58.546255 env[1141]: time="2024-04-12T18:49:58.546152426Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1
Apr 12 18:49:58.546255 env[1141]: time="2024-04-12T18:49:58.546185349Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1
Apr 12 18:49:58.546255 env[1141]: time="2024-04-12T18:49:58.546211366Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1
Apr 12 18:49:58.546255 env[1141]: time="2024-04-12T18:49:58.546238038Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1
Apr 12 18:49:58.546518 env[1141]: time="2024-04-12T18:49:58.546260325Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1
Apr 12 18:49:58.546518 env[1141]: time="2024-04-12T18:49:58.546420050Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2
Apr 12 18:49:58.546626 env[1141]: time="2024-04-12T18:49:58.546540703Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1
Apr 12 18:49:58.547095 env[1141]: time="2024-04-12T18:49:58.547063146Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1
Apr 12 18:49:58.547188 env[1141]: time="2024-04-12T18:49:58.547115760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1
Apr 12 18:49:58.547188 env[1141]: time="2024-04-12T18:49:58.547140759Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1
Apr 12 18:49:58.547290 env[1141]: time="2024-04-12T18:49:58.547228837Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1
Apr 12 18:49:58.547290 env[1141]: time="2024-04-12T18:49:58.547253824Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1
Apr 12 18:49:58.547395 env[1141]: time="2024-04-12T18:49:58.547344027Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1
Apr 12 18:49:58.547395 env[1141]: time="2024-04-12T18:49:58.547370242Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1
Apr 12 18:49:58.547498 env[1141]: time="2024-04-12T18:49:58.547403335Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1
Apr 12 18:49:58.547498 env[1141]: time="2024-04-12T18:49:58.547425976Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1
Apr 12 18:49:58.547498 env[1141]: time="2024-04-12T18:49:58.547448475Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1
Apr 12 18:49:58.547498 env[1141]: time="2024-04-12T18:49:58.547469442Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1
Apr 12 18:49:58.547690 env[1141]: time="2024-04-12T18:49:58.547494413Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1
Apr 12 18:49:58.547690 env[1141]: time="2024-04-12T18:49:58.547666233Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1
Apr 12 18:49:58.547793 env[1141]: time="2024-04-12T18:49:58.547690587Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1
Apr 12 18:49:58.547793 env[1141]: time="2024-04-12T18:49:58.547712510Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1
Apr 12 18:49:58.547793 env[1141]: time="2024-04-12T18:49:58.547734445Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1
Apr 12 18:49:58.547793 env[1141]: time="2024-04-12T18:49:58.547759533Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1
Apr 12 18:49:58.547793 env[1141]: time="2024-04-12T18:49:58.547781100Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1
Apr 12 18:49:58.548029 env[1141]: time="2024-04-12T18:49:58.547814440Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin"
Apr 12 18:49:58.548029 env[1141]: time="2024-04-12T18:49:58.547866632Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1
Apr 12 18:49:58.548311 env[1141]: time="2024-04-12T18:49:58.548218848Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}"
Apr 12 18:49:58.553131 env[1141]: time="2024-04-12T18:49:58.548325717Z" level=info msg="Connect containerd service"
Apr 12 18:49:58.553131 env[1141]: time="2024-04-12T18:49:58.548373800Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\""
Apr 12 18:49:58.548913 polkitd[1182]: Started polkitd version 121
Apr 12 18:49:58.558893 env[1141]: time="2024-04-12T18:49:58.558839462Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Apr 12 18:49:58.560559 env[1141]: time="2024-04-12T18:49:58.559066442Z" level=info msg="Start subscribing containerd event"
Apr 12 18:49:58.560559 env[1141]: time="2024-04-12T18:49:58.559159162Z" level=info msg="Start recovering state"
Apr 12 18:49:58.560559 env[1141]: time="2024-04-12T18:49:58.559246547Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc
Apr 12 18:49:58.560559 env[1141]: time="2024-04-12T18:49:58.559279559Z" level=info msg="Start event monitor"
Apr 12 18:49:58.560559 env[1141]: time="2024-04-12T18:49:58.559326758Z" level=info msg=serving... address=/run/containerd/containerd.sock
Apr 12 18:49:58.560559 env[1141]: time="2024-04-12T18:49:58.559329621Z" level=info msg="Start snapshots syncer"
Apr 12 18:49:58.560559 env[1141]: time="2024-04-12T18:49:58.559364751Z" level=info msg="Start cni network conf syncer for default"
Apr 12 18:49:58.560559 env[1141]: time="2024-04-12T18:49:58.559378561Z" level=info msg="Start streaming server"
Apr 12 18:49:58.560559 env[1141]: time="2024-04-12T18:49:58.559412531Z" level=info msg="containerd successfully booted in 0.332771s"
Apr 12 18:49:58.559543 systemd[1]: Started containerd.service.
Apr 12 18:49:58.577131 polkitd[1182]: Loading rules from directory /etc/polkit-1/rules.d
Apr 12 18:49:58.577230 polkitd[1182]: Loading rules from directory /usr/share/polkit-1/rules.d
Apr 12 18:49:58.580371 polkitd[1182]: Finished loading, compiling and executing 2 rules
Apr 12 18:49:58.583289 dbus-daemon[1107]: [system] Successfully activated service 'org.freedesktop.PolicyKit1'
Apr 12 18:49:58.583508 systemd[1]: Started polkit.service.
Apr 12 18:49:58.584174 polkitd[1182]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
Apr 12 18:49:58.611963 tar[1136]: ./ptp
Apr 12 18:49:58.626453 systemd-hostnamed[1173]: Hostname set to <ci-3510-3-3-666ed196292a7b896f45.c.flatcar-212911.internal> (transient)
Apr 12 18:49:58.629771 systemd-resolved[1070]: System hostname changed to 'ci-3510-3-3-666ed196292a7b896f45.c.flatcar-212911.internal'.
Apr 12 18:49:58.805668 tar[1136]: ./vlan
Apr 12 18:49:58.967294 tar[1136]: ./host-device
Apr 12 18:49:59.088993 tar[1136]: ./tuning
Apr 12 18:49:59.194620 tar[1136]: ./vrf
Apr 12 18:49:59.303141 tar[1136]: ./sbr
Apr 12 18:49:59.403831 tar[1136]: ./tap
Apr 12 18:49:59.522953 tar[1136]: ./dhcp
Apr 12 18:49:59.544692 systemd[1]: Finished prepare-critools.service.
Apr 12 18:49:59.808951 tar[1136]: ./static
Apr 12 18:49:59.892694 tar[1136]: ./firewall
Apr 12 18:50:00.010284 tar[1136]: ./macvlan
Apr 12 18:50:00.116738 tar[1136]: ./dummy
Apr 12 18:50:00.216917 tar[1136]: ./bridge
Apr 12 18:50:00.295206 tar[1136]: ./ipvlan
Apr 12 18:50:00.348136 tar[1136]: ./portmap
Apr 12 18:50:00.441146 tar[1136]: ./host-local
Apr 12 18:50:00.542640 systemd[1]: Finished prepare-cni-plugins.service.
Apr 12 18:50:02.590312 locksmithd[1179]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot"
Apr 12 18:50:03.628372 sshd_keygen[1145]: ssh-keygen: generating new host keys: RSA ECDSA ED25519
Apr 12 18:50:03.673422 systemd[1]: Finished sshd-keygen.service.
Apr 12 18:50:03.684622 systemd[1]: Starting issuegen.service...
Apr 12 18:50:03.696576 systemd[1]: issuegen.service: Deactivated successfully.
Apr 12 18:50:03.696858 systemd[1]: Finished issuegen.service.
Apr 12 18:50:03.706945 systemd[1]: Starting systemd-user-sessions.service...
Apr 12 18:50:03.722778 systemd[1]: Finished systemd-user-sessions.service.
Apr 12 18:50:03.736125 systemd[1]: Started getty@tty1.service.
Apr 12 18:50:03.745692 systemd[1]: Started serial-getty@ttyS0.service.
Apr 12 18:50:03.754556 systemd[1]: Reached target getty.target.
Apr 12 18:50:04.415187 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully.
Apr 12 18:50:06.436096 kernel: loop0: detected capacity change from 0 to 2097152
Apr 12 18:50:06.459380 systemd-nspawn[1215]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img.
Apr 12 18:50:06.459380 systemd-nspawn[1215]: Press ^] three times within 1s to kill container.
Apr 12 18:50:06.478118 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none.
Apr 12 18:50:06.569323 systemd[1]: Started oem-gce.service.
Apr 12 18:50:06.577707 systemd[1]: Reached target multi-user.target.
Apr 12 18:50:06.588301 systemd[1]: Starting systemd-update-utmp-runlevel.service...
Apr 12 18:50:06.602871 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully.
Apr 12 18:50:06.603128 systemd[1]: Finished systemd-update-utmp-runlevel.service.
Apr 12 18:50:06.613452 systemd[1]: Startup finished in 1.043s (kernel) + 8.619s (initrd) + 16.175s (userspace) = 25.839s.
Apr 12 18:50:06.674162 systemd-nspawn[1215]: + '[' -e /etc/default/instance_configs.cfg.template ']'
Apr 12 18:50:06.674162 systemd-nspawn[1215]: + echo -e '[InstanceSetup]\nset_host_keys = false'
Apr 12 18:50:06.674464 systemd-nspawn[1215]: + /usr/bin/google_instance_setup
Apr 12 18:50:07.204195 systemd[1]: Created slice system-sshd.slice.
Apr 12 18:50:07.206153 systemd[1]: Started sshd@0-10.128.0.44:22-139.178.89.65:43324.service.
Apr 12 18:50:07.379160 instance-setup[1221]: INFO Running google_set_multiqueue.
Apr 12 18:50:07.399273 instance-setup[1221]: INFO Set channels for eth0 to 2.
Apr 12 18:50:07.402853 instance-setup[1221]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1.
Apr 12 18:50:07.404241 instance-setup[1221]: INFO /proc/irq/31/smp_affinity_list: real affinity 0
Apr 12 18:50:07.404680 instance-setup[1221]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1.
Apr 12 18:50:07.406185 instance-setup[1221]: INFO /proc/irq/32/smp_affinity_list: real affinity 0
Apr 12 18:50:07.406507 instance-setup[1221]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1.
Apr 12 18:50:07.408092 instance-setup[1221]: INFO /proc/irq/33/smp_affinity_list: real affinity 1
Apr 12 18:50:07.408537 instance-setup[1221]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1.
Apr 12 18:50:07.409980 instance-setup[1221]: INFO /proc/irq/34/smp_affinity_list: real affinity 1
Apr 12 18:50:07.421945 instance-setup[1221]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus
Apr 12 18:50:07.422359 instance-setup[1221]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus
Apr 12 18:50:07.464579 systemd-nspawn[1215]: + /usr/bin/google_metadata_script_runner --script-type startup
Apr 12 18:50:07.588366 sshd[1225]: Accepted publickey for core from 139.178.89.65 port 43324 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs
Apr 12 18:50:07.591860 sshd[1225]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Apr 12 18:50:07.612571 systemd[1]: Created slice user-500.slice.
Apr 12 18:50:07.614566 systemd[1]: Starting user-runtime-dir@500.service...
Apr 12 18:50:07.631234 systemd-logind[1129]: New session 1 of user core.
Apr 12 18:50:07.641490 systemd[1]: Finished user-runtime-dir@500.service.
Apr 12 18:50:07.647317 systemd[1]: Starting user@500.service...
Apr 12 18:50:07.665121 (systemd)[1257]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0)
Apr 12 18:50:07.834208 systemd[1257]: Queued start job for default target default.target.
Apr 12 18:50:07.836489 systemd[1257]: Reached target paths.target.
Apr 12 18:50:07.836721 systemd[1257]: Reached target sockets.target.
Apr 12 18:50:07.836864 systemd[1257]: Reached target timers.target.
Apr 12 18:50:07.837026 systemd[1257]: Reached target basic.target.
Apr 12 18:50:07.837131 systemd[1257]: Reached target default.target.
Apr 12 18:50:07.837187 systemd[1257]: Startup finished in 158ms.
Apr 12 18:50:07.837226 systemd[1]: Started user@500.service.
Apr 12 18:50:07.838791 systemd[1]: Started session-1.scope.
Apr 12 18:50:07.888680 startup-script[1255]: INFO Starting startup scripts.
Apr 12 18:50:07.901992 startup-script[1255]: INFO No startup scripts found in metadata.
Apr 12 18:50:07.902200 startup-script[1255]: INFO Finished running startup scripts.
Apr 12 18:50:07.935847 systemd-nspawn[1215]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM
Apr 12 18:50:07.935847 systemd-nspawn[1215]: + daemon_pids=()
Apr 12 18:50:07.936134 systemd-nspawn[1215]: + for d in accounts clock_skew network
Apr 12 18:50:07.936401 systemd-nspawn[1215]: + daemon_pids+=($!)
Apr 12 18:50:07.936502 systemd-nspawn[1215]: + for d in accounts clock_skew network
Apr 12 18:50:07.936653 systemd-nspawn[1215]: + daemon_pids+=($!)
Apr 12 18:50:07.936750 systemd-nspawn[1215]: + for d in accounts clock_skew network
Apr 12 18:50:07.936928 systemd-nspawn[1215]: + daemon_pids+=($!)
Apr 12 18:50:07.937063 systemd-nspawn[1215]: + NOTIFY_SOCKET=/run/systemd/notify
Apr 12 18:50:07.937063 systemd-nspawn[1215]: + /usr/bin/systemd-notify --ready
Apr 12 18:50:07.937498 systemd-nspawn[1215]: + /usr/bin/google_network_daemon
Apr 12 18:50:07.937854 systemd-nspawn[1215]: + /usr/bin/google_clock_skew_daemon
Apr 12 18:50:07.938316 systemd-nspawn[1215]: + /usr/bin/google_accounts_daemon
Apr 12 18:50:08.001620 systemd-nspawn[1215]: + wait -n 36 37 38
Apr 12 18:50:08.103711 systemd[1]: Started sshd@1-10.128.0.44:22-139.178.89.65:43338.service.
Apr 12 18:50:08.466204 sshd[1272]: Accepted publickey for core from 139.178.89.65 port 43338 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs
Apr 12 18:50:08.467211 sshd[1272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Apr 12 18:50:08.475695 systemd[1]: Started session-2.scope.
Apr 12 18:50:08.477945 systemd-logind[1129]: New session 2 of user core.
Apr 12 18:50:08.727111 sshd[1272]: pam_unix(sshd:session): session closed for user core
Apr 12 18:50:08.732018 systemd[1]: sshd@1-10.128.0.44:22-139.178.89.65:43338.service: Deactivated successfully.
Apr 12 18:50:08.733196 systemd[1]: session-2.scope: Deactivated successfully.
Apr 12 18:50:08.735610 systemd-logind[1129]: Session 2 logged out. Waiting for processes to exit.
Apr 12 18:50:08.737431 systemd-logind[1129]: Removed session 2.
Apr 12 18:50:08.767329 google-clock-skew[1267]: INFO Starting Google Clock Skew daemon.
Apr 12 18:50:08.781023 systemd[1]: Started sshd@2-10.128.0.44:22-139.178.89.65:43342.service.
Apr 12 18:50:08.794910 google-clock-skew[1267]: INFO Clock drift token has changed: 0.
Apr 12 18:50:08.797983 groupadd[1283]: group added to /etc/group: name=google-sudoers, GID=1000
Apr 12 18:50:08.802957 systemd-nspawn[1215]: hwclock: Cannot access the Hardware Clock via any known method.
Apr 12 18:50:08.803354 groupadd[1283]: group added to /etc/gshadow: name=google-sudoers
Apr 12 18:50:08.803767 systemd-nspawn[1215]: hwclock: Use the --verbose option to see the details of our search for an access method.
Apr 12 18:50:08.804929 google-clock-skew[1267]: WARNING Failed to sync system time with hardware clock.
Apr 12 18:50:08.808979 groupadd[1283]: new group: name=google-sudoers, GID=1000
Apr 12 18:50:08.823992 google-accounts[1266]: INFO Starting Google Accounts daemon.
Apr 12 18:50:08.855480 google-networking[1268]: INFO Starting Google Networking daemon.
Apr 12 18:50:08.857433 google-accounts[1266]: WARNING OS Login not installed.
Apr 12 18:50:08.858649 google-accounts[1266]: INFO Creating a new user account for 0.
Apr 12 18:50:08.865572 systemd-nspawn[1215]: useradd: invalid user name '0': use --badname to ignore
Apr 12 18:50:08.866409 google-accounts[1266]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3..
Apr 12 18:50:09.134117 sshd[1285]: Accepted publickey for core from 139.178.89.65 port 43342 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs
Apr 12 18:50:09.136082 sshd[1285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Apr 12 18:50:09.142122 systemd-logind[1129]: New session 3 of user core.
Apr 12 18:50:09.143065 systemd[1]: Started session-3.scope.
Apr 12 18:50:09.381869 sshd[1285]: pam_unix(sshd:session): session closed for user core
Apr 12 18:50:09.386164 systemd[1]: sshd@2-10.128.0.44:22-139.178.89.65:43342.service: Deactivated successfully.
Apr 12 18:50:09.387209 systemd[1]: session-3.scope: Deactivated successfully.
Apr 12 18:50:09.388112 systemd-logind[1129]: Session 3 logged out. Waiting for processes to exit.
Apr 12 18:50:09.389500 systemd-logind[1129]: Removed session 3.
Apr 12 18:50:09.438116 systemd[1]: Started sshd@3-10.128.0.44:22-139.178.89.65:43352.service.
Apr 12 18:50:09.787728 sshd[1302]: Accepted publickey for core from 139.178.89.65 port 43352 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs
Apr 12 18:50:09.789333 sshd[1302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Apr 12 18:50:09.796133 systemd[1]: Started session-4.scope.
Apr 12 18:50:09.797130 systemd-logind[1129]: New session 4 of user core.
Apr 12 18:50:10.042465 sshd[1302]: pam_unix(sshd:session): session closed for user core
Apr 12 18:50:10.047262 systemd[1]: sshd@3-10.128.0.44:22-139.178.89.65:43352.service: Deactivated successfully.
Apr 12 18:50:10.048390 systemd[1]: session-4.scope: Deactivated successfully.
Apr 12 18:50:10.049321 systemd-logind[1129]: Session 4 logged out. Waiting for processes to exit.
Apr 12 18:50:10.050624 systemd-logind[1129]: Removed session 4.
Apr 12 18:50:10.097174 systemd[1]: Started sshd@4-10.128.0.44:22-139.178.89.65:43364.service.
Apr 12 18:50:10.441589 sshd[1308]: Accepted publickey for core from 139.178.89.65 port 43364 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs
Apr 12 18:50:10.443803 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Apr 12 18:50:10.450159 systemd-logind[1129]: New session 5 of user core.
Apr 12 18:50:10.450470 systemd[1]: Started session-5.scope.
Apr 12 18:50:10.668097 sudo[1311]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1
Apr 12 18:50:10.668517 sudo[1311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Apr 12 18:50:10.678362 dbus-daemon[1107]: \xd0\u000df\xd4\xc5U:  received setenforce notice (enforcing=-1751821456)
Apr 12 18:50:10.680491 sudo[1311]: pam_unix(sudo:session): session closed for user root
Apr 12 18:50:10.734424 sshd[1308]: pam_unix(sshd:session): session closed for user core
Apr 12 18:50:10.739936 systemd[1]: sshd@4-10.128.0.44:22-139.178.89.65:43364.service: Deactivated successfully.
Apr 12 18:50:10.741265 systemd[1]: session-5.scope: Deactivated successfully.
Apr 12 18:50:10.742291 systemd-logind[1129]: Session 5 logged out. Waiting for processes to exit.
Apr 12 18:50:10.743753 systemd-logind[1129]: Removed session 5.
Apr 12 18:50:10.788914 systemd[1]: Started sshd@5-10.128.0.44:22-139.178.89.65:43380.service.
Apr 12 18:50:11.132096 sshd[1315]: Accepted publickey for core from 139.178.89.65 port 43380 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs
Apr 12 18:50:11.134138 sshd[1315]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Apr 12 18:50:11.140918 systemd[1]: Started session-6.scope.
Apr 12 18:50:11.141552 systemd-logind[1129]: New session 6 of user core.
Apr 12 18:50:11.337294 sudo[1319]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules
Apr 12 18:50:11.337742 sudo[1319]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Apr 12 18:50:11.342229 sudo[1319]: pam_unix(sudo:session): session closed for user root
Apr 12 18:50:11.354621 sudo[1318]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules
Apr 12 18:50:11.355022 sudo[1318]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Apr 12 18:50:11.368025 systemd[1]: Stopping audit-rules.service...
Apr 12 18:50:11.368000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Apr 12 18:50:11.373299 auditctl[1322]: No rules
Apr 12 18:50:11.378274 kernel: kauditd_printk_skb: 178 callbacks suppressed
Apr 12 18:50:11.378400 kernel: audit: type=1305 audit(1712947811.368:162): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Apr 12 18:50:11.375473 systemd[1]: audit-rules.service: Deactivated successfully.
Apr 12 18:50:11.375734 systemd[1]: Stopped audit-rules.service.
Apr 12 18:50:11.381293 systemd[1]: Starting audit-rules.service...
Apr 12 18:50:11.368000 audit[1322]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcd92ba560 a2=420 a3=0 items=0 ppid=1 pid=1322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:11.420465 augenrules[1339]: No rules
Apr 12 18:50:11.421001 kernel: audit: type=1300 audit(1712947811.368:162): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcd92ba560 a2=420 a3=0 items=0 ppid=1 pid=1322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:11.368000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44
Apr 12 18:50:11.421747 systemd[1]: Finished audit-rules.service.
Apr 12 18:50:11.425504 sudo[1318]: pam_unix(sudo:session): session closed for user root
Apr 12 18:50:11.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:11.452250 kernel: audit: type=1327 audit(1712947811.368:162): proctitle=2F7362696E2F617564697463746C002D44
Apr 12 18:50:11.452433 kernel: audit: type=1131 audit(1712947811.374:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:11.452493 kernel: audit: type=1130 audit(1712947811.421:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:11.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:11.424000 audit[1318]: USER_END pid=1318 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:11.478365 sshd[1315]: pam_unix(sshd:session): session closed for user core
Apr 12 18:50:11.485416 systemd-logind[1129]: Session 6 logged out. Waiting for processes to exit.
Apr 12 18:50:11.487783 systemd[1]: sshd@5-10.128.0.44:22-139.178.89.65:43380.service: Deactivated successfully.
Apr 12 18:50:11.488848 systemd[1]: session-6.scope: Deactivated successfully.
Apr 12 18:50:11.491136 systemd-logind[1129]: Removed session 6.
Apr 12 18:50:11.499672 kernel: audit: type=1106 audit(1712947811.424:165): pid=1318 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:11.499831 kernel: audit: type=1104 audit(1712947811.424:166): pid=1318 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:11.424000 audit[1318]: CRED_DISP pid=1318 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:11.480000 audit[1315]: USER_END pid=1315 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Apr 12 18:50:11.555010 kernel: audit: type=1106 audit(1712947811.480:167): pid=1315 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Apr 12 18:50:11.566219 kernel: audit: type=1104 audit(1712947811.480:168): pid=1315 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Apr 12 18:50:11.480000 audit[1315]: CRED_DISP pid=1315 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Apr 12 18:50:11.561449 systemd[1]: Started sshd@6-10.128.0.44:22-139.178.89.65:43384.service.
Apr 12 18:50:11.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.44:22-139.178.89.65:43380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:11.603509 kernel: audit: type=1131 audit(1712947811.487:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.44:22-139.178.89.65:43380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:11.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.44:22-139.178.89.65:43384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:11.910000 audit[1345]: USER_ACCT pid=1345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Apr 12 18:50:11.912295 sshd[1345]: Accepted publickey for core from 139.178.89.65 port 43384 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs
Apr 12 18:50:11.912000 audit[1345]: CRED_ACQ pid=1345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Apr 12 18:50:11.912000 audit[1345]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff32e38820 a2=3 a3=0 items=0 ppid=1 pid=1345 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:11.912000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Apr 12 18:50:11.914164 sshd[1345]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Apr 12 18:50:11.920767 systemd[1]: Started session-7.scope.
Apr 12 18:50:11.921575 systemd-logind[1129]: New session 7 of user core.
Apr 12 18:50:11.927000 audit[1345]: USER_START pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Apr 12 18:50:11.930000 audit[1347]: CRED_ACQ pid=1347 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Apr 12 18:50:12.114000 audit[1348]: USER_ACCT pid=1348 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:12.116104 sudo[1348]:     core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh
Apr 12 18:50:12.115000 audit[1348]: CRED_REFR pid=1348 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:12.116818 sudo[1348]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Apr 12 18:50:12.118000 audit[1348]: USER_START pid=1348 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:12.709871 systemd[1]: Reloading.
Apr 12 18:50:12.798262 /usr/lib/systemd/system-generators/torcx-generator[1377]: time="2024-04-12T18:50:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]"
Apr 12 18:50:12.799009 /usr/lib/systemd/system-generators/torcx-generator[1377]: time="2024-04-12T18:50:12Z" level=info msg="torcx already run"
Apr 12 18:50:12.914307 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Apr 12 18:50:12.914334 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Apr 12 18:50:12.938471 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Apr 12 18:50:13.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.027000 audit: BPF prog-id=34 op=LOAD
Apr 12 18:50:13.027000 audit: BPF prog-id=21 op=UNLOAD
Apr 12 18:50:13.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.027000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.028000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.028000 audit: BPF prog-id=35 op=LOAD
Apr 12 18:50:13.028000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.028000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.028000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.028000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.028000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.028000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.028000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.028000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.028000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.028000 audit: BPF prog-id=36 op=LOAD
Apr 12 18:50:13.028000 audit: BPF prog-id=22 op=UNLOAD
Apr 12 18:50:13.028000 audit: BPF prog-id=23 op=UNLOAD
Apr 12 18:50:13.032000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.032000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.032000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.032000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.032000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.032000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.032000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.032000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.032000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.032000 audit: BPF prog-id=37 op=LOAD
Apr 12 18:50:13.032000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.032000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.032000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.032000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.032000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.032000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.032000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.032000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.032000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.032000 audit: BPF prog-id=38 op=LOAD
Apr 12 18:50:13.032000 audit: BPF prog-id=18 op=UNLOAD
Apr 12 18:50:13.032000 audit: BPF prog-id=19 op=UNLOAD
Apr 12 18:50:13.033000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.033000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.033000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.033000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.033000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.033000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.033000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.033000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.033000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.033000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.033000 audit: BPF prog-id=39 op=LOAD
Apr 12 18:50:13.033000 audit: BPF prog-id=25 op=UNLOAD
Apr 12 18:50:13.035000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.035000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.035000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.035000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.035000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.035000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.035000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.035000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.035000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.035000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.035000 audit: BPF prog-id=40 op=LOAD
Apr 12 18:50:13.035000 audit: BPF prog-id=24 op=UNLOAD
Apr 12 18:50:13.036000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.036000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.036000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.036000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.036000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.036000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.036000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.036000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.036000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.036000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.036000 audit: BPF prog-id=41 op=LOAD
Apr 12 18:50:13.036000 audit: BPF prog-id=32 op=UNLOAD
Apr 12 18:50:13.061000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.061000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.061000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.061000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.061000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.061000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.061000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.061000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.061000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.062000 audit: BPF prog-id=42 op=LOAD
Apr 12 18:50:13.062000 audit: BPF prog-id=15 op=UNLOAD
Apr 12 18:50:13.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.062000 audit: BPF prog-id=43 op=LOAD
Apr 12 18:50:13.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.062000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.062000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.062000 audit: BPF prog-id=44 op=LOAD
Apr 12 18:50:13.062000 audit: BPF prog-id=16 op=UNLOAD
Apr 12 18:50:13.062000 audit: BPF prog-id=17 op=UNLOAD
Apr 12 18:50:13.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.065000 audit: BPF prog-id=45 op=LOAD
Apr 12 18:50:13.065000 audit: BPF prog-id=26 op=UNLOAD
Apr 12 18:50:13.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.065000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.065000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.066000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.066000 audit: BPF prog-id=46 op=LOAD
Apr 12 18:50:13.066000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.066000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.066000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.066000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.066000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.066000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.066000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.066000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.066000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.066000 audit: BPF prog-id=47 op=LOAD
Apr 12 18:50:13.066000 audit: BPF prog-id=27 op=UNLOAD
Apr 12 18:50:13.066000 audit: BPF prog-id=28 op=UNLOAD
Apr 12 18:50:13.066000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.066000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.066000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.066000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.066000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.066000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.066000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.066000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.066000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.067000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.067000 audit: BPF prog-id=48 op=LOAD
Apr 12 18:50:13.067000 audit: BPF prog-id=29 op=UNLOAD
Apr 12 18:50:13.067000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.067000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.067000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.067000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.067000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.067000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.067000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.067000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.067000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.067000 audit: BPF prog-id=49 op=LOAD
Apr 12 18:50:13.067000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.067000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.067000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.067000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.067000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.067000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.067000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.067000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.067000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.067000 audit: BPF prog-id=50 op=LOAD
Apr 12 18:50:13.067000 audit: BPF prog-id=30 op=UNLOAD
Apr 12 18:50:13.067000 audit: BPF prog-id=31 op=UNLOAD
Apr 12 18:50:13.070000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.070000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.070000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.070000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.070000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.070000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.070000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.070000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.070000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.070000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:13.070000 audit: BPF prog-id=51 op=LOAD
Apr 12 18:50:13.070000 audit: BPF prog-id=20 op=UNLOAD
Apr 12 18:50:13.088855 systemd[1]: Starting systemd-networkd-wait-online.service...
Apr 12 18:50:13.098903 systemd[1]: Finished systemd-networkd-wait-online.service.
Apr 12 18:50:13.099815 systemd[1]: Reached target network-online.target.
Apr 12 18:50:13.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:13.102364 systemd[1]: Started kubelet.service.
Apr 12 18:50:13.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:13.124027 systemd[1]: Starting coreos-metadata.service...
Apr 12 18:50:13.206913 coreos-metadata[1429]: Apr 12 18:50:13.206 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/hostname: Attempt #1
Apr 12 18:50:13.209075 coreos-metadata[1429]: Apr 12 18:50:13.208 INFO Fetch successful
Apr 12 18:50:13.215151 coreos-metadata[1429]: Apr 12 18:50:13.215 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip: Attempt #1
Apr 12 18:50:13.215305 kubelet[1421]: E0412 18:50:13.215114    1421 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml"
Apr 12 18:50:13.216221 coreos-metadata[1429]: Apr 12 18:50:13.216 INFO Fetch successful
Apr 12 18:50:13.216463 coreos-metadata[1429]: Apr 12 18:50:13.216 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/ip: Attempt #1
Apr 12 18:50:13.217342 coreos-metadata[1429]: Apr 12 18:50:13.217 INFO Fetch successful
Apr 12 18:50:13.217573 coreos-metadata[1429]: Apr 12 18:50:13.217 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/machine-type: Attempt #1
Apr 12 18:50:13.218117 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Apr 12 18:50:13.218343 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Apr 12 18:50:13.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Apr 12 18:50:13.220976 coreos-metadata[1429]: Apr 12 18:50:13.219 INFO Fetch successful
Apr 12 18:50:13.229749 systemd[1]: Finished coreos-metadata.service.
Apr 12 18:50:13.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:13.682620 systemd[1]: Stopped kubelet.service.
Apr 12 18:50:13.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:13.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:13.707400 systemd[1]: Reloading.
Apr 12 18:50:13.820581 /usr/lib/systemd/system-generators/torcx-generator[1488]: time="2024-04-12T18:50:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]"
Apr 12 18:50:13.820631 /usr/lib/systemd/system-generators/torcx-generator[1488]: time="2024-04-12T18:50:13Z" level=info msg="torcx already run"
Apr 12 18:50:13.911820 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Apr 12 18:50:13.911853 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Apr 12 18:50:13.935883 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Apr 12 18:50:14.026000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.026000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.026000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.026000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.026000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.026000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.026000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.026000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.026000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.027000 audit: BPF prog-id=52 op=LOAD
Apr 12 18:50:14.027000 audit: BPF prog-id=34 op=UNLOAD
Apr 12 18:50:14.027000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.028000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.028000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.028000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.028000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.028000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.028000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.028000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.028000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.028000 audit: BPF prog-id=53 op=LOAD
Apr 12 18:50:14.028000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.028000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.028000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.028000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.028000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.028000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.028000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.028000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.029000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.029000 audit: BPF prog-id=54 op=LOAD
Apr 12 18:50:14.029000 audit: BPF prog-id=35 op=UNLOAD
Apr 12 18:50:14.029000 audit: BPF prog-id=36 op=UNLOAD
Apr 12 18:50:14.033000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.034000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.034000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.034000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.034000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.034000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.034000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.034000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.034000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.034000 audit: BPF prog-id=55 op=LOAD
Apr 12 18:50:14.034000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.034000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.034000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.034000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.034000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.034000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.034000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.034000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.034000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.034000 audit: BPF prog-id=56 op=LOAD
Apr 12 18:50:14.034000 audit: BPF prog-id=37 op=UNLOAD
Apr 12 18:50:14.034000 audit: BPF prog-id=38 op=UNLOAD
Apr 12 18:50:14.035000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.035000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.035000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.035000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.035000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.035000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.035000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.035000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.035000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.035000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.035000 audit: BPF prog-id=57 op=LOAD
Apr 12 18:50:14.035000 audit: BPF prog-id=39 op=UNLOAD
Apr 12 18:50:14.036000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.036000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.037000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.037000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.037000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.037000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.037000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.037000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.037000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.037000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.037000 audit: BPF prog-id=58 op=LOAD
Apr 12 18:50:14.037000 audit: BPF prog-id=40 op=UNLOAD
Apr 12 18:50:14.037000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.037000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.037000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.037000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.037000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.037000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.037000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.037000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.037000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.038000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.038000 audit: BPF prog-id=59 op=LOAD
Apr 12 18:50:14.038000 audit: BPF prog-id=41 op=UNLOAD
Apr 12 18:50:14.040000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.040000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.040000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.040000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.040000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.040000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.040000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.040000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.040000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.040000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.040000 audit: BPF prog-id=60 op=LOAD
Apr 12 18:50:14.040000 audit: BPF prog-id=42 op=UNLOAD
Apr 12 18:50:14.040000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.040000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.040000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.040000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.040000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.040000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.040000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.040000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.040000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.040000 audit: BPF prog-id=61 op=LOAD
Apr 12 18:50:14.040000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.041000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.041000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.041000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.041000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.041000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.041000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.041000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.041000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.041000 audit: BPF prog-id=62 op=LOAD
Apr 12 18:50:14.041000 audit: BPF prog-id=43 op=UNLOAD
Apr 12 18:50:14.041000 audit: BPF prog-id=44 op=UNLOAD
Apr 12 18:50:14.043000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.043000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.043000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.043000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.043000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.043000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.043000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.043000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.043000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.043000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.043000 audit: BPF prog-id=63 op=LOAD
Apr 12 18:50:14.043000 audit: BPF prog-id=45 op=UNLOAD
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit: BPF prog-id=64 op=LOAD
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit: BPF prog-id=65 op=LOAD
Apr 12 18:50:14.044000 audit: BPF prog-id=46 op=UNLOAD
Apr 12 18:50:14.044000 audit: BPF prog-id=47 op=UNLOAD
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.044000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.045000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.045000 audit: BPF prog-id=66 op=LOAD
Apr 12 18:50:14.045000 audit: BPF prog-id=48 op=UNLOAD
Apr 12 18:50:14.045000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.045000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.045000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.045000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.045000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.045000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.045000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.045000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.045000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.045000 audit: BPF prog-id=67 op=LOAD
Apr 12 18:50:14.045000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.045000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.045000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.045000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.045000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.045000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.045000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.045000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.045000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.045000 audit: BPF prog-id=68 op=LOAD
Apr 12 18:50:14.045000 audit: BPF prog-id=49 op=UNLOAD
Apr 12 18:50:14.045000 audit: BPF prog-id=50 op=UNLOAD
Apr 12 18:50:14.047000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.047000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.047000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.047000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.047000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.047000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.047000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.047000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.047000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.048000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.048000 audit: BPF prog-id=69 op=LOAD
Apr 12 18:50:14.048000 audit: BPF prog-id=51 op=UNLOAD
Apr 12 18:50:14.071294 systemd[1]: Started kubelet.service.
Apr 12 18:50:14.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:14.139057 kubelet[1529]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Apr 12 18:50:14.139057 kubelet[1529]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI.
Apr 12 18:50:14.139057 kubelet[1529]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Apr 12 18:50:14.139625 kubelet[1529]: I0412 18:50:14.139152    1529 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime"
Apr 12 18:50:14.842822 kubelet[1529]: I0412 18:50:14.842771    1529 server.go:415] "Kubelet version" kubeletVersion="v1.27.2"
Apr 12 18:50:14.842822 kubelet[1529]: I0412 18:50:14.842809    1529 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
Apr 12 18:50:14.843192 kubelet[1529]: I0412 18:50:14.843163    1529 server.go:837] "Client rotation is on, will bootstrap in background"
Apr 12 18:50:14.849353 kubelet[1529]: I0412 18:50:14.849312    1529 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Apr 12 18:50:14.851518 kubelet[1529]: I0412 18:50:14.851479    1529 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified.  defaulting to /"
Apr 12 18:50:14.851898 kubelet[1529]: I0412 18:50:14.851859    1529 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[]
Apr 12 18:50:14.851991 kubelet[1529]: I0412 18:50:14.851973    1529 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.1} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity:<nil> Percentage:0.05} GracePeriod:0s MinReclaim:<nil>} {Signal:imagefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.15} GracePeriod:0s MinReclaim:<nil>}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}
Apr 12 18:50:14.852184 kubelet[1529]: I0412 18:50:14.851998    1529 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container"
Apr 12 18:50:14.852184 kubelet[1529]: I0412 18:50:14.852018    1529 container_manager_linux.go:302] "Creating device plugin manager"
Apr 12 18:50:14.852184 kubelet[1529]: I0412 18:50:14.852181    1529 state_mem.go:36] "Initialized new in-memory state store"
Apr 12 18:50:14.856702 kubelet[1529]: I0412 18:50:14.856676    1529 kubelet.go:405] "Attempting to sync node with API server"
Apr 12 18:50:14.856835 kubelet[1529]: I0412 18:50:14.856712    1529 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests"
Apr 12 18:50:14.856835 kubelet[1529]: I0412 18:50:14.856757    1529 kubelet.go:309] "Adding apiserver pod source"
Apr 12 18:50:14.856835 kubelet[1529]: I0412 18:50:14.856790    1529 apiserver.go:42] "Waiting for node sync before watching apiserver pods"
Apr 12 18:50:14.857410 kubelet[1529]: E0412 18:50:14.857386    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:14.857609 kubelet[1529]: E0412 18:50:14.857589    1529 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:14.858181 kubelet[1529]: I0412 18:50:14.858161    1529 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1"
Apr 12 18:50:14.862947 kubelet[1529]: W0412 18:50:14.862905    1529 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.
Apr 12 18:50:14.863635 kubelet[1529]: I0412 18:50:14.863597    1529 server.go:1168] "Started kubelet"
Apr 12 18:50:14.864000 audit[1529]: AVC avc:  denied  { mac_admin } for  pid=1529 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.864000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Apr 12 18:50:14.864000 audit[1529]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000757950 a1=c0005b3cc8 a2=c000757920 a3=25 items=0 ppid=1 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:14.864000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Apr 12 18:50:14.864000 audit[1529]: AVC avc:  denied  { mac_admin } for  pid=1529 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.864000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Apr 12 18:50:14.864000 audit[1529]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b52800 a1=c0005b3ce0 a2=c0007579e0 a3=25 items=0 ppid=1 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:14.864000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Apr 12 18:50:14.866665 kubelet[1529]: I0412 18:50:14.865844    1529 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument"
Apr 12 18:50:14.866665 kubelet[1529]: I0412 18:50:14.865931    1529 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument"
Apr 12 18:50:14.866665 kubelet[1529]: I0412 18:50:14.866100    1529 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer"
Apr 12 18:50:14.867959 kubelet[1529]: I0412 18:50:14.867933    1529 server.go:162] "Starting to listen" address="0.0.0.0" port=10250
Apr 12 18:50:14.869090 kubelet[1529]: I0412 18:50:14.868903    1529 server.go:461] "Adding debug handlers to kubelet server"
Apr 12 18:50:14.870776 kubelet[1529]: I0412 18:50:14.870717    1529 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10
Apr 12 18:50:14.874830 kubelet[1529]: I0412 18:50:14.874805    1529 volume_manager.go:284] "Starting Kubelet Volume Manager"
Apr 12 18:50:14.875452 kubelet[1529]: I0412 18:50:14.875421    1529 desired_state_of_world_populator.go:145] "Desired state populator starts to run"
Apr 12 18:50:14.876499 kubelet[1529]: E0412 18:50:14.876473    1529 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs"
Apr 12 18:50:14.876611 kubelet[1529]: E0412 18:50:14.876511    1529 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem"
Apr 12 18:50:14.876691 kubelet[1529]: W0412 18:50:14.876610    1529 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.128.0.44" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Apr 12 18:50:14.876691 kubelet[1529]: E0412 18:50:14.876637    1529 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.128.0.44" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Apr 12 18:50:14.876792 kubelet[1529]: W0412 18:50:14.876696    1529 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Apr 12 18:50:14.876792 kubelet[1529]: E0412 18:50:14.876712    1529 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Apr 12 18:50:14.879487 kubelet[1529]: E0412 18:50:14.879083    1529 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.128.0.44\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms"
Apr 12 18:50:14.879487 kubelet[1529]: E0412 18:50:14.879131    1529 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44.17c59cf647b9789d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.44", UID:"10.128.0.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.44"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 863567005, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 863567005, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Apr 12 18:50:14.893080 kubelet[1529]: W0412 18:50:14.892249    1529 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Apr 12 18:50:14.893080 kubelet[1529]: E0412 18:50:14.892289    1529 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Apr 12 18:50:14.893080 kubelet[1529]: E0412 18:50:14.892361    1529 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44.17c59cf6487ec8f1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.44", UID:"10.128.0.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.44"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 876498161, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 876498161, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Apr 12 18:50:14.931526 kubelet[1529]: I0412 18:50:14.931497    1529 cpu_manager.go:214] "Starting CPU manager" policy="none"
Apr 12 18:50:14.931714 kubelet[1529]: I0412 18:50:14.931700    1529 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s"
Apr 12 18:50:14.931825 kubelet[1529]: I0412 18:50:14.931812    1529 state_mem.go:36] "Initialized new in-memory state store"
Apr 12 18:50:14.932734 kubelet[1529]: E0412 18:50:14.932642    1529 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44.17c59cf64bb7ea7c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.44", UID:"10.128.0.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.128.0.44 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.44"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 930573948, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 930573948, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Apr 12 18:50:14.933991 kubelet[1529]: E0412 18:50:14.933914    1529 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44.17c59cf64bb80883", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.44", UID:"10.128.0.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.128.0.44 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.44"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 930581635, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 930581635, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Apr 12 18:50:14.935287 kubelet[1529]: E0412 18:50:14.935214    1529 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44.17c59cf64bb82279", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.44", UID:"10.128.0.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.128.0.44 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.44"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 930588281, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 930588281, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Apr 12 18:50:14.935650 kubelet[1529]: I0412 18:50:14.935632    1529 policy_none.go:49] "None policy: Start"
Apr 12 18:50:14.936635 kubelet[1529]: I0412 18:50:14.936614    1529 memory_manager.go:169] "Starting memorymanager" policy="None"
Apr 12 18:50:14.936774 kubelet[1529]: I0412 18:50:14.936761    1529 state_mem.go:35] "Initializing new in-memory state store"
Apr 12 18:50:14.937000 audit[1542]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1542 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:14.937000 audit[1542]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffe58e2c30 a2=0 a3=7fffe58e2c1c items=0 ppid=1529 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:14.937000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Apr 12 18:50:14.942000 audit[1546]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1546 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:14.942000 audit[1546]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc39f060b0 a2=0 a3=7ffc39f0609c items=0 ppid=1529 pid=1546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:14.942000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Apr 12 18:50:14.944712 systemd[1]: Created slice kubepods.slice.
Apr 12 18:50:14.966859 systemd[1]: Created slice kubepods-besteffort.slice.
Apr 12 18:50:14.946000 audit[1548]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1548 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:14.946000 audit[1548]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff841ad480 a2=0 a3=7fff841ad46c items=0 ppid=1529 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:14.946000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Apr 12 18:50:14.972000 audit[1553]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1553 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:14.972000 audit[1553]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffeab7af790 a2=0 a3=7ffeab7af77c items=0 ppid=1529 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:14.972000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Apr 12 18:50:14.976674 systemd[1]: Created slice kubepods-burstable.slice.
Apr 12 18:50:14.980626 kubelet[1529]: I0412 18:50:14.980594    1529 kubelet_node_status.go:70] "Attempting to register node" node="10.128.0.44"
Apr 12 18:50:14.981818 kubelet[1529]: I0412 18:50:14.981793    1529 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found"
Apr 12 18:50:14.980000 audit[1529]: AVC avc:  denied  { mac_admin } for  pid=1529 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:14.980000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Apr 12 18:50:14.982527 kubelet[1529]: E0412 18:50:14.982394    1529 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.128.0.44"
Apr 12 18:50:14.982723 kubelet[1529]: E0412 18:50:14.982615    1529 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44.17c59cf64bb7ea7c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.44", UID:"10.128.0.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.128.0.44 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.44"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 930573948, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 980519599, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.44.17c59cf64bb7ea7c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Apr 12 18:50:14.985202 kubelet[1529]: E0412 18:50:14.985111    1529 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44.17c59cf64bb80883", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.44", UID:"10.128.0.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.128.0.44 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.44"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 930581635, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 980526602, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.44.17c59cf64bb80883" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Apr 12 18:50:14.980000 audit[1529]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dce8a0 a1=c00077d170 a2=c000dce870 a3=25 items=0 ppid=1 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:14.980000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Apr 12 18:50:14.985959 kubelet[1529]: I0412 18:50:14.985709    1529 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument"
Apr 12 18:50:14.986025 kubelet[1529]: I0412 18:50:14.985962    1529 plugin_manager.go:118] "Starting Kubelet Plugin Manager"
Apr 12 18:50:14.986794 kubelet[1529]: E0412 18:50:14.986750    1529 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.128.0.44\" not found"
Apr 12 18:50:14.987823 kubelet[1529]: E0412 18:50:14.987366    1529 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44.17c59cf64bb82279", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.44", UID:"10.128.0.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.128.0.44 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.44"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 930588281, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 980533562, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.44.17c59cf64bb82279" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Apr 12 18:50:14.992406 kubelet[1529]: E0412 18:50:14.992203    1529 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44.17c59cf64f4fa846", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.44", UID:"10.128.0.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.44"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 990850118, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 990850118, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Apr 12 18:50:15.038000 audit[1559]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1559 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:15.038000 audit[1559]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd7c981610 a2=0 a3=7ffd7c9815fc items=0 ppid=1529 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:15.038000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38
Apr 12 18:50:15.040425 kubelet[1529]: I0412 18:50:15.040372    1529 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4
Apr 12 18:50:15.041000 audit[1561]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1561 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:15.041000 audit[1561]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda864cf80 a2=0 a3=7ffda864cf6c items=0 ppid=1529 pid=1561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:15.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Apr 12 18:50:15.041000 audit[1560]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1560 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:15.041000 audit[1560]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdb0ed8140 a2=0 a3=7ffdb0ed812c items=0 ppid=1529 pid=1560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:15.041000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Apr 12 18:50:15.043702 kubelet[1529]: I0412 18:50:15.043669    1529 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6
Apr 12 18:50:15.043900 kubelet[1529]: I0412 18:50:15.043883    1529 status_manager.go:207] "Starting to sync pod status with apiserver"
Apr 12 18:50:15.042000 audit[1562]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1562 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:15.042000 audit[1562]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc84a4f3c0 a2=0 a3=7ffc84a4f3ac items=0 ppid=1529 pid=1562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:15.042000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Apr 12 18:50:15.044483 kubelet[1529]: I0412 18:50:15.044460    1529 kubelet.go:2257] "Starting kubelet main sync loop"
Apr 12 18:50:15.044750 kubelet[1529]: E0412 18:50:15.044730    1529 kubelet.go:2281] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful"
Apr 12 18:50:15.044000 audit[1563]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1563 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:15.044000 audit[1563]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd76ae6b40 a2=0 a3=7ffd76ae6b2c items=0 ppid=1529 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:15.044000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Apr 12 18:50:15.046951 kubelet[1529]: W0412 18:50:15.046913    1529 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Apr 12 18:50:15.046951 kubelet[1529]: E0412 18:50:15.046946    1529 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Apr 12 18:50:15.047000 audit[1564]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1564 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:15.047000 audit[1564]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc72a87530 a2=0 a3=7ffc72a8751c items=0 ppid=1529 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:15.047000 audit[1565]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1565 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:15.047000 audit[1565]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcd8029460 a2=0 a3=7ffcd802944c items=0 ppid=1529 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:15.047000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Apr 12 18:50:15.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Apr 12 18:50:15.049000 audit[1566]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1566 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:15.049000 audit[1566]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffec231cd80 a2=0 a3=7ffec231cd6c items=0 ppid=1529 pid=1566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:15.049000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Apr 12 18:50:15.081331 kubelet[1529]: E0412 18:50:15.081289    1529 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.128.0.44\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms"
Apr 12 18:50:15.184384 kubelet[1529]: I0412 18:50:15.184226    1529 kubelet_node_status.go:70] "Attempting to register node" node="10.128.0.44"
Apr 12 18:50:15.189594 kubelet[1529]: E0412 18:50:15.189480    1529 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44.17c59cf64bb7ea7c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.44", UID:"10.128.0.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.128.0.44 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.44"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 930573948, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 50, 15, 184177803, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.44.17c59cf64bb7ea7c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Apr 12 18:50:15.190324 kubelet[1529]: E0412 18:50:15.190298    1529 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.128.0.44"
Apr 12 18:50:15.191221 kubelet[1529]: E0412 18:50:15.191110    1529 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44.17c59cf64bb80883", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.44", UID:"10.128.0.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.128.0.44 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.44"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 930581635, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 50, 15, 184185835, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.44.17c59cf64bb80883" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Apr 12 18:50:15.192385 kubelet[1529]: E0412 18:50:15.192303    1529 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44.17c59cf64bb82279", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.44", UID:"10.128.0.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.128.0.44 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.44"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 930588281, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 50, 15, 184190411, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.44.17c59cf64bb82279" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Apr 12 18:50:15.484165 kubelet[1529]: E0412 18:50:15.483999    1529 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.128.0.44\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms"
Apr 12 18:50:15.592446 kubelet[1529]: I0412 18:50:15.592411    1529 kubelet_node_status.go:70] "Attempting to register node" node="10.128.0.44"
Apr 12 18:50:15.593704 kubelet[1529]: E0412 18:50:15.593664    1529 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.128.0.44"
Apr 12 18:50:15.594012 kubelet[1529]: E0412 18:50:15.593900    1529 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44.17c59cf64bb7ea7c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.44", UID:"10.128.0.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.128.0.44 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.44"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 930573948, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 50, 15, 592351485, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.44.17c59cf64bb7ea7c" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Apr 12 18:50:15.595118 kubelet[1529]: E0412 18:50:15.595018    1529 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44.17c59cf64bb80883", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.44", UID:"10.128.0.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.128.0.44 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.44"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 930581635, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 50, 15, 592366183, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.44.17c59cf64bb80883" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Apr 12 18:50:15.596316 kubelet[1529]: E0412 18:50:15.596244    1529 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44.17c59cf64bb82279", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.44", UID:"10.128.0.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.128.0.44 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.44"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 50, 14, 930588281, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 50, 15, 592373998, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.44.17c59cf64bb82279" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Apr 12 18:50:15.822765 kubelet[1529]: W0412 18:50:15.822724    1529 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.128.0.44" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Apr 12 18:50:15.822765 kubelet[1529]: E0412 18:50:15.822769    1529 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.128.0.44" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Apr 12 18:50:15.848953 kubelet[1529]: I0412 18:50:15.848897    1529 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials"
Apr 12 18:50:15.858434 kubelet[1529]: E0412 18:50:15.858370    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:16.234190 kubelet[1529]: E0412 18:50:16.234033    1529 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.128.0.44" not found
Apr 12 18:50:16.353892 kubelet[1529]: E0412 18:50:16.353847    1529 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.128.0.44\" not found" node="10.128.0.44"
Apr 12 18:50:16.395143 kubelet[1529]: I0412 18:50:16.395092    1529 kubelet_node_status.go:70] "Attempting to register node" node="10.128.0.44"
Apr 12 18:50:16.449589 kubelet[1529]: I0412 18:50:16.449548    1529 kubelet_node_status.go:73] "Successfully registered node" node="10.128.0.44"
Apr 12 18:50:16.463936 kubelet[1529]: I0412 18:50:16.463875    1529 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24"
Apr 12 18:50:16.464542 env[1141]: time="2024-04-12T18:50:16.464466587Z" level=info msg="No cni config template is specified, wait for other system components to drop the config."
Apr 12 18:50:16.465094 kubelet[1529]: I0412 18:50:16.464834    1529 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24"
Apr 12 18:50:16.484390 kubelet[1529]: E0412 18:50:16.484255    1529 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.44\" not found"
Apr 12 18:50:16.584938 kubelet[1529]: E0412 18:50:16.584881    1529 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.44\" not found"
Apr 12 18:50:16.612389 sudo[1348]: pam_unix(sudo:session): session closed for user root
Apr 12 18:50:16.611000 audit[1348]: USER_END pid=1348 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:16.618866 kernel: kauditd_printk_skb: 478 callbacks suppressed
Apr 12 18:50:16.618993 kernel: audit: type=1106 audit(1712947816.611:613): pid=1348 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:16.613000 audit[1348]: CRED_DISP pid=1348 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:16.644081 kernel: audit: type=1104 audit(1712947816.613:614): pid=1348 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:16.669283 sshd[1345]: pam_unix(sshd:session): session closed for user core
Apr 12 18:50:16.670000 audit[1345]: USER_END pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Apr 12 18:50:16.673978 systemd[1]: sshd@6-10.128.0.44:22-139.178.89.65:43384.service: Deactivated successfully.
Apr 12 18:50:16.675134 systemd[1]: session-7.scope: Deactivated successfully.
Apr 12 18:50:16.678104 systemd-logind[1129]: Session 7 logged out. Waiting for processes to exit.
Apr 12 18:50:16.679946 systemd-logind[1129]: Removed session 7.
Apr 12 18:50:16.670000 audit[1345]: CRED_DISP pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Apr 12 18:50:16.704221 kubelet[1529]: E0412 18:50:16.704189    1529 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.44\" not found"
Apr 12 18:50:16.727784 kernel: audit: type=1106 audit(1712947816.670:615): pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Apr 12 18:50:16.727949 kernel: audit: type=1104 audit(1712947816.670:616): pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Apr 12 18:50:16.727986 kernel: audit: type=1131 audit(1712947816.670:617): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.44:22-139.178.89.65:43384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:16.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.44:22-139.178.89.65:43384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:16.804801 kubelet[1529]: E0412 18:50:16.804750    1529 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.44\" not found"
Apr 12 18:50:16.859276 kubelet[1529]: E0412 18:50:16.859224    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:16.905783 kubelet[1529]: E0412 18:50:16.905676    1529 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.44\" not found"
Apr 12 18:50:17.006522 kubelet[1529]: E0412 18:50:17.006454    1529 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.44\" not found"
Apr 12 18:50:17.107675 kubelet[1529]: E0412 18:50:17.107524    1529 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.44\" not found"
Apr 12 18:50:17.207971 kubelet[1529]: E0412 18:50:17.207914    1529 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.44\" not found"
Apr 12 18:50:17.308689 kubelet[1529]: E0412 18:50:17.308630    1529 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.44\" not found"
Apr 12 18:50:17.409852 kubelet[1529]: E0412 18:50:17.409664    1529 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.44\" not found"
Apr 12 18:50:17.510212 kubelet[1529]: E0412 18:50:17.510129    1529 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.44\" not found"
Apr 12 18:50:17.610903 kubelet[1529]: E0412 18:50:17.610812    1529 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.44\" not found"
Apr 12 18:50:17.711779 kubelet[1529]: E0412 18:50:17.711588    1529 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.44\" not found"
Apr 12 18:50:17.812343 kubelet[1529]: E0412 18:50:17.812255    1529 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.44\" not found"
Apr 12 18:50:17.859958 kubelet[1529]: E0412 18:50:17.859859    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:17.912591 kubelet[1529]: E0412 18:50:17.912501    1529 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.44\" not found"
Apr 12 18:50:18.860500 kubelet[1529]: I0412 18:50:18.860431    1529 apiserver.go:52] "Watching apiserver"
Apr 12 18:50:18.861185 kubelet[1529]: E0412 18:50:18.860448    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:18.874356 kubelet[1529]: I0412 18:50:18.874310    1529 topology_manager.go:212] "Topology Admit Handler"
Apr 12 18:50:18.874558 kubelet[1529]: I0412 18:50:18.874455    1529 topology_manager.go:212] "Topology Admit Handler"
Apr 12 18:50:18.874558 kubelet[1529]: I0412 18:50:18.874518    1529 topology_manager.go:212] "Topology Admit Handler"
Apr 12 18:50:18.874969 kubelet[1529]: E0412 18:50:18.874945    1529 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qf2nb" podUID=0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db
Apr 12 18:50:18.877855 kubelet[1529]: I0412 18:50:18.877832    1529 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world"
Apr 12 18:50:18.882276 systemd[1]: Created slice kubepods-besteffort-poda034f98b_f092_429b_b560_8e04072337ff.slice.
Apr 12 18:50:18.892594 systemd[1]: Created slice kubepods-besteffort-pod543652d9_9134_494e_86db_2e7259ddcdbb.slice.
Apr 12 18:50:18.918588 kubelet[1529]: I0412 18:50:18.918544    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/543652d9-9134-494e-86db-2e7259ddcdbb-var-lib-calico\") pod \"calico-node-bkmww\" (UID: \"543652d9-9134-494e-86db-2e7259ddcdbb\") " pod="calico-system/calico-node-bkmww"
Apr 12 18:50:18.918799 kubelet[1529]: I0412 18:50:18.918606    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/543652d9-9134-494e-86db-2e7259ddcdbb-cni-bin-dir\") pod \"calico-node-bkmww\" (UID: \"543652d9-9134-494e-86db-2e7259ddcdbb\") " pod="calico-system/calico-node-bkmww"
Apr 12 18:50:18.918799 kubelet[1529]: I0412 18:50:18.918657    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db-kubelet-dir\") pod \"csi-node-driver-qf2nb\" (UID: \"0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db\") " pod="calico-system/csi-node-driver-qf2nb"
Apr 12 18:50:18.918799 kubelet[1529]: I0412 18:50:18.918691    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db-socket-dir\") pod \"csi-node-driver-qf2nb\" (UID: \"0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db\") " pod="calico-system/csi-node-driver-qf2nb"
Apr 12 18:50:18.918799 kubelet[1529]: I0412 18:50:18.918725    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vxwsp\" (UniqueName: \"kubernetes.io/projected/0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db-kube-api-access-vxwsp\") pod \"csi-node-driver-qf2nb\" (UID: \"0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db\") " pod="calico-system/csi-node-driver-qf2nb"
Apr 12 18:50:18.918799 kubelet[1529]: I0412 18:50:18.918756    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a034f98b-f092-429b-b560-8e04072337ff-lib-modules\") pod \"kube-proxy-2h9kk\" (UID: \"a034f98b-f092-429b-b560-8e04072337ff\") " pod="kube-system/kube-proxy-2h9kk"
Apr 12 18:50:18.919164 kubelet[1529]: I0412 18:50:18.918786    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/543652d9-9134-494e-86db-2e7259ddcdbb-lib-modules\") pod \"calico-node-bkmww\" (UID: \"543652d9-9134-494e-86db-2e7259ddcdbb\") " pod="calico-system/calico-node-bkmww"
Apr 12 18:50:18.919164 kubelet[1529]: I0412 18:50:18.918833    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/543652d9-9134-494e-86db-2e7259ddcdbb-xtables-lock\") pod \"calico-node-bkmww\" (UID: \"543652d9-9134-494e-86db-2e7259ddcdbb\") " pod="calico-system/calico-node-bkmww"
Apr 12 18:50:18.919164 kubelet[1529]: I0412 18:50:18.918877    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/543652d9-9134-494e-86db-2e7259ddcdbb-var-run-calico\") pod \"calico-node-bkmww\" (UID: \"543652d9-9134-494e-86db-2e7259ddcdbb\") " pod="calico-system/calico-node-bkmww"
Apr 12 18:50:18.919164 kubelet[1529]: I0412 18:50:18.918913    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/543652d9-9134-494e-86db-2e7259ddcdbb-cni-net-dir\") pod \"calico-node-bkmww\" (UID: \"543652d9-9134-494e-86db-2e7259ddcdbb\") " pod="calico-system/calico-node-bkmww"
Apr 12 18:50:18.919164 kubelet[1529]: I0412 18:50:18.918944    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a034f98b-f092-429b-b560-8e04072337ff-xtables-lock\") pod \"kube-proxy-2h9kk\" (UID: \"a034f98b-f092-429b-b560-8e04072337ff\") " pod="kube-system/kube-proxy-2h9kk"
Apr 12 18:50:18.919431 kubelet[1529]: I0412 18:50:18.918987    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/543652d9-9134-494e-86db-2e7259ddcdbb-tigera-ca-bundle\") pod \"calico-node-bkmww\" (UID: \"543652d9-9134-494e-86db-2e7259ddcdbb\") " pod="calico-system/calico-node-bkmww"
Apr 12 18:50:18.919431 kubelet[1529]: I0412 18:50:18.919025    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/543652d9-9134-494e-86db-2e7259ddcdbb-cni-log-dir\") pod \"calico-node-bkmww\" (UID: \"543652d9-9134-494e-86db-2e7259ddcdbb\") " pod="calico-system/calico-node-bkmww"
Apr 12 18:50:18.919431 kubelet[1529]: I0412 18:50:18.919105    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/543652d9-9134-494e-86db-2e7259ddcdbb-flexvol-driver-host\") pod \"calico-node-bkmww\" (UID: \"543652d9-9134-494e-86db-2e7259ddcdbb\") " pod="calico-system/calico-node-bkmww"
Apr 12 18:50:18.919431 kubelet[1529]: I0412 18:50:18.919145    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/a034f98b-f092-429b-b560-8e04072337ff-kube-proxy\") pod \"kube-proxy-2h9kk\" (UID: \"a034f98b-f092-429b-b560-8e04072337ff\") " pod="kube-system/kube-proxy-2h9kk"
Apr 12 18:50:18.919431 kubelet[1529]: I0412 18:50:18.919179    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/543652d9-9134-494e-86db-2e7259ddcdbb-policysync\") pod \"calico-node-bkmww\" (UID: \"543652d9-9134-494e-86db-2e7259ddcdbb\") " pod="calico-system/calico-node-bkmww"
Apr 12 18:50:18.919682 kubelet[1529]: I0412 18:50:18.919214    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/543652d9-9134-494e-86db-2e7259ddcdbb-node-certs\") pod \"calico-node-bkmww\" (UID: \"543652d9-9134-494e-86db-2e7259ddcdbb\") " pod="calico-system/calico-node-bkmww"
Apr 12 18:50:18.919682 kubelet[1529]: I0412 18:50:18.919254    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mzxwn\" (UniqueName: \"kubernetes.io/projected/543652d9-9134-494e-86db-2e7259ddcdbb-kube-api-access-mzxwn\") pod \"calico-node-bkmww\" (UID: \"543652d9-9134-494e-86db-2e7259ddcdbb\") " pod="calico-system/calico-node-bkmww"
Apr 12 18:50:18.919682 kubelet[1529]: I0412 18:50:18.919288    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db-varrun\") pod \"csi-node-driver-qf2nb\" (UID: \"0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db\") " pod="calico-system/csi-node-driver-qf2nb"
Apr 12 18:50:18.919682 kubelet[1529]: I0412 18:50:18.919326    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db-registration-dir\") pod \"csi-node-driver-qf2nb\" (UID: \"0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db\") " pod="calico-system/csi-node-driver-qf2nb"
Apr 12 18:50:18.919682 kubelet[1529]: I0412 18:50:18.919408    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qxsfg\" (UniqueName: \"kubernetes.io/projected/a034f98b-f092-429b-b560-8e04072337ff-kube-api-access-qxsfg\") pod \"kube-proxy-2h9kk\" (UID: \"a034f98b-f092-429b-b560-8e04072337ff\") " pod="kube-system/kube-proxy-2h9kk"
Apr 12 18:50:18.919682 kubelet[1529]: I0412 18:50:18.919426    1529 reconciler.go:41] "Reconciler: start to sync state"
Apr 12 18:50:19.021945 kubelet[1529]: E0412 18:50:19.021893    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:19.022191 kubelet[1529]: W0412 18:50:19.022164    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:19.022319 kubelet[1529]: E0412 18:50:19.022301    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:19.022774 kubelet[1529]: E0412 18:50:19.022746    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:19.023006 kubelet[1529]: W0412 18:50:19.022980    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:19.023165 kubelet[1529]: E0412 18:50:19.023147    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:19.023571 kubelet[1529]: E0412 18:50:19.023552    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:19.023695 kubelet[1529]: W0412 18:50:19.023678    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:19.023792 kubelet[1529]: E0412 18:50:19.023780    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:19.024208 kubelet[1529]: E0412 18:50:19.024190    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:19.024355 kubelet[1529]: W0412 18:50:19.024325    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:19.024475 kubelet[1529]: E0412 18:50:19.024461    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:19.032125 kubelet[1529]: E0412 18:50:19.032096    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:19.032125 kubelet[1529]: W0412 18:50:19.032121    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:19.032294 kubelet[1529]: E0412 18:50:19.032148    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:19.032476 kubelet[1529]: E0412 18:50:19.032453    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:19.032476 kubelet[1529]: W0412 18:50:19.032475    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:19.032614 kubelet[1529]: E0412 18:50:19.032497    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:19.032800 kubelet[1529]: E0412 18:50:19.032777    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:19.032800 kubelet[1529]: W0412 18:50:19.032799    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:19.032936 kubelet[1529]: E0412 18:50:19.032818    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:19.033139 kubelet[1529]: E0412 18:50:19.033117    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:19.033139 kubelet[1529]: W0412 18:50:19.033138    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:19.033293 kubelet[1529]: E0412 18:50:19.033156    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:19.033425 kubelet[1529]: E0412 18:50:19.033404    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:19.033494 kubelet[1529]: W0412 18:50:19.033424    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:19.033494 kubelet[1529]: E0412 18:50:19.033449    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:19.033754 kubelet[1529]: E0412 18:50:19.033730    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:19.033754 kubelet[1529]: W0412 18:50:19.033753    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:19.033898 kubelet[1529]: E0412 18:50:19.033772    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:19.035003 kubelet[1529]: E0412 18:50:19.034975    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:19.035003 kubelet[1529]: W0412 18:50:19.034999    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:19.035174 kubelet[1529]: E0412 18:50:19.035020    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:19.043596 kubelet[1529]: E0412 18:50:19.043571    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:19.043772 kubelet[1529]: W0412 18:50:19.043750    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:19.043884 kubelet[1529]: E0412 18:50:19.043869    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:19.051534 kubelet[1529]: E0412 18:50:19.051304    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:19.051534 kubelet[1529]: W0412 18:50:19.051330    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:19.051534 kubelet[1529]: E0412 18:50:19.051358    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:19.062340 kubelet[1529]: E0412 18:50:19.062311    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:19.062340 kubelet[1529]: W0412 18:50:19.062332    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:19.062537 kubelet[1529]: E0412 18:50:19.062359    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:19.191994 env[1141]: time="2024-04-12T18:50:19.190944058Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2h9kk,Uid:a034f98b-f092-429b-b560-8e04072337ff,Namespace:kube-system,Attempt:0,}"
Apr 12 18:50:19.198345 env[1141]: time="2024-04-12T18:50:19.198286082Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bkmww,Uid:543652d9-9134-494e-86db-2e7259ddcdbb,Namespace:calico-system,Attempt:0,}"
Apr 12 18:50:19.755803 env[1141]: time="2024-04-12T18:50:19.755734459Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:19.757124 env[1141]: time="2024-04-12T18:50:19.757065784Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:19.762872 env[1141]: time="2024-04-12T18:50:19.762807624Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:19.764175 env[1141]: time="2024-04-12T18:50:19.764124797Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:19.765308 env[1141]: time="2024-04-12T18:50:19.765264565Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:19.767952 env[1141]: time="2024-04-12T18:50:19.767893018Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:19.769167 env[1141]: time="2024-04-12T18:50:19.769127167Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:19.772978 env[1141]: time="2024-04-12T18:50:19.772934166Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:19.804869 env[1141]: time="2024-04-12T18:50:19.802933579Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Apr 12 18:50:19.804869 env[1141]: time="2024-04-12T18:50:19.803004549Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Apr 12 18:50:19.804869 env[1141]: time="2024-04-12T18:50:19.803026018Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Apr 12 18:50:19.804869 env[1141]: time="2024-04-12T18:50:19.803711273Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/be603f381bb6cec93523ca798038379e3377847ede7e1195100ecd4712351bef pid=1600 runtime=io.containerd.runc.v2
Apr 12 18:50:19.805226 env[1141]: time="2024-04-12T18:50:19.803801935Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Apr 12 18:50:19.805226 env[1141]: time="2024-04-12T18:50:19.803870781Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Apr 12 18:50:19.805226 env[1141]: time="2024-04-12T18:50:19.803889632Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Apr 12 18:50:19.805226 env[1141]: time="2024-04-12T18:50:19.804105850Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bbde84fb0d08924acba74c847cc35865d4d25af0f529bd557b83521da386f32d pid=1607 runtime=io.containerd.runc.v2
Apr 12 18:50:19.837790 systemd[1]: Started cri-containerd-be603f381bb6cec93523ca798038379e3377847ede7e1195100ecd4712351bef.scope.
Apr 12 18:50:19.854920 systemd[1]: Started cri-containerd-bbde84fb0d08924acba74c847cc35865d4d25af0f529bd557b83521da386f32d.scope.
Apr 12 18:50:19.861164 kubelet[1529]: E0412 18:50:19.861122    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:19.862000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.905166 kernel: audit: type=1400 audit(1712947819.862:618): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.905318 kernel: audit: type=1400 audit(1712947819.862:619): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.862000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.926190 kernel: audit: type=1400 audit(1712947819.862:620): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.862000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.954947 kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Apr 12 18:50:19.955138 kernel: audit: type=1400 audit(1712947819.862:621): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.862000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.862000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.862000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.862000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.862000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.862000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.862000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.862000 audit: BPF prog-id=70 op=LOAD
Apr 12 18:50:19.878000 audit[1623]: AVC avc:  denied  { bpf } for  pid=1623 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.878000 audit[1623]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1600 pid=1623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:19.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265363033663338316262366365633933353233636137393830333833
Apr 12 18:50:19.878000 audit[1623]: AVC avc:  denied  { perfmon } for  pid=1623 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.878000 audit[1623]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1600 pid=1623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:19.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265363033663338316262366365633933353233636137393830333833
Apr 12 18:50:19.878000 audit[1623]: AVC avc:  denied  { bpf } for  pid=1623 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.878000 audit[1623]: AVC avc:  denied  { bpf } for  pid=1623 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.878000 audit[1623]: AVC avc:  denied  { bpf } for  pid=1623 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.878000 audit[1623]: AVC avc:  denied  { perfmon } for  pid=1623 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.878000 audit[1623]: AVC avc:  denied  { perfmon } for  pid=1623 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.878000 audit[1623]: AVC avc:  denied  { perfmon } for  pid=1623 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.878000 audit[1623]: AVC avc:  denied  { perfmon } for  pid=1623 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.878000 audit[1623]: AVC avc:  denied  { perfmon } for  pid=1623 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.878000 audit[1623]: AVC avc:  denied  { bpf } for  pid=1623 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.878000 audit[1623]: AVC avc:  denied  { bpf } for  pid=1623 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.878000 audit: BPF prog-id=71 op=LOAD
Apr 12 18:50:19.878000 audit[1623]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000342d90 items=0 ppid=1600 pid=1623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:19.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265363033663338316262366365633933353233636137393830333833
Apr 12 18:50:19.883000 audit[1623]: AVC avc:  denied  { bpf } for  pid=1623 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.883000 audit[1623]: AVC avc:  denied  { bpf } for  pid=1623 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.883000 audit[1623]: AVC avc:  denied  { perfmon } for  pid=1623 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.883000 audit[1623]: AVC avc:  denied  { perfmon } for  pid=1623 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.883000 audit[1623]: AVC avc:  denied  { perfmon } for  pid=1623 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.883000 audit[1623]: AVC avc:  denied  { perfmon } for  pid=1623 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.883000 audit[1623]: AVC avc:  denied  { perfmon } for  pid=1623 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.883000 audit[1623]: AVC avc:  denied  { bpf } for  pid=1623 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.883000 audit[1623]: AVC avc:  denied  { bpf } for  pid=1623 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.883000 audit: BPF prog-id=72 op=LOAD
Apr 12 18:50:19.883000 audit[1623]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000342dd8 items=0 ppid=1600 pid=1623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:19.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265363033663338316262366365633933353233636137393830333833
Apr 12 18:50:19.883000 audit: BPF prog-id=72 op=UNLOAD
Apr 12 18:50:19.883000 audit: BPF prog-id=71 op=UNLOAD
Apr 12 18:50:19.883000 audit[1623]: AVC avc:  denied  { bpf } for  pid=1623 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.883000 audit[1623]: AVC avc:  denied  { bpf } for  pid=1623 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.883000 audit[1623]: AVC avc:  denied  { bpf } for  pid=1623 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.883000 audit[1623]: AVC avc:  denied  { perfmon } for  pid=1623 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.883000 audit[1623]: AVC avc:  denied  { perfmon } for  pid=1623 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.883000 audit[1623]: AVC avc:  denied  { perfmon } for  pid=1623 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.883000 audit[1623]: AVC avc:  denied  { perfmon } for  pid=1623 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.883000 audit[1623]: AVC avc:  denied  { perfmon } for  pid=1623 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.883000 audit[1623]: AVC avc:  denied  { bpf } for  pid=1623 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.883000 audit[1623]: AVC avc:  denied  { bpf } for  pid=1623 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.883000 audit: BPF prog-id=73 op=LOAD
Apr 12 18:50:19.883000 audit[1623]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003431e8 items=0 ppid=1600 pid=1623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:19.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265363033663338316262366365633933353233636137393830333833
Apr 12 18:50:19.927000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.927000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.927000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.927000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.927000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.927000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.927000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.957000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.957000 audit: BPF prog-id=74 op=LOAD
Apr 12 18:50:19.957000 audit[1625]: AVC avc:  denied  { bpf } for  pid=1625 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.957000 audit[1625]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1607 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:19.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262646538346662306430383932346163626137346338343763633335
Apr 12 18:50:19.957000 audit[1625]: AVC avc:  denied  { perfmon } for  pid=1625 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.957000 audit[1625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1607 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:19.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262646538346662306430383932346163626137346338343763633335
Apr 12 18:50:19.957000 audit[1625]: AVC avc:  denied  { bpf } for  pid=1625 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.957000 audit[1625]: AVC avc:  denied  { bpf } for  pid=1625 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.957000 audit[1625]: AVC avc:  denied  { bpf } for  pid=1625 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.957000 audit[1625]: AVC avc:  denied  { perfmon } for  pid=1625 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.957000 audit[1625]: AVC avc:  denied  { perfmon } for  pid=1625 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.957000 audit[1625]: AVC avc:  denied  { perfmon } for  pid=1625 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.957000 audit[1625]: AVC avc:  denied  { perfmon } for  pid=1625 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.957000 audit[1625]: AVC avc:  denied  { perfmon } for  pid=1625 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.957000 audit[1625]: AVC avc:  denied  { bpf } for  pid=1625 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.957000 audit[1625]: AVC avc:  denied  { bpf } for  pid=1625 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.957000 audit: BPF prog-id=75 op=LOAD
Apr 12 18:50:19.957000 audit[1625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00018ddf0 items=0 ppid=1607 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:19.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262646538346662306430383932346163626137346338343763633335
Apr 12 18:50:19.958000 audit[1625]: AVC avc:  denied  { bpf } for  pid=1625 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.958000 audit[1625]: AVC avc:  denied  { bpf } for  pid=1625 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.958000 audit[1625]: AVC avc:  denied  { perfmon } for  pid=1625 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.958000 audit[1625]: AVC avc:  denied  { perfmon } for  pid=1625 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.958000 audit[1625]: AVC avc:  denied  { perfmon } for  pid=1625 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.958000 audit[1625]: AVC avc:  denied  { perfmon } for  pid=1625 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.958000 audit[1625]: AVC avc:  denied  { perfmon } for  pid=1625 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.958000 audit[1625]: AVC avc:  denied  { bpf } for  pid=1625 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.958000 audit[1625]: AVC avc:  denied  { bpf } for  pid=1625 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.958000 audit: BPF prog-id=76 op=LOAD
Apr 12 18:50:19.958000 audit[1625]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00018de38 items=0 ppid=1607 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:19.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262646538346662306430383932346163626137346338343763633335
Apr 12 18:50:19.958000 audit: BPF prog-id=76 op=UNLOAD
Apr 12 18:50:19.958000 audit: BPF prog-id=75 op=UNLOAD
Apr 12 18:50:19.958000 audit[1625]: AVC avc:  denied  { bpf } for  pid=1625 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.958000 audit[1625]: AVC avc:  denied  { bpf } for  pid=1625 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.958000 audit[1625]: AVC avc:  denied  { bpf } for  pid=1625 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.958000 audit[1625]: AVC avc:  denied  { perfmon } for  pid=1625 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.958000 audit[1625]: AVC avc:  denied  { perfmon } for  pid=1625 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.958000 audit[1625]: AVC avc:  denied  { perfmon } for  pid=1625 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.958000 audit[1625]: AVC avc:  denied  { perfmon } for  pid=1625 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.958000 audit[1625]: AVC avc:  denied  { perfmon } for  pid=1625 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.958000 audit[1625]: AVC avc:  denied  { bpf } for  pid=1625 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.958000 audit[1625]: AVC avc:  denied  { bpf } for  pid=1625 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:19.958000 audit: BPF prog-id=77 op=LOAD
Apr 12 18:50:19.958000 audit[1625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001c2248 items=0 ppid=1607 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:19.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262646538346662306430383932346163626137346338343763633335
Apr 12 18:50:19.988142 env[1141]: time="2024-04-12T18:50:19.988008759Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2h9kk,Uid:a034f98b-f092-429b-b560-8e04072337ff,Namespace:kube-system,Attempt:0,} returns sandbox id \"be603f381bb6cec93523ca798038379e3377847ede7e1195100ecd4712351bef\""
Apr 12 18:50:19.991780 env[1141]: time="2024-04-12T18:50:19.991723296Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bkmww,Uid:543652d9-9134-494e-86db-2e7259ddcdbb,Namespace:calico-system,Attempt:0,} returns sandbox id \"bbde84fb0d08924acba74c847cc35865d4d25af0f529bd557b83521da386f32d\""
Apr 12 18:50:19.994222 kubelet[1529]: E0412 18:50:19.993929    1529 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url
Apr 12 18:50:19.994753 env[1141]: time="2024-04-12T18:50:19.994568970Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\""
Apr 12 18:50:20.033484 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2846545409.mount: Deactivated successfully.
Apr 12 18:50:20.046156 kubelet[1529]: E0412 18:50:20.045641    1529 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qf2nb" podUID=0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db
Apr 12 18:50:20.861703 kubelet[1529]: E0412 18:50:20.861650    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:21.107189 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1910432731.mount: Deactivated successfully.
Apr 12 18:50:21.755186 env[1141]: time="2024-04-12T18:50:21.755124905Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:21.757869 env[1141]: time="2024-04-12T18:50:21.757806838Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b5590cbba38a0f4f32cbe39a2d3a1a1348612e7550f8b68af937ba5b6e9ba3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:21.760227 env[1141]: time="2024-04-12T18:50:21.760180991Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:21.762615 env[1141]: time="2024-04-12T18:50:21.762572561Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:b0539f35b586abc54ca7660f9bb8a539d010b9e07d20e9e3d529cf0ca35d4ddf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:21.763438 env[1141]: time="2024-04-12T18:50:21.763399268Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\" returns image reference \"sha256:2b5590cbba38a0f4f32cbe39a2d3a1a1348612e7550f8b68af937ba5b6e9ba3d\""
Apr 12 18:50:21.765595 env[1141]: time="2024-04-12T18:50:21.765280513Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\""
Apr 12 18:50:21.768724 env[1141]: time="2024-04-12T18:50:21.768684333Z" level=info msg="CreateContainer within sandbox \"be603f381bb6cec93523ca798038379e3377847ede7e1195100ecd4712351bef\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}"
Apr 12 18:50:21.790770 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3613965259.mount: Deactivated successfully.
Apr 12 18:50:21.799471 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount817340522.mount: Deactivated successfully.
Apr 12 18:50:21.804446 env[1141]: time="2024-04-12T18:50:21.804402029Z" level=info msg="CreateContainer within sandbox \"be603f381bb6cec93523ca798038379e3377847ede7e1195100ecd4712351bef\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"3c6110f4c34fbc415fb501336a65263d2bc74057d715ff99bdf5a88c5078cfd9\""
Apr 12 18:50:21.805638 env[1141]: time="2024-04-12T18:50:21.805590215Z" level=info msg="StartContainer for \"3c6110f4c34fbc415fb501336a65263d2bc74057d715ff99bdf5a88c5078cfd9\""
Apr 12 18:50:21.828100 systemd[1]: Started cri-containerd-3c6110f4c34fbc415fb501336a65263d2bc74057d715ff99bdf5a88c5078cfd9.scope.
Apr 12 18:50:21.882736 kernel: kauditd_printk_skb: 113 callbacks suppressed
Apr 12 18:50:21.882892 kernel: audit: type=1400 audit(1712947821.855:652): avc:  denied  { perfmon } for  pid=1681 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.855000 audit[1681]: AVC avc:  denied  { perfmon } for  pid=1681 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.883088 kubelet[1529]: E0412 18:50:21.861935    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:21.855000 audit[1681]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fda91040c68 items=0 ppid=1600 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:21.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363363131306634633334666263343135666235303133333661363532
Apr 12 18:50:21.944831 kernel: audit: type=1300 audit(1712947821.855:652): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fda91040c68 items=0 ppid=1600 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:21.944978 kernel: audit: type=1327 audit(1712947821.855:652): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363363131306634633334666263343135666235303133333661363532
Apr 12 18:50:21.855000 audit[1681]: AVC avc:  denied  { bpf } for  pid=1681 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.966077 kernel: audit: type=1400 audit(1712947821.855:653): avc:  denied  { bpf } for  pid=1681 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.966203 kernel: audit: type=1400 audit(1712947821.855:653): avc:  denied  { bpf } for  pid=1681 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.855000 audit[1681]: AVC avc:  denied  { bpf } for  pid=1681 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:22.007100 kernel: audit: type=1400 audit(1712947821.855:653): avc:  denied  { bpf } for  pid=1681 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.855000 audit[1681]: AVC avc:  denied  { bpf } for  pid=1681 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.855000 audit[1681]: AVC avc:  denied  { perfmon } for  pid=1681 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:22.028319 kernel: audit: type=1400 audit(1712947821.855:653): avc:  denied  { perfmon } for  pid=1681 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.855000 audit[1681]: AVC avc:  denied  { perfmon } for  pid=1681 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:22.050099 kernel: audit: type=1400 audit(1712947821.855:653): avc:  denied  { perfmon } for  pid=1681 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:22.050213 kubelet[1529]: E0412 18:50:22.049672    1529 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qf2nb" podUID=0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db
Apr 12 18:50:21.855000 audit[1681]: AVC avc:  denied  { perfmon } for  pid=1681 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:22.071805 env[1141]: time="2024-04-12T18:50:22.071759797Z" level=info msg="StartContainer for \"3c6110f4c34fbc415fb501336a65263d2bc74057d715ff99bdf5a88c5078cfd9\" returns successfully"
Apr 12 18:50:22.072069 kernel: audit: type=1400 audit(1712947821.855:653): avc:  denied  { perfmon } for  pid=1681 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.855000 audit[1681]: AVC avc:  denied  { perfmon } for  pid=1681 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:22.094072 kernel: audit: type=1400 audit(1712947821.855:653): avc:  denied  { perfmon } for  pid=1681 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.855000 audit[1681]: AVC avc:  denied  { perfmon } for  pid=1681 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.855000 audit[1681]: AVC avc:  denied  { bpf } for  pid=1681 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.855000 audit[1681]: AVC avc:  denied  { bpf } for  pid=1681 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.855000 audit: BPF prog-id=78 op=LOAD
Apr 12 18:50:21.855000 audit[1681]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000098e98 items=0 ppid=1600 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:21.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363363131306634633334666263343135666235303133333661363532
Apr 12 18:50:21.882000 audit[1681]: AVC avc:  denied  { bpf } for  pid=1681 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.882000 audit[1681]: AVC avc:  denied  { bpf } for  pid=1681 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.882000 audit[1681]: AVC avc:  denied  { perfmon } for  pid=1681 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.882000 audit[1681]: AVC avc:  denied  { perfmon } for  pid=1681 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.882000 audit[1681]: AVC avc:  denied  { perfmon } for  pid=1681 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.882000 audit[1681]: AVC avc:  denied  { perfmon } for  pid=1681 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.882000 audit[1681]: AVC avc:  denied  { perfmon } for  pid=1681 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.882000 audit[1681]: AVC avc:  denied  { bpf } for  pid=1681 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.882000 audit[1681]: AVC avc:  denied  { bpf } for  pid=1681 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.882000 audit: BPF prog-id=79 op=LOAD
Apr 12 18:50:21.882000 audit[1681]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000098ee8 items=0 ppid=1600 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:21.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363363131306634633334666263343135666235303133333661363532
Apr 12 18:50:21.882000 audit: BPF prog-id=79 op=UNLOAD
Apr 12 18:50:21.882000 audit: BPF prog-id=78 op=UNLOAD
Apr 12 18:50:21.882000 audit[1681]: AVC avc:  denied  { bpf } for  pid=1681 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.882000 audit[1681]: AVC avc:  denied  { bpf } for  pid=1681 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.882000 audit[1681]: AVC avc:  denied  { bpf } for  pid=1681 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.882000 audit[1681]: AVC avc:  denied  { perfmon } for  pid=1681 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.882000 audit[1681]: AVC avc:  denied  { perfmon } for  pid=1681 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.882000 audit[1681]: AVC avc:  denied  { perfmon } for  pid=1681 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.882000 audit[1681]: AVC avc:  denied  { perfmon } for  pid=1681 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.882000 audit[1681]: AVC avc:  denied  { perfmon } for  pid=1681 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.882000 audit[1681]: AVC avc:  denied  { bpf } for  pid=1681 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.882000 audit[1681]: AVC avc:  denied  { bpf } for  pid=1681 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:21.882000 audit: BPF prog-id=80 op=LOAD
Apr 12 18:50:21.882000 audit[1681]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000098f78 items=0 ppid=1600 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:21.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363363131306634633334666263343135666235303133333661363532
Apr 12 18:50:22.100000 audit[1731]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.100000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc545acd00 a2=0 a3=7ffc545accec items=0 ppid=1691 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.100000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Apr 12 18:50:22.103000 audit[1732]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.103000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffab14f5d0 a2=0 a3=7fffab14f5bc items=0 ppid=1691 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.103000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Apr 12 18:50:22.110000 audit[1733]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.110000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7afc78e0 a2=0 a3=7ffc7afc78cc items=0 ppid=1691 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.110000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Apr 12 18:50:22.114000 audit[1734]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.114000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4cd07d40 a2=0 a3=7fff4cd07d2c items=0 ppid=1691 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Apr 12 18:50:22.116000 audit[1735]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.116000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd1c749d0 a2=0 a3=7ffdd1c749bc items=0 ppid=1691 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Apr 12 18:50:22.118000 audit[1736]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.118000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdef200940 a2=0 a3=7ffdef20092c items=0 ppid=1691 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.118000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Apr 12 18:50:22.215000 audit[1737]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.215000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd2eb8dfb0 a2=0 a3=7ffd2eb8df9c items=0 ppid=1691 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.215000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Apr 12 18:50:22.219000 audit[1739]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.219000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc6de40c10 a2=0 a3=7ffc6de40bfc items=0 ppid=1691 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.219000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365
Apr 12 18:50:22.224000 audit[1742]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.224000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcfa17ced0 a2=0 a3=7ffcfa17cebc items=0 ppid=1691 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.224000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669
Apr 12 18:50:22.226000 audit[1743]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.226000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff600f1520 a2=0 a3=7fff600f150c items=0 ppid=1691 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Apr 12 18:50:22.229000 audit[1745]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.229000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe4a0dfc10 a2=0 a3=7ffe4a0dfbfc items=0 ppid=1691 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Apr 12 18:50:22.231000 audit[1746]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.231000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee56bbed0 a2=0 a3=7ffee56bbebc items=0 ppid=1691 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.231000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Apr 12 18:50:22.235000 audit[1748]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.235000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffee2d00ca0 a2=0 a3=7ffee2d00c8c items=0 ppid=1691 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.235000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Apr 12 18:50:22.240000 audit[1751]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.240000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff74253540 a2=0 a3=7fff7425352c items=0 ppid=1691 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.240000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53
Apr 12 18:50:22.242000 audit[1752]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.242000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd42a1e790 a2=0 a3=7ffd42a1e77c items=0 ppid=1691 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.242000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Apr 12 18:50:22.246000 audit[1754]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1754 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.246000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd7fa44680 a2=0 a3=7ffd7fa4466c items=0 ppid=1691 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.246000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Apr 12 18:50:22.247000 audit[1755]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.247000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0b42b5c0 a2=0 a3=7ffe0b42b5ac items=0 ppid=1691 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.247000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Apr 12 18:50:22.251000 audit[1757]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.251000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffb0032760 a2=0 a3=7fffb003274c items=0 ppid=1691 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.251000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Apr 12 18:50:22.258000 audit[1760]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.258000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdeb114810 a2=0 a3=7ffdeb1147fc items=0 ppid=1691 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.258000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Apr 12 18:50:22.264000 audit[1763]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.264000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe17065220 a2=0 a3=7ffe1706520c items=0 ppid=1691 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.264000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Apr 12 18:50:22.266000 audit[1764]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.266000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc39321890 a2=0 a3=7ffc3932187c items=0 ppid=1691 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.266000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Apr 12 18:50:22.270000 audit[1766]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.270000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffba9b0390 a2=0 a3=7fffba9b037c items=0 ppid=1691 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.270000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Apr 12 18:50:22.302000 audit[1771]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.302000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffa207e680 a2=0 a3=7fffa207e66c items=0 ppid=1691 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.302000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Apr 12 18:50:22.310000 audit[1776]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.310000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe760dc2f0 a2=0 a3=7ffe760dc2dc items=0 ppid=1691 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.310000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Apr 12 18:50:22.314000 audit[1778]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Apr 12 18:50:22.314000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffed9f045e0 a2=0 a3=7ffed9f045cc items=0 ppid=1691 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.314000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Apr 12 18:50:22.334000 audit[1780]: NETFILTER_CFG table=filter:39 family=2 entries=6 op=nft_register_rule pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Apr 12 18:50:22.334000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffeb2cc67a0 a2=0 a3=7ffeb2cc678c items=0 ppid=1691 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.334000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Apr 12 18:50:22.364000 audit[1780]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Apr 12 18:50:22.364000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=25476 a0=3 a1=7ffeb2cc67a0 a2=0 a3=7ffeb2cc678c items=0 ppid=1691 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.364000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Apr 12 18:50:22.385000 audit[1789]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.385000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcacb2c990 a2=0 a3=7ffcacb2c97c items=0 ppid=1691 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.385000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Apr 12 18:50:22.391000 audit[1792]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.391000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd702ede50 a2=0 a3=7ffd702ede3c items=0 ppid=1691 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.391000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963
Apr 12 18:50:22.392000 audit[1793]: NETFILTER_CFG table=filter:43 family=2 entries=10 op=nft_register_rule pid=1793 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Apr 12 18:50:22.392000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffff635a560 a2=0 a3=7ffff635a54c items=0 ppid=1691 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.392000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Apr 12 18:50:22.394000 audit[1793]: NETFILTER_CFG table=nat:44 family=2 entries=20 op=nft_register_rule pid=1793 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Apr 12 18:50:22.394000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffff635a560 a2=0 a3=7ffff635a54c items=0 ppid=1691 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.394000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Apr 12 18:50:22.398000 audit[1796]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.398000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffce5fd2e0 a2=0 a3=7fffce5fd2cc items=0 ppid=1691 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.398000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276
Apr 12 18:50:22.403000 audit[1797]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.403000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6d7e9ef0 a2=0 a3=7ffe6d7e9edc items=0 ppid=1691 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.403000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Apr 12 18:50:22.408000 audit[1799]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.408000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe2e12da80 a2=0 a3=7ffe2e12da6c items=0 ppid=1691 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.408000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Apr 12 18:50:22.410000 audit[1800]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.410000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5a9d1780 a2=0 a3=7ffd5a9d176c items=0 ppid=1691 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.410000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Apr 12 18:50:22.414000 audit[1802]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_rule pid=1802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.414000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffde1ac9f90 a2=0 a3=7ffde1ac9f7c items=0 ppid=1691 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.414000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245
Apr 12 18:50:22.420000 audit[1805]: NETFILTER_CFG table=filter:50 family=10 entries=2 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.420000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff96bef650 a2=0 a3=7fff96bef63c items=0 ppid=1691 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.420000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Apr 12 18:50:22.422000 audit[1806]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.422000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6320efa0 a2=0 a3=7ffe6320ef8c items=0 ppid=1691 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.422000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Apr 12 18:50:22.426000 audit[1808]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.426000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffee24998f0 a2=0 a3=7ffee24998dc items=0 ppid=1691 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.426000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Apr 12 18:50:22.427000 audit[1809]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.427000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5eac3b80 a2=0 a3=7ffd5eac3b6c items=0 ppid=1691 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.427000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Apr 12 18:50:22.431000 audit[1811]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.431000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd52de6780 a2=0 a3=7ffd52de676c items=0 ppid=1691 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.431000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Apr 12 18:50:22.436000 audit[1814]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=1814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.436000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd509f6ec0 a2=0 a3=7ffd509f6eac items=0 ppid=1691 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.436000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Apr 12 18:50:22.441000 audit[1817]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=1817 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.441000 audit[1817]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc69f4b4a0 a2=0 a3=7ffc69f4b48c items=0 ppid=1691 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.441000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C
Apr 12 18:50:22.443000 audit[1818]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=1818 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.443000 audit[1818]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff9cf2f700 a2=0 a3=7fff9cf2f6ec items=0 ppid=1691 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.443000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Apr 12 18:50:22.447000 audit[1820]: NETFILTER_CFG table=nat:58 family=10 entries=2 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.447000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff0fe3f5d0 a2=0 a3=7fff0fe3f5bc items=0 ppid=1691 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.447000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Apr 12 18:50:22.453000 audit[1823]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.453000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd6d789710 a2=0 a3=7ffd6d7896fc items=0 ppid=1691 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.453000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Apr 12 18:50:22.455000 audit[1824]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.455000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8a240150 a2=0 a3=7ffc8a24013c items=0 ppid=1691 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.455000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Apr 12 18:50:22.459000 audit[1826]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1826 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.459000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffea39b73f0 a2=0 a3=7ffea39b73dc items=0 ppid=1691 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.459000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Apr 12 18:50:22.464000 audit[1829]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1829 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.464000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd0e96f530 a2=0 a3=7ffd0e96f51c items=0 ppid=1691 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.464000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Apr 12 18:50:22.466000 audit[1830]: NETFILTER_CFG table=nat:63 family=10 entries=1 op=nft_register_chain pid=1830 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.466000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd356774d0 a2=0 a3=7ffd356774bc items=0 ppid=1691 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.466000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Apr 12 18:50:22.470000 audit[1832]: NETFILTER_CFG table=nat:64 family=10 entries=2 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Apr 12 18:50:22.470000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffff80d2cc0 a2=0 a3=7ffff80d2cac items=0 ppid=1691 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.470000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Apr 12 18:50:22.476000 audit[1834]: NETFILTER_CFG table=filter:65 family=10 entries=3 op=nft_register_rule pid=1834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Apr 12 18:50:22.476000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc2c3fa200 a2=0 a3=7ffc2c3fa1ec items=0 ppid=1691 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.476000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Apr 12 18:50:22.477000 audit[1834]: NETFILTER_CFG table=nat:66 family=10 entries=7 op=nft_register_chain pid=1834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Apr 12 18:50:22.477000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc2c3fa200 a2=0 a3=7ffc2c3fa1ec items=0 ppid=1691 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:22.477000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Apr 12 18:50:22.787031 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1646829642.mount: Deactivated successfully.
Apr 12 18:50:22.863181 kubelet[1529]: E0412 18:50:22.863073    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:23.111908 kubelet[1529]: I0412 18:50:23.111380    1529 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-2h9kk" podStartSLOduration=5.33756062 podCreationTimestamp="2024-04-12 18:50:16 +0000 UTC" firstStartedPulling="2024-04-12 18:50:19.990408395 +0000 UTC m=+5.913010279" lastFinishedPulling="2024-04-12 18:50:21.764146148 +0000 UTC m=+7.686748050" observedRunningTime="2024-04-12 18:50:23.110713603 +0000 UTC m=+9.033315510" watchObservedRunningTime="2024-04-12 18:50:23.111298391 +0000 UTC m=+9.033900290"
Apr 12 18:50:23.126190 kubelet[1529]: E0412 18:50:23.126143    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.126190 kubelet[1529]: W0412 18:50:23.126186    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.126456 kubelet[1529]: E0412 18:50:23.126239    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.126639 kubelet[1529]: E0412 18:50:23.126618    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.126789 kubelet[1529]: W0412 18:50:23.126647    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.126789 kubelet[1529]: E0412 18:50:23.126670    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.127074 kubelet[1529]: E0412 18:50:23.127055    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.127074 kubelet[1529]: W0412 18:50:23.127076    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.127233 kubelet[1529]: E0412 18:50:23.127097    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.127506 kubelet[1529]: E0412 18:50:23.127484    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.127595 kubelet[1529]: W0412 18:50:23.127510    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.127595 kubelet[1529]: E0412 18:50:23.127531    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.127858 kubelet[1529]: E0412 18:50:23.127839    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.127938 kubelet[1529]: W0412 18:50:23.127860    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.127938 kubelet[1529]: E0412 18:50:23.127878    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.128201 kubelet[1529]: E0412 18:50:23.128184    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.128201 kubelet[1529]: W0412 18:50:23.128201    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.128327 kubelet[1529]: E0412 18:50:23.128219    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.128566 kubelet[1529]: E0412 18:50:23.128547    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.128566 kubelet[1529]: W0412 18:50:23.128569    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.128732 kubelet[1529]: E0412 18:50:23.128587    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.128904 kubelet[1529]: E0412 18:50:23.128885    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.128904 kubelet[1529]: W0412 18:50:23.128903    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.129036 kubelet[1529]: E0412 18:50:23.128922    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.129272 kubelet[1529]: E0412 18:50:23.129254    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.129272 kubelet[1529]: W0412 18:50:23.129271    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.129406 kubelet[1529]: E0412 18:50:23.129292    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.129653 kubelet[1529]: E0412 18:50:23.129635    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.129653 kubelet[1529]: W0412 18:50:23.129653    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.129794 kubelet[1529]: E0412 18:50:23.129670    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.129955 kubelet[1529]: E0412 18:50:23.129939    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.129955 kubelet[1529]: W0412 18:50:23.129955    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.130108 kubelet[1529]: E0412 18:50:23.129972    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.130322 kubelet[1529]: E0412 18:50:23.130305    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.130322 kubelet[1529]: W0412 18:50:23.130322    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.130470 kubelet[1529]: E0412 18:50:23.130340    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.130638 kubelet[1529]: E0412 18:50:23.130621    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.130638 kubelet[1529]: W0412 18:50:23.130637    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.130789 kubelet[1529]: E0412 18:50:23.130655    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.130923 kubelet[1529]: E0412 18:50:23.130906    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.130923 kubelet[1529]: W0412 18:50:23.130922    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.131058 kubelet[1529]: E0412 18:50:23.130942    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.131265 kubelet[1529]: E0412 18:50:23.131249    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.131265 kubelet[1529]: W0412 18:50:23.131265    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.131411 kubelet[1529]: E0412 18:50:23.131282    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.131548 kubelet[1529]: E0412 18:50:23.131531    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.131548 kubelet[1529]: W0412 18:50:23.131548    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.131676 kubelet[1529]: E0412 18:50:23.131564    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.157763 kubelet[1529]: E0412 18:50:23.157212    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.157763 kubelet[1529]: W0412 18:50:23.157239    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.157763 kubelet[1529]: E0412 18:50:23.157267    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.157763 kubelet[1529]: E0412 18:50:23.157637    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.157763 kubelet[1529]: W0412 18:50:23.157649    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.157763 kubelet[1529]: E0412 18:50:23.157679    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.158255 kubelet[1529]: E0412 18:50:23.157962    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.158255 kubelet[1529]: W0412 18:50:23.157976    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.158255 kubelet[1529]: E0412 18:50:23.158004    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.158424 kubelet[1529]: E0412 18:50:23.158285    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.158424 kubelet[1529]: W0412 18:50:23.158300    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.158424 kubelet[1529]: E0412 18:50:23.158353    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.158826 kubelet[1529]: E0412 18:50:23.158805    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.158826 kubelet[1529]: W0412 18:50:23.158823    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.159074 kubelet[1529]: E0412 18:50:23.158850    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.159225 kubelet[1529]: E0412 18:50:23.159206    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.159225 kubelet[1529]: W0412 18:50:23.159224    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.159355 kubelet[1529]: E0412 18:50:23.159343    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.159800 kubelet[1529]: E0412 18:50:23.159776    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.159800 kubelet[1529]: W0412 18:50:23.159796    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.159973 kubelet[1529]: E0412 18:50:23.159821    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.160128 kubelet[1529]: E0412 18:50:23.160110    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.160128 kubelet[1529]: W0412 18:50:23.160128    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.160283 kubelet[1529]: E0412 18:50:23.160151    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.160469 kubelet[1529]: E0412 18:50:23.160450    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.160469 kubelet[1529]: W0412 18:50:23.160468    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.160605 kubelet[1529]: E0412 18:50:23.160493    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.160842 kubelet[1529]: E0412 18:50:23.160822    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.160842 kubelet[1529]: W0412 18:50:23.160840    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.161380 kubelet[1529]: E0412 18:50:23.160999    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.161380 kubelet[1529]: E0412 18:50:23.161130    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.161380 kubelet[1529]: W0412 18:50:23.161142    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.161380 kubelet[1529]: E0412 18:50:23.161162    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.161635 kubelet[1529]: E0412 18:50:23.161543    1529 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Apr 12 18:50:23.161635 kubelet[1529]: W0412 18:50:23.161557    1529 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Apr 12 18:50:23.161635 kubelet[1529]: E0412 18:50:23.161576    1529 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Apr 12 18:50:23.404000 audit[1864]: NETFILTER_CFG table=filter:67 family=2 entries=10 op=nft_register_rule pid=1864 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Apr 12 18:50:23.404000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffee0479270 a2=0 a3=7ffee047925c items=0 ppid=1691 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:23.404000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Apr 12 18:50:23.405000 audit[1864]: NETFILTER_CFG table=nat:68 family=2 entries=20 op=nft_register_rule pid=1864 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Apr 12 18:50:23.405000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffee0479270 a2=0 a3=7ffee047925c items=0 ppid=1691 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:23.405000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Apr 12 18:50:23.623668 env[1141]: time="2024-04-12T18:50:23.623596863Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:23.626772 env[1141]: time="2024-04-12T18:50:23.626706043Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:23.629693 env[1141]: time="2024-04-12T18:50:23.629648066Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:23.632361 env[1141]: time="2024-04-12T18:50:23.632316368Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:23.633550 env[1141]: time="2024-04-12T18:50:23.633493003Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\""
Apr 12 18:50:23.636487 env[1141]: time="2024-04-12T18:50:23.636437268Z" level=info msg="CreateContainer within sandbox \"bbde84fb0d08924acba74c847cc35865d4d25af0f529bd557b83521da386f32d\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}"
Apr 12 18:50:23.654766 env[1141]: time="2024-04-12T18:50:23.654698903Z" level=info msg="CreateContainer within sandbox \"bbde84fb0d08924acba74c847cc35865d4d25af0f529bd557b83521da386f32d\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"44fd9a66701187f8243e2a4f2bf8799b72b5d1a2be222c7321774acdea9f7f7f\""
Apr 12 18:50:23.656323 env[1141]: time="2024-04-12T18:50:23.655697882Z" level=info msg="StartContainer for \"44fd9a66701187f8243e2a4f2bf8799b72b5d1a2be222c7321774acdea9f7f7f\""
Apr 12 18:50:23.691731 systemd[1]: run-containerd-runc-k8s.io-44fd9a66701187f8243e2a4f2bf8799b72b5d1a2be222c7321774acdea9f7f7f-runc.GXu10A.mount: Deactivated successfully.
Apr 12 18:50:23.699260 systemd[1]: Started cri-containerd-44fd9a66701187f8243e2a4f2bf8799b72b5d1a2be222c7321774acdea9f7f7f.scope.
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { perfmon } for  pid=1873 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1efc6ad018 items=0 ppid=1607 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:23.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434666439613636373031313837663832343365326134663262663837
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { bpf } for  pid=1873 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { bpf } for  pid=1873 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { bpf } for  pid=1873 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { perfmon } for  pid=1873 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { perfmon } for  pid=1873 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { perfmon } for  pid=1873 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { perfmon } for  pid=1873 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { perfmon } for  pid=1873 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { bpf } for  pid=1873 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { bpf } for  pid=1873 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit: BPF prog-id=81 op=LOAD
Apr 12 18:50:23.718000 audit[1873]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003829c8 items=0 ppid=1607 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:23.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434666439613636373031313837663832343365326134663262663837
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { bpf } for  pid=1873 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { bpf } for  pid=1873 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { perfmon } for  pid=1873 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { perfmon } for  pid=1873 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { perfmon } for  pid=1873 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { perfmon } for  pid=1873 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { perfmon } for  pid=1873 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { bpf } for  pid=1873 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { bpf } for  pid=1873 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit: BPF prog-id=82 op=LOAD
Apr 12 18:50:23.718000 audit[1873]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000382a18 items=0 ppid=1607 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:23.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434666439613636373031313837663832343365326134663262663837
Apr 12 18:50:23.718000 audit: BPF prog-id=82 op=UNLOAD
Apr 12 18:50:23.718000 audit: BPF prog-id=81 op=UNLOAD
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { bpf } for  pid=1873 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { bpf } for  pid=1873 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { bpf } for  pid=1873 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { perfmon } for  pid=1873 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { perfmon } for  pid=1873 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { perfmon } for  pid=1873 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { perfmon } for  pid=1873 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { perfmon } for  pid=1873 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { bpf } for  pid=1873 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit[1873]: AVC avc:  denied  { bpf } for  pid=1873 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:23.718000 audit: BPF prog-id=83 op=LOAD
Apr 12 18:50:23.718000 audit[1873]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000382aa8 items=0 ppid=1607 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:23.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434666439613636373031313837663832343365326134663262663837
Apr 12 18:50:23.741774 env[1141]: time="2024-04-12T18:50:23.741702547Z" level=info msg="StartContainer for \"44fd9a66701187f8243e2a4f2bf8799b72b5d1a2be222c7321774acdea9f7f7f\" returns successfully"
Apr 12 18:50:23.755562 systemd[1]: cri-containerd-44fd9a66701187f8243e2a4f2bf8799b72b5d1a2be222c7321774acdea9f7f7f.scope: Deactivated successfully.
Apr 12 18:50:23.758000 audit: BPF prog-id=83 op=UNLOAD
Apr 12 18:50:23.863797 kubelet[1529]: E0412 18:50:23.863745    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:24.045632 kubelet[1529]: E0412 18:50:24.045564    1529 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qf2nb" podUID=0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db
Apr 12 18:50:24.141060 env[1141]: time="2024-04-12T18:50:24.140972571Z" level=info msg="shim disconnected" id=44fd9a66701187f8243e2a4f2bf8799b72b5d1a2be222c7321774acdea9f7f7f
Apr 12 18:50:24.141393 env[1141]: time="2024-04-12T18:50:24.141346516Z" level=warning msg="cleaning up after shim disconnected" id=44fd9a66701187f8243e2a4f2bf8799b72b5d1a2be222c7321774acdea9f7f7f namespace=k8s.io
Apr 12 18:50:24.141555 env[1141]: time="2024-04-12T18:50:24.141528624Z" level=info msg="cleaning up dead shim"
Apr 12 18:50:24.153490 env[1141]: time="2024-04-12T18:50:24.153425869Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:50:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1913 runtime=io.containerd.runc.v2\n"
Apr 12 18:50:24.649825 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-44fd9a66701187f8243e2a4f2bf8799b72b5d1a2be222c7321774acdea9f7f7f-rootfs.mount: Deactivated successfully.
Apr 12 18:50:24.864618 kubelet[1529]: E0412 18:50:24.864544    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:25.109919 env[1141]: time="2024-04-12T18:50:25.109853988Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\""
Apr 12 18:50:25.864810 kubelet[1529]: E0412 18:50:25.864716    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:25.946995 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount154171327.mount: Deactivated successfully.
Apr 12 18:50:26.045440 kubelet[1529]: E0412 18:50:26.045384    1529 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qf2nb" podUID=0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db
Apr 12 18:50:26.865840 kubelet[1529]: E0412 18:50:26.865780    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:27.866745 kubelet[1529]: E0412 18:50:27.866660    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:28.045594 kubelet[1529]: E0412 18:50:28.045004    1529 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qf2nb" podUID=0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db
Apr 12 18:50:28.689347 kernel: kauditd_printk_skb: 242 callbacks suppressed
Apr 12 18:50:28.689519 kernel: audit: type=1131 audit(1712947828.658:720): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:28.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Apr 12 18:50:28.659120 systemd[1]: systemd-hostnamed.service: Deactivated successfully.
Apr 12 18:50:28.701000 audit: BPF prog-id=68 op=UNLOAD
Apr 12 18:50:28.716792 kernel: audit: type=1334 audit(1712947828.701:721): prog-id=68 op=UNLOAD
Apr 12 18:50:28.716915 kernel: audit: type=1334 audit(1712947828.701:722): prog-id=67 op=UNLOAD
Apr 12 18:50:28.701000 audit: BPF prog-id=67 op=UNLOAD
Apr 12 18:50:28.701000 audit: BPF prog-id=66 op=UNLOAD
Apr 12 18:50:28.725158 kernel: audit: type=1334 audit(1712947828.701:723): prog-id=66 op=UNLOAD
Apr 12 18:50:28.867894 kubelet[1529]: E0412 18:50:28.867810    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:29.577927 env[1141]: time="2024-04-12T18:50:29.577843885Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:29.581158 env[1141]: time="2024-04-12T18:50:29.581100239Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:29.583878 env[1141]: time="2024-04-12T18:50:29.583831001Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:29.586460 env[1141]: time="2024-04-12T18:50:29.586414432Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:29.587820 env[1141]: time="2024-04-12T18:50:29.587763848Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\""
Apr 12 18:50:29.590824 env[1141]: time="2024-04-12T18:50:29.590771149Z" level=info msg="CreateContainer within sandbox \"bbde84fb0d08924acba74c847cc35865d4d25af0f529bd557b83521da386f32d\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}"
Apr 12 18:50:29.615707 env[1141]: time="2024-04-12T18:50:29.615644842Z" level=info msg="CreateContainer within sandbox \"bbde84fb0d08924acba74c847cc35865d4d25af0f529bd557b83521da386f32d\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"309852a6f1639d5e0e1d9d83715681d2a98cd803177b588b5131ca8b59d9511c\""
Apr 12 18:50:29.616653 env[1141]: time="2024-04-12T18:50:29.616605465Z" level=info msg="StartContainer for \"309852a6f1639d5e0e1d9d83715681d2a98cd803177b588b5131ca8b59d9511c\""
Apr 12 18:50:29.646862 systemd[1]: Started cri-containerd-309852a6f1639d5e0e1d9d83715681d2a98cd803177b588b5131ca8b59d9511c.scope.
Apr 12 18:50:29.677000 audit[1935]: AVC avc:  denied  { perfmon } for  pid=1935 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.677000 audit[1935]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f31fc3827b8 items=0 ppid=1607 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:29.732425 kernel: audit: type=1400 audit(1712947829.677:724): avc:  denied  { perfmon } for  pid=1935 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.732997 kernel: audit: type=1300 audit(1712947829.677:724): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f31fc3827b8 items=0 ppid=1607 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:29.733094 kernel: audit: type=1327 audit(1712947829.677:724): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330393835326136663136333964356530653164396438333731353638
Apr 12 18:50:29.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330393835326136663136333964356530653164396438333731353638
Apr 12 18:50:29.678000 audit[1935]: AVC avc:  denied  { bpf } for  pid=1935 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.787074 kernel: audit: type=1400 audit(1712947829.678:725): avc:  denied  { bpf } for  pid=1935 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.787233 kernel: audit: type=1400 audit(1712947829.678:725): avc:  denied  { bpf } for  pid=1935 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.678000 audit[1935]: AVC avc:  denied  { bpf } for  pid=1935 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.678000 audit[1935]: AVC avc:  denied  { bpf } for  pid=1935 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.819935 env[1141]: time="2024-04-12T18:50:29.819871895Z" level=info msg="StartContainer for \"309852a6f1639d5e0e1d9d83715681d2a98cd803177b588b5131ca8b59d9511c\" returns successfully"
Apr 12 18:50:29.828063 kernel: audit: type=1400 audit(1712947829.678:725): avc:  denied  { bpf } for  pid=1935 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.678000 audit[1935]: AVC avc:  denied  { perfmon } for  pid=1935 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.678000 audit[1935]: AVC avc:  denied  { perfmon } for  pid=1935 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.678000 audit[1935]: AVC avc:  denied  { perfmon } for  pid=1935 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.678000 audit[1935]: AVC avc:  denied  { perfmon } for  pid=1935 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.678000 audit[1935]: AVC avc:  denied  { perfmon } for  pid=1935 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.678000 audit[1935]: AVC avc:  denied  { bpf } for  pid=1935 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.678000 audit[1935]: AVC avc:  denied  { bpf } for  pid=1935 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.678000 audit: BPF prog-id=84 op=LOAD
Apr 12 18:50:29.678000 audit[1935]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000338d18 items=0 ppid=1607 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:29.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330393835326136663136333964356530653164396438333731353638
Apr 12 18:50:29.698000 audit[1935]: AVC avc:  denied  { bpf } for  pid=1935 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.698000 audit[1935]: AVC avc:  denied  { bpf } for  pid=1935 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.698000 audit[1935]: AVC avc:  denied  { perfmon } for  pid=1935 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.698000 audit[1935]: AVC avc:  denied  { perfmon } for  pid=1935 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.698000 audit[1935]: AVC avc:  denied  { perfmon } for  pid=1935 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.698000 audit[1935]: AVC avc:  denied  { perfmon } for  pid=1935 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.698000 audit[1935]: AVC avc:  denied  { perfmon } for  pid=1935 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.698000 audit[1935]: AVC avc:  denied  { bpf } for  pid=1935 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.698000 audit[1935]: AVC avc:  denied  { bpf } for  pid=1935 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.698000 audit: BPF prog-id=85 op=LOAD
Apr 12 18:50:29.698000 audit[1935]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000338d68 items=0 ppid=1607 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:29.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330393835326136663136333964356530653164396438333731353638
Apr 12 18:50:29.698000 audit: BPF prog-id=85 op=UNLOAD
Apr 12 18:50:29.698000 audit: BPF prog-id=84 op=UNLOAD
Apr 12 18:50:29.698000 audit[1935]: AVC avc:  denied  { bpf } for  pid=1935 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.698000 audit[1935]: AVC avc:  denied  { bpf } for  pid=1935 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.698000 audit[1935]: AVC avc:  denied  { bpf } for  pid=1935 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.698000 audit[1935]: AVC avc:  denied  { perfmon } for  pid=1935 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.698000 audit[1935]: AVC avc:  denied  { perfmon } for  pid=1935 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.698000 audit[1935]: AVC avc:  denied  { perfmon } for  pid=1935 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.698000 audit[1935]: AVC avc:  denied  { perfmon } for  pid=1935 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.698000 audit[1935]: AVC avc:  denied  { perfmon } for  pid=1935 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.698000 audit[1935]: AVC avc:  denied  { bpf } for  pid=1935 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.698000 audit[1935]: AVC avc:  denied  { bpf } for  pid=1935 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:29.698000 audit: BPF prog-id=86 op=LOAD
Apr 12 18:50:29.698000 audit[1935]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000338df8 items=0 ppid=1607 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:29.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330393835326136663136333964356530653164396438333731353638
Apr 12 18:50:29.868146 kubelet[1529]: E0412 18:50:29.868009    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:30.045073 kubelet[1529]: E0412 18:50:30.045006    1529 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qf2nb" podUID=0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db
Apr 12 18:50:30.471887 env[1141]: time="2024-04-12T18:50:30.471512508Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Apr 12 18:50:30.473615 systemd[1]: cri-containerd-309852a6f1639d5e0e1d9d83715681d2a98cd803177b588b5131ca8b59d9511c.scope: Deactivated successfully.
Apr 12 18:50:30.476000 audit: BPF prog-id=86 op=UNLOAD
Apr 12 18:50:30.487208 kubelet[1529]: I0412 18:50:30.487157    1529 kubelet_node_status.go:493] "Fast updating node status as it just became ready"
Apr 12 18:50:30.504494 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-309852a6f1639d5e0e1d9d83715681d2a98cd803177b588b5131ca8b59d9511c-rootfs.mount: Deactivated successfully.
Apr 12 18:50:30.869077 kubelet[1529]: E0412 18:50:30.868990    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:31.210292 env[1141]: time="2024-04-12T18:50:31.210113839Z" level=info msg="shim disconnected" id=309852a6f1639d5e0e1d9d83715681d2a98cd803177b588b5131ca8b59d9511c
Apr 12 18:50:31.211141 env[1141]: time="2024-04-12T18:50:31.211079161Z" level=warning msg="cleaning up after shim disconnected" id=309852a6f1639d5e0e1d9d83715681d2a98cd803177b588b5131ca8b59d9511c namespace=k8s.io
Apr 12 18:50:31.211141 env[1141]: time="2024-04-12T18:50:31.211119721Z" level=info msg="cleaning up dead shim"
Apr 12 18:50:31.222979 env[1141]: time="2024-04-12T18:50:31.222907807Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:50:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1977 runtime=io.containerd.runc.v2\n"
Apr 12 18:50:31.869471 kubelet[1529]: E0412 18:50:31.869408    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:32.051610 systemd[1]: Created slice kubepods-besteffort-pod0e0e3d4a_f1e3_4b25_b663_e6bf26c4b6db.slice.
Apr 12 18:50:32.055492 env[1141]: time="2024-04-12T18:50:32.055440185Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qf2nb,Uid:0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db,Namespace:calico-system,Attempt:0,}"
Apr 12 18:50:32.130152 env[1141]: time="2024-04-12T18:50:32.129970255Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\""
Apr 12 18:50:32.147709 env[1141]: time="2024-04-12T18:50:32.147610831Z" level=error msg="Failed to destroy network for sandbox \"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Apr 12 18:50:32.149492 env[1141]: time="2024-04-12T18:50:32.149432698Z" level=error msg="encountered an error cleaning up failed sandbox \"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Apr 12 18:50:32.149781 env[1141]: time="2024-04-12T18:50:32.149721581Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qf2nb,Uid:0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Apr 12 18:50:32.150613 kubelet[1529]: E0412 18:50:32.150183    1529 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Apr 12 18:50:32.150613 kubelet[1529]: E0412 18:50:32.150259    1529 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qf2nb"
Apr 12 18:50:32.150613 kubelet[1529]: E0412 18:50:32.150295    1529 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qf2nb"
Apr 12 18:50:32.150884 kubelet[1529]: E0412 18:50:32.150372    1529 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-qf2nb_calico-system(0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-qf2nb_calico-system(0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qf2nb" podUID=0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db
Apr 12 18:50:32.151251 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914-shm.mount: Deactivated successfully.
Apr 12 18:50:32.870224 kubelet[1529]: E0412 18:50:32.870142    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:33.131435 kubelet[1529]: I0412 18:50:33.131295    1529 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914"
Apr 12 18:50:33.132480 env[1141]: time="2024-04-12T18:50:33.132433245Z" level=info msg="StopPodSandbox for \"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\""
Apr 12 18:50:33.215094 env[1141]: time="2024-04-12T18:50:33.215003917Z" level=error msg="StopPodSandbox for \"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\" failed" error="failed to destroy network for sandbox \"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Apr 12 18:50:33.215496 kubelet[1529]: E0412 18:50:33.215447    1529 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914"
Apr 12 18:50:33.215680 kubelet[1529]: E0412 18:50:33.215548    1529 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914}
Apr 12 18:50:33.215680 kubelet[1529]: E0412 18:50:33.215606    1529 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Apr 12 18:50:33.215680 kubelet[1529]: E0412 18:50:33.215651    1529 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qf2nb" podUID=0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db
Apr 12 18:50:33.871083 kubelet[1529]: E0412 18:50:33.871009    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:34.857196 kubelet[1529]: E0412 18:50:34.857125    1529 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:34.871515 kubelet[1529]: E0412 18:50:34.871418    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:35.871891 kubelet[1529]: E0412 18:50:35.871815    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:36.090525 kubelet[1529]: I0412 18:50:36.089438    1529 topology_manager.go:212] "Topology Admit Handler"
Apr 12 18:50:36.099280 systemd[1]: Created slice kubepods-besteffort-pod023eb7a0_872f_4c52_b99e_41551240ebde.slice.
Apr 12 18:50:36.139790 kubelet[1529]: I0412 18:50:36.139282    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ksh7w\" (UniqueName: \"kubernetes.io/projected/023eb7a0-872f-4c52-b99e-41551240ebde-kube-api-access-ksh7w\") pod \"nginx-deployment-845c78c8b9-5bvvc\" (UID: \"023eb7a0-872f-4c52-b99e-41551240ebde\") " pod="default/nginx-deployment-845c78c8b9-5bvvc"
Apr 12 18:50:36.407719 env[1141]: time="2024-04-12T18:50:36.407303905Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-5bvvc,Uid:023eb7a0-872f-4c52-b99e-41551240ebde,Namespace:default,Attempt:0,}"
Apr 12 18:50:36.538277 env[1141]: time="2024-04-12T18:50:36.538186164Z" level=error msg="Failed to destroy network for sandbox \"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Apr 12 18:50:36.542649 env[1141]: time="2024-04-12T18:50:36.538737835Z" level=error msg="encountered an error cleaning up failed sandbox \"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Apr 12 18:50:36.542649 env[1141]: time="2024-04-12T18:50:36.538831694Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-5bvvc,Uid:023eb7a0-872f-4c52-b99e-41551240ebde,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Apr 12 18:50:36.541268 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a-shm.mount: Deactivated successfully.
Apr 12 18:50:36.543095 kubelet[1529]: E0412 18:50:36.539158    1529 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Apr 12 18:50:36.543095 kubelet[1529]: E0412 18:50:36.539231    1529 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-5bvvc"
Apr 12 18:50:36.543095 kubelet[1529]: E0412 18:50:36.539280    1529 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-5bvvc"
Apr 12 18:50:36.543313 kubelet[1529]: E0412 18:50:36.539359    1529 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-845c78c8b9-5bvvc_default(023eb7a0-872f-4c52-b99e-41551240ebde)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-845c78c8b9-5bvvc_default(023eb7a0-872f-4c52-b99e-41551240ebde)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-5bvvc" podUID=023eb7a0-872f-4c52-b99e-41551240ebde
Apr 12 18:50:36.872551 kubelet[1529]: E0412 18:50:36.872467    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:37.140798 kubelet[1529]: I0412 18:50:37.140403    1529 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a"
Apr 12 18:50:37.141418 env[1141]: time="2024-04-12T18:50:37.141366489Z" level=info msg="StopPodSandbox for \"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\""
Apr 12 18:50:37.215656 env[1141]: time="2024-04-12T18:50:37.215576952Z" level=error msg="StopPodSandbox for \"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\" failed" error="failed to destroy network for sandbox \"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Apr 12 18:50:37.216015 kubelet[1529]: E0412 18:50:37.215988    1529 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a"
Apr 12 18:50:37.216153 kubelet[1529]: E0412 18:50:37.216082    1529 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a}
Apr 12 18:50:37.216227 kubelet[1529]: E0412 18:50:37.216178    1529 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"023eb7a0-872f-4c52-b99e-41551240ebde\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Apr 12 18:50:37.216371 kubelet[1529]: E0412 18:50:37.216251    1529 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"023eb7a0-872f-4c52-b99e-41551240ebde\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-5bvvc" podUID=023eb7a0-872f-4c52-b99e-41551240ebde
Apr 12 18:50:37.873170 kubelet[1529]: E0412 18:50:37.873080    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:38.498204 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount726786730.mount: Deactivated successfully.
Apr 12 18:50:38.564848 env[1141]: time="2024-04-12T18:50:38.564779813Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:38.568688 env[1141]: time="2024-04-12T18:50:38.568637753Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:38.572130 env[1141]: time="2024-04-12T18:50:38.572083432Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:38.574563 env[1141]: time="2024-04-12T18:50:38.574513815Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:38.575468 env[1141]: time="2024-04-12T18:50:38.575411138Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\""
Apr 12 18:50:38.597831 env[1141]: time="2024-04-12T18:50:38.597775816Z" level=info msg="CreateContainer within sandbox \"bbde84fb0d08924acba74c847cc35865d4d25af0f529bd557b83521da386f32d\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}"
Apr 12 18:50:38.618126 env[1141]: time="2024-04-12T18:50:38.618035148Z" level=info msg="CreateContainer within sandbox \"bbde84fb0d08924acba74c847cc35865d4d25af0f529bd557b83521da386f32d\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"390a2dce474dd8e273a55d7883e670342186c2f78af4f9183ea4d0b4c002d0ac\""
Apr 12 18:50:38.618979 env[1141]: time="2024-04-12T18:50:38.618939313Z" level=info msg="StartContainer for \"390a2dce474dd8e273a55d7883e670342186c2f78af4f9183ea4d0b4c002d0ac\""
Apr 12 18:50:38.644459 systemd[1]: Started cri-containerd-390a2dce474dd8e273a55d7883e670342186c2f78af4f9183ea4d0b4c002d0ac.scope.
Apr 12 18:50:38.709266 kernel: kauditd_printk_skb: 38 callbacks suppressed
Apr 12 18:50:38.709468 kernel: audit: type=1400 audit(1712947838.681:731): avc:  denied  { perfmon } for  pid=2105 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.681000 audit[2105]: AVC avc:  denied  { perfmon } for  pid=2105 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.681000 audit[2105]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fb13638eba8 items=0 ppid=1607 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:38.742515 kernel: audit: type=1300 audit(1712947838.681:731): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fb13638eba8 items=0 ppid=1607 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:38.746705 kernel: audit: type=1327 audit(1712947838.681:731): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339306132646365343734646438653237336135356437383833653637
Apr 12 18:50:38.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339306132646365343734646438653237336135356437383833653637
Apr 12 18:50:38.792300 kernel: audit: type=1400 audit(1712947838.681:732): avc:  denied  { bpf } for  pid=2105 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.681000 audit[2105]: AVC avc:  denied  { bpf } for  pid=2105 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.813432 kernel: audit: type=1400 audit(1712947838.681:732): avc:  denied  { bpf } for  pid=2105 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.681000 audit[2105]: AVC avc:  denied  { bpf } for  pid=2105 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.814077 env[1141]: time="2024-04-12T18:50:38.813982412Z" level=info msg="StartContainer for \"390a2dce474dd8e273a55d7883e670342186c2f78af4f9183ea4d0b4c002d0ac\" returns successfully"
Apr 12 18:50:38.681000 audit[2105]: AVC avc:  denied  { bpf } for  pid=2105 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.835179 kernel: audit: type=1400 audit(1712947838.681:732): avc:  denied  { bpf } for  pid=2105 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.681000 audit[2105]: AVC avc:  denied  { perfmon } for  pid=2105 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.681000 audit[2105]: AVC avc:  denied  { perfmon } for  pid=2105 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.877110 kernel: audit: type=1400 audit(1712947838.681:732): avc:  denied  { perfmon } for  pid=2105 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.877305 kernel: audit: type=1400 audit(1712947838.681:732): avc:  denied  { perfmon } for  pid=2105 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.877355 kernel: audit: type=1400 audit(1712947838.681:732): avc:  denied  { perfmon } for  pid=2105 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.681000 audit[2105]: AVC avc:  denied  { perfmon } for  pid=2105 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.877673 kubelet[1529]: E0412 18:50:38.877627    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:38.681000 audit[2105]: AVC avc:  denied  { perfmon } for  pid=2105 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.918781 kernel: audit: type=1400 audit(1712947838.681:732): avc:  denied  { perfmon } for  pid=2105 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.681000 audit[2105]: AVC avc:  denied  { perfmon } for  pid=2105 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.681000 audit[2105]: AVC avc:  denied  { bpf } for  pid=2105 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.681000 audit[2105]: AVC avc:  denied  { bpf } for  pid=2105 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.681000 audit: BPF prog-id=87 op=LOAD
Apr 12 18:50:38.681000 audit[2105]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00028e828 items=0 ppid=1607 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:38.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339306132646365343734646438653237336135356437383833653637
Apr 12 18:50:38.708000 audit[2105]: AVC avc:  denied  { bpf } for  pid=2105 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.708000 audit[2105]: AVC avc:  denied  { bpf } for  pid=2105 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.708000 audit[2105]: AVC avc:  denied  { perfmon } for  pid=2105 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.708000 audit[2105]: AVC avc:  denied  { perfmon } for  pid=2105 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.708000 audit[2105]: AVC avc:  denied  { perfmon } for  pid=2105 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.708000 audit[2105]: AVC avc:  denied  { perfmon } for  pid=2105 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.708000 audit[2105]: AVC avc:  denied  { perfmon } for  pid=2105 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.708000 audit[2105]: AVC avc:  denied  { bpf } for  pid=2105 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.708000 audit[2105]: AVC avc:  denied  { bpf } for  pid=2105 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.708000 audit: BPF prog-id=88 op=LOAD
Apr 12 18:50:38.708000 audit[2105]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00028e878 items=0 ppid=1607 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:38.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339306132646365343734646438653237336135356437383833653637
Apr 12 18:50:38.708000 audit: BPF prog-id=88 op=UNLOAD
Apr 12 18:50:38.708000 audit: BPF prog-id=87 op=UNLOAD
Apr 12 18:50:38.708000 audit[2105]: AVC avc:  denied  { bpf } for  pid=2105 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.708000 audit[2105]: AVC avc:  denied  { bpf } for  pid=2105 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.708000 audit[2105]: AVC avc:  denied  { bpf } for  pid=2105 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.708000 audit[2105]: AVC avc:  denied  { perfmon } for  pid=2105 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.708000 audit[2105]: AVC avc:  denied  { perfmon } for  pid=2105 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.708000 audit[2105]: AVC avc:  denied  { perfmon } for  pid=2105 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.708000 audit[2105]: AVC avc:  denied  { perfmon } for  pid=2105 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.708000 audit[2105]: AVC avc:  denied  { perfmon } for  pid=2105 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.708000 audit[2105]: AVC avc:  denied  { bpf } for  pid=2105 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.708000 audit[2105]: AVC avc:  denied  { bpf } for  pid=2105 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:38.708000 audit: BPF prog-id=89 op=LOAD
Apr 12 18:50:38.708000 audit[2105]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00028e908 items=0 ppid=1607 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:38.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339306132646365343734646438653237336135356437383833653637
Apr 12 18:50:38.979033 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information.
Apr 12 18:50:38.979230 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
Apr 12 18:50:39.169248 kubelet[1529]: I0412 18:50:39.169121    1529 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-bkmww" podStartSLOduration=4.58672426 podCreationTimestamp="2024-04-12 18:50:16 +0000 UTC" firstStartedPulling="2024-04-12 18:50:19.993502782 +0000 UTC m=+5.916104677" lastFinishedPulling="2024-04-12 18:50:38.575846404 +0000 UTC m=+24.498448288" observedRunningTime="2024-04-12 18:50:39.167982591 +0000 UTC m=+25.090584496" watchObservedRunningTime="2024-04-12 18:50:39.169067871 +0000 UTC m=+25.091669778"
Apr 12 18:50:39.878702 kubelet[1529]: E0412 18:50:39.878624    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:40.376000 audit[2203]: AVC avc:  denied  { write } for  pid=2203 comm="tee" name="fd" dev="proc" ino=19180 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Apr 12 18:50:40.376000 audit[2203]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffca7d1951 a2=241 a3=1b6 items=1 ppid=2174 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:40.376000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log"
Apr 12 18:50:40.376000 audit: PATH item=0 name="/dev/fd/63" inode=19167 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:50:40.376000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Apr 12 18:50:40.380000 audit[2213]: AVC avc:  denied  { write } for  pid=2213 comm="tee" name="fd" dev="proc" ino=19186 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Apr 12 18:50:40.380000 audit[2213]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff7900b960 a2=241 a3=1b6 items=1 ppid=2181 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:40.380000 audit: CWD cwd="/etc/service/enabled/bird6/log"
Apr 12 18:50:40.380000 audit: PATH item=0 name="/dev/fd/63" inode=19174 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:50:40.378000 audit[2199]: AVC avc:  denied  { write } for  pid=2199 comm="tee" name="fd" dev="proc" ino=19188 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Apr 12 18:50:40.378000 audit[2199]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa3693962 a2=241 a3=1b6 items=1 ppid=2170 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:40.378000 audit: CWD cwd="/etc/service/enabled/cni/log"
Apr 12 18:50:40.378000 audit: PATH item=0 name="/dev/fd/63" inode=19162 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:50:40.378000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Apr 12 18:50:40.390000 audit[2218]: AVC avc:  denied  { write } for  pid=2218 comm="tee" name="fd" dev="proc" ino=19195 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Apr 12 18:50:40.390000 audit[2218]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc70c2f960 a2=241 a3=1b6 items=1 ppid=2179 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:40.390000 audit: CWD cwd="/etc/service/enabled/confd/log"
Apr 12 18:50:40.390000 audit: PATH item=0 name="/dev/fd/63" inode=19578 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:50:40.390000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Apr 12 18:50:40.380000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Apr 12 18:50:40.406000 audit[2233]: AVC avc:  denied  { write } for  pid=2233 comm="tee" name="fd" dev="proc" ino=19205 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Apr 12 18:50:40.406000 audit[2238]: AVC avc:  denied  { write } for  pid=2238 comm="tee" name="fd" dev="proc" ino=19594 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Apr 12 18:50:40.406000 audit[2238]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc8e700961 a2=241 a3=1b6 items=1 ppid=2183 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:40.406000 audit: CWD cwd="/etc/service/enabled/bird/log"
Apr 12 18:50:40.406000 audit: PATH item=0 name="/dev/fd/63" inode=19589 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:50:40.406000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Apr 12 18:50:40.408000 audit[2225]: AVC avc:  denied  { write } for  pid=2225 comm="tee" name="fd" dev="proc" ino=19596 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Apr 12 18:50:40.408000 audit[2225]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc72896950 a2=241 a3=1b6 items=1 ppid=2169 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:40.408000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log"
Apr 12 18:50:40.408000 audit: PATH item=0 name="/dev/fd/63" inode=19177 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:50:40.408000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Apr 12 18:50:40.406000 audit[2233]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde6722960 a2=241 a3=1b6 items=1 ppid=2177 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:40.406000 audit: CWD cwd="/etc/service/enabled/felix/log"
Apr 12 18:50:40.406000 audit: PATH item=0 name="/dev/fd/63" inode=19588 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:50:40.406000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Apr 12 18:50:40.730098 kernel: Initializing XFRM netlink socket
Apr 12 18:50:40.879327 kubelet[1529]: E0412 18:50:40.879258    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:40.916000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.916000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.916000 audit[2311]: AVC avc:  denied  { perfmon } for  pid=2311 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.916000 audit[2311]: AVC avc:  denied  { perfmon } for  pid=2311 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.916000 audit[2311]: AVC avc:  denied  { perfmon } for  pid=2311 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.916000 audit[2311]: AVC avc:  denied  { perfmon } for  pid=2311 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.916000 audit[2311]: AVC avc:  denied  { perfmon } for  pid=2311 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.916000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.916000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.916000 audit: BPF prog-id=90 op=LOAD
Apr 12 18:50:40.916000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca8168e20 a2=70 a3=7fb482c27000 items=0 ppid=2178 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:40.916000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Apr 12 18:50:40.916000 audit: BPF prog-id=90 op=UNLOAD
Apr 12 18:50:40.916000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.916000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.916000 audit[2311]: AVC avc:  denied  { perfmon } for  pid=2311 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.916000 audit[2311]: AVC avc:  denied  { perfmon } for  pid=2311 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.916000 audit[2311]: AVC avc:  denied  { perfmon } for  pid=2311 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.916000 audit[2311]: AVC avc:  denied  { perfmon } for  pid=2311 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.916000 audit[2311]: AVC avc:  denied  { perfmon } for  pid=2311 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.916000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.916000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.916000 audit: BPF prog-id=91 op=LOAD
Apr 12 18:50:40.916000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca8168e20 a2=70 a3=6f items=0 ppid=2178 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:40.916000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Apr 12 18:50:40.916000 audit: BPF prog-id=91 op=UNLOAD
Apr 12 18:50:40.916000 audit[2311]: AVC avc:  denied  { perfmon } for  pid=2311 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.916000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffca8168dd0 a2=70 a3=7ffca8168e20 items=0 ppid=2178 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:40.916000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Apr 12 18:50:40.917000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.917000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.917000 audit[2311]: AVC avc:  denied  { perfmon } for  pid=2311 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.917000 audit[2311]: AVC avc:  denied  { perfmon } for  pid=2311 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.917000 audit[2311]: AVC avc:  denied  { perfmon } for  pid=2311 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.917000 audit[2311]: AVC avc:  denied  { perfmon } for  pid=2311 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.917000 audit[2311]: AVC avc:  denied  { perfmon } for  pid=2311 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.917000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.917000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.917000 audit: BPF prog-id=92 op=LOAD
Apr 12 18:50:40.917000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffca8168db0 a2=70 a3=7ffca8168e20 items=0 ppid=2178 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:40.917000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Apr 12 18:50:40.917000 audit: BPF prog-id=92 op=UNLOAD
Apr 12 18:50:40.917000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.917000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca8168e90 a2=70 a3=0 items=0 ppid=2178 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:40.917000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Apr 12 18:50:40.917000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.917000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca8168e80 a2=70 a3=0 items=0 ppid=2178 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:40.917000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Apr 12 18:50:40.917000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.917000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca8168df0 a2=70 a3=0 items=0 ppid=2178 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:40.917000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Apr 12 18:50:40.918000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.918000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffca8168ec0 a2=70 a3=a4ce10 items=0 ppid=2178 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:40.918000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Apr 12 18:50:40.918000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.918000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffca8168ec0 a2=70 a3=a49880 items=0 ppid=2178 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:40.918000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Apr 12 18:50:40.918000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.918000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.918000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.918000 audit[2311]: AVC avc:  denied  { perfmon } for  pid=2311 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.918000 audit[2311]: AVC avc:  denied  { perfmon } for  pid=2311 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.918000 audit[2311]: AVC avc:  denied  { perfmon } for  pid=2311 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.918000 audit[2311]: AVC avc:  denied  { perfmon } for  pid=2311 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.918000 audit[2311]: AVC avc:  denied  { perfmon } for  pid=2311 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.918000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.918000 audit[2311]: AVC avc:  denied  { bpf } for  pid=2311 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.918000 audit: BPF prog-id=93 op=LOAD
Apr 12 18:50:40.918000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffca8168de0 a2=70 a3=0 items=0 ppid=2178 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:40.918000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Apr 12 18:50:40.929000 audit[2314]: AVC avc:  denied  { bpf } for  pid=2314 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.929000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe00ba31a0 a2=70 a3=fff80800 items=0 ppid=2178 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:40.929000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Apr 12 18:50:40.929000 audit[2314]: AVC avc:  denied  { bpf } for  pid=2314 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:40.929000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe00ba3070 a2=70 a3=3 items=0 ppid=2178 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:40.929000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Apr 12 18:50:40.939000 audit: BPF prog-id=93 op=UNLOAD
Apr 12 18:50:40.939000 audit[1011]: SYSCALL arch=c000003e syscall=56 success=yes exit=2318 a0=1200011 a1=0 a2=0 a3=7f12c497cc90 items=0 ppid=1 pid=1011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-udevd" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:40.939000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-udevd"
Apr 12 18:50:41.027000 audit[2336]: NETFILTER_CFG table=mangle:69 family=2 entries=16 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Apr 12 18:50:41.027000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffca3f94a70 a2=0 a3=7ffca3f94a5c items=0 ppid=2178 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:41.027000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Apr 12 18:50:41.041000 audit[2337]: NETFILTER_CFG table=raw:70 family=2 entries=19 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Apr 12 18:50:41.041000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffc8e4d4df0 a2=0 a3=7ffc8e4d4ddc items=0 ppid=2178 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:41.041000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Apr 12 18:50:41.047000 audit[2338]: NETFILTER_CFG table=nat:71 family=2 entries=15 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Apr 12 18:50:41.047000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc65bcc640 a2=0 a3=7ffc65bcc62c items=0 ppid=2178 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:41.047000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Apr 12 18:50:41.053000 audit[2340]: NETFILTER_CFG table=filter:72 family=2 entries=39 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Apr 12 18:50:41.053000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe953867d0 a2=0 a3=7ffe953867bc items=0 ppid=2178 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:41.053000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Apr 12 18:50:41.758403 systemd-networkd[1023]: vxlan.calico: Link UP
Apr 12 18:50:41.758419 systemd-networkd[1023]: vxlan.calico: Gained carrier
Apr 12 18:50:41.879757 kubelet[1529]: E0412 18:50:41.879690    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:42.880260 kubelet[1529]: E0412 18:50:42.880188    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:42.995826 systemd-networkd[1023]: vxlan.calico: Gained IPv6LL
Apr 12 18:50:43.779451 update_engine[1131]: I0412 18:50:43.779361  1131 update_attempter.cc:509] Updating boot flags...
Apr 12 18:50:43.885303 kubelet[1529]: E0412 18:50:43.883674    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:44.884186 kubelet[1529]: E0412 18:50:44.884138    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:45.876703 kubelet[1529]: I0412 18:50:45.876627    1529 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness"
Apr 12 18:50:45.885277 kubelet[1529]: E0412 18:50:45.885233    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:45.902756 systemd[1]: run-containerd-runc-k8s.io-390a2dce474dd8e273a55d7883e670342186c2f78af4f9183ea4d0b4c002d0ac-runc.pcpsju.mount: Deactivated successfully.
Apr 12 18:50:46.003328 systemd[1]: run-containerd-runc-k8s.io-390a2dce474dd8e273a55d7883e670342186c2f78af4f9183ea4d0b4c002d0ac-runc.880kX4.mount: Deactivated successfully.
Apr 12 18:50:46.885680 kubelet[1529]: E0412 18:50:46.885612    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:47.886747 kubelet[1529]: E0412 18:50:47.886696    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:48.045754 env[1141]: time="2024-04-12T18:50:48.045694375Z" level=info msg="StopPodSandbox for \"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\""
Apr 12 18:50:48.046400 env[1141]: time="2024-04-12T18:50:48.046275926Z" level=info msg="StopPodSandbox for \"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\""
Apr 12 18:50:48.287127 env[1141]: 2024-04-12 18:50:48.180 [INFO][2449] k8s.go 585: Cleaning up netns ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914"
Apr 12 18:50:48.287127 env[1141]: 2024-04-12 18:50:48.180 [INFO][2449] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" iface="eth0" netns="/var/run/netns/cni-0d2c6165-68d5-7629-8bd2-31890d3f44a1"
Apr 12 18:50:48.287127 env[1141]: 2024-04-12 18:50:48.180 [INFO][2449] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" iface="eth0" netns="/var/run/netns/cni-0d2c6165-68d5-7629-8bd2-31890d3f44a1"
Apr 12 18:50:48.287127 env[1141]: 2024-04-12 18:50:48.181 [INFO][2449] dataplane_linux.go 568: Workload's veth was already gone.  Nothing to do. ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" iface="eth0" netns="/var/run/netns/cni-0d2c6165-68d5-7629-8bd2-31890d3f44a1"
Apr 12 18:50:48.287127 env[1141]: 2024-04-12 18:50:48.181 [INFO][2449] k8s.go 592: Releasing IP address(es) ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914"
Apr 12 18:50:48.287127 env[1141]: 2024-04-12 18:50:48.181 [INFO][2449] utils.go 188: Calico CNI releasing IP address ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914"
Apr 12 18:50:48.287127 env[1141]: 2024-04-12 18:50:48.212 [INFO][2460] ipam_plugin.go 415: Releasing address using handleID ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" HandleID="k8s-pod-network.71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" Workload="10.128.0.44-k8s-csi--node--driver--qf2nb-eth0"
Apr 12 18:50:48.287127 env[1141]: 2024-04-12 18:50:48.212 [INFO][2460] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Apr 12 18:50:48.287127 env[1141]: 2024-04-12 18:50:48.212 [INFO][2460] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Apr 12 18:50:48.287127 env[1141]: 2024-04-12 18:50:48.278 [WARNING][2460] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" HandleID="k8s-pod-network.71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" Workload="10.128.0.44-k8s-csi--node--driver--qf2nb-eth0"
Apr 12 18:50:48.287127 env[1141]: 2024-04-12 18:50:48.278 [INFO][2460] ipam_plugin.go 443: Releasing address using workloadID ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" HandleID="k8s-pod-network.71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" Workload="10.128.0.44-k8s-csi--node--driver--qf2nb-eth0"
Apr 12 18:50:48.287127 env[1141]: 2024-04-12 18:50:48.280 [INFO][2460] ipam_plugin.go 377: Released host-wide IPAM lock.
Apr 12 18:50:48.287127 env[1141]: 2024-04-12 18:50:48.282 [INFO][2449] k8s.go 598: Teardown processing complete. ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914"
Apr 12 18:50:48.286860 systemd[1]: run-netns-cni\x2d0d2c6165\x2d68d5\x2d7629\x2d8bd2\x2d31890d3f44a1.mount: Deactivated successfully.
Apr 12 18:50:48.288442 env[1141]: time="2024-04-12T18:50:48.288085111Z" level=info msg="TearDown network for sandbox \"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\" successfully"
Apr 12 18:50:48.288442 env[1141]: time="2024-04-12T18:50:48.288138093Z" level=info msg="StopPodSandbox for \"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\" returns successfully"
Apr 12 18:50:48.289638 env[1141]: time="2024-04-12T18:50:48.289579177Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qf2nb,Uid:0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db,Namespace:calico-system,Attempt:1,}"
Apr 12 18:50:48.302912 env[1141]: 2024-04-12 18:50:48.206 [INFO][2448] k8s.go 585: Cleaning up netns ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a"
Apr 12 18:50:48.302912 env[1141]: 2024-04-12 18:50:48.206 [INFO][2448] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" iface="eth0" netns="/var/run/netns/cni-3f14087a-61df-f4f0-8679-cc1d22865331"
Apr 12 18:50:48.302912 env[1141]: 2024-04-12 18:50:48.207 [INFO][2448] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" iface="eth0" netns="/var/run/netns/cni-3f14087a-61df-f4f0-8679-cc1d22865331"
Apr 12 18:50:48.302912 env[1141]: 2024-04-12 18:50:48.207 [INFO][2448] dataplane_linux.go 568: Workload's veth was already gone.  Nothing to do. ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" iface="eth0" netns="/var/run/netns/cni-3f14087a-61df-f4f0-8679-cc1d22865331"
Apr 12 18:50:48.302912 env[1141]: 2024-04-12 18:50:48.207 [INFO][2448] k8s.go 592: Releasing IP address(es) ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a"
Apr 12 18:50:48.302912 env[1141]: 2024-04-12 18:50:48.207 [INFO][2448] utils.go 188: Calico CNI releasing IP address ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a"
Apr 12 18:50:48.302912 env[1141]: 2024-04-12 18:50:48.233 [INFO][2465] ipam_plugin.go 415: Releasing address using handleID ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" HandleID="k8s-pod-network.a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" Workload="10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0"
Apr 12 18:50:48.302912 env[1141]: 2024-04-12 18:50:48.234 [INFO][2465] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Apr 12 18:50:48.302912 env[1141]: 2024-04-12 18:50:48.280 [INFO][2465] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Apr 12 18:50:48.302912 env[1141]: 2024-04-12 18:50:48.294 [WARNING][2465] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" HandleID="k8s-pod-network.a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" Workload="10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0"
Apr 12 18:50:48.302912 env[1141]: 2024-04-12 18:50:48.294 [INFO][2465] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" HandleID="k8s-pod-network.a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" Workload="10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0"
Apr 12 18:50:48.302912 env[1141]: 2024-04-12 18:50:48.297 [INFO][2465] ipam_plugin.go 377: Released host-wide IPAM lock.
Apr 12 18:50:48.302912 env[1141]: 2024-04-12 18:50:48.301 [INFO][2448] k8s.go 598: Teardown processing complete. ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a"
Apr 12 18:50:48.314001 env[1141]: time="2024-04-12T18:50:48.306215160Z" level=info msg="TearDown network for sandbox \"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\" successfully"
Apr 12 18:50:48.314001 env[1141]: time="2024-04-12T18:50:48.306263044Z" level=info msg="StopPodSandbox for \"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\" returns successfully"
Apr 12 18:50:48.305909 systemd[1]: run-netns-cni\x2d3f14087a\x2d61df\x2df4f0\x2d8679\x2dcc1d22865331.mount: Deactivated successfully.
Apr 12 18:50:48.321758 env[1141]: time="2024-04-12T18:50:48.318935786Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-5bvvc,Uid:023eb7a0-872f-4c52-b99e-41551240ebde,Namespace:default,Attempt:1,}"
Apr 12 18:50:48.553000 audit[2512]: NETFILTER_CFG table=filter:73 family=2 entries=9 op=nft_register_rule pid=2512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Apr 12 18:50:48.558791 kernel: kauditd_printk_skb: 159 callbacks suppressed
Apr 12 18:50:48.558937 kernel: audit: type=1325 audit(1712947848.553:764): table=filter:73 family=2 entries=9 op=nft_register_rule pid=2512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Apr 12 18:50:48.578311 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Apr 12 18:50:48.578129 systemd-networkd[1023]: cali7dd2b04e392: Link UP
Apr 12 18:50:48.595395 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7dd2b04e392: link becomes ready
Apr 12 18:50:48.595524 kernel: audit: type=1300 audit(1712947848.553:764): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc3ed80580 a2=0 a3=7ffc3ed8056c items=0 ppid=1691 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:48.553000 audit[2512]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc3ed80580 a2=0 a3=7ffc3ed8056c items=0 ppid=1691 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:48.591077 systemd-networkd[1023]: cali7dd2b04e392: Gained carrier
Apr 12 18:50:48.553000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Apr 12 18:50:48.641065 kernel: audit: type=1327 audit(1712947848.553:764): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Apr 12 18:50:48.643855 env[1141]: 2024-04-12 18:50:48.413 [INFO][2485] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0 nginx-deployment-845c78c8b9- default  023eb7a0-872f-4c52-b99e-41551240ebde 1037 0 2024-04-12 18:50:36 +0000 UTC <nil> <nil> map[app:nginx pod-template-hash:845c78c8b9 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s  10.128.0.44  nginx-deployment-845c78c8b9-5bvvc eth0 default [] []   [kns.default ksa.default.default] cali7dd2b04e392  [] []}} ContainerID="e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85" Namespace="default" Pod="nginx-deployment-845c78c8b9-5bvvc" WorkloadEndpoint="10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-"
Apr 12 18:50:48.643855 env[1141]: 2024-04-12 18:50:48.413 [INFO][2485] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85" Namespace="default" Pod="nginx-deployment-845c78c8b9-5bvvc" WorkloadEndpoint="10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0"
Apr 12 18:50:48.643855 env[1141]: 2024-04-12 18:50:48.474 [INFO][2504] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85" HandleID="k8s-pod-network.e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85" Workload="10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0"
Apr 12 18:50:48.643855 env[1141]: 2024-04-12 18:50:48.513 [INFO][2504] ipam_plugin.go 268: Auto assigning IP ContainerID="e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85" HandleID="k8s-pod-network.e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85" Workload="10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029c8a0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.44", "pod":"nginx-deployment-845c78c8b9-5bvvc", "timestamp":"2024-04-12 18:50:48.474250355 +0000 UTC"}, Hostname:"10.128.0.44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Apr 12 18:50:48.643855 env[1141]: 2024-04-12 18:50:48.513 [INFO][2504] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Apr 12 18:50:48.643855 env[1141]: 2024-04-12 18:50:48.513 [INFO][2504] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Apr 12 18:50:48.643855 env[1141]: 2024-04-12 18:50:48.513 [INFO][2504] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.44'
Apr 12 18:50:48.643855 env[1141]: 2024-04-12 18:50:48.517 [INFO][2504] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85" host="10.128.0.44"
Apr 12 18:50:48.643855 env[1141]: 2024-04-12 18:50:48.523 [INFO][2504] ipam.go 372: Looking up existing affinities for host host="10.128.0.44"
Apr 12 18:50:48.643855 env[1141]: 2024-04-12 18:50:48.532 [INFO][2504] ipam.go 489: Trying affinity for 192.168.40.128/26 host="10.128.0.44"
Apr 12 18:50:48.643855 env[1141]: 2024-04-12 18:50:48.544 [INFO][2504] ipam.go 155: Attempting to load block cidr=192.168.40.128/26 host="10.128.0.44"
Apr 12 18:50:48.643855 env[1141]: 2024-04-12 18:50:48.550 [INFO][2504] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.40.128/26 host="10.128.0.44"
Apr 12 18:50:48.643855 env[1141]: 2024-04-12 18:50:48.550 [INFO][2504] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.40.128/26 handle="k8s-pod-network.e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85" host="10.128.0.44"
Apr 12 18:50:48.643855 env[1141]: 2024-04-12 18:50:48.556 [INFO][2504] ipam.go 1682: Creating new handle: k8s-pod-network.e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85
Apr 12 18:50:48.643855 env[1141]: 2024-04-12 18:50:48.562 [INFO][2504] ipam.go 1203: Writing block in order to claim IPs block=192.168.40.128/26 handle="k8s-pod-network.e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85" host="10.128.0.44"
Apr 12 18:50:48.643855 env[1141]: 2024-04-12 18:50:48.570 [INFO][2504] ipam.go 1216: Successfully claimed IPs: [192.168.40.129/26] block=192.168.40.128/26 handle="k8s-pod-network.e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85" host="10.128.0.44"
Apr 12 18:50:48.643855 env[1141]: 2024-04-12 18:50:48.570 [INFO][2504] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.40.129/26] handle="k8s-pod-network.e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85" host="10.128.0.44"
Apr 12 18:50:48.643855 env[1141]: 2024-04-12 18:50:48.570 [INFO][2504] ipam_plugin.go 377: Released host-wide IPAM lock.
Apr 12 18:50:48.643855 env[1141]: 2024-04-12 18:50:48.570 [INFO][2504] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.40.129/26] IPv6=[] ContainerID="e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85" HandleID="k8s-pod-network.e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85" Workload="10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0"
Apr 12 18:50:48.644991 env[1141]: 2024-04-12 18:50:48.572 [INFO][2485] k8s.go 385: Populated endpoint ContainerID="e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85" Namespace="default" Pod="nginx-deployment-845c78c8b9-5bvvc" WorkloadEndpoint="10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"023eb7a0-872f-4c52-b99e-41551240ebde", ResourceVersion:"1037", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 50, 36, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.44", ContainerID:"", Pod:"nginx-deployment-845c78c8b9-5bvvc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.40.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali7dd2b04e392", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Apr 12 18:50:48.644991 env[1141]: 2024-04-12 18:50:48.572 [INFO][2485] k8s.go 386: Calico CNI using IPs: [192.168.40.129/32] ContainerID="e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85" Namespace="default" Pod="nginx-deployment-845c78c8b9-5bvvc" WorkloadEndpoint="10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0"
Apr 12 18:50:48.644991 env[1141]: 2024-04-12 18:50:48.572 [INFO][2485] dataplane_linux.go 68: Setting the host side veth name to cali7dd2b04e392 ContainerID="e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85" Namespace="default" Pod="nginx-deployment-845c78c8b9-5bvvc" WorkloadEndpoint="10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0"
Apr 12 18:50:48.644991 env[1141]: 2024-04-12 18:50:48.592 [INFO][2485] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85" Namespace="default" Pod="nginx-deployment-845c78c8b9-5bvvc" WorkloadEndpoint="10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0"
Apr 12 18:50:48.644991 env[1141]: 2024-04-12 18:50:48.628 [INFO][2485] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85" Namespace="default" Pod="nginx-deployment-845c78c8b9-5bvvc" WorkloadEndpoint="10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"023eb7a0-872f-4c52-b99e-41551240ebde", ResourceVersion:"1037", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 50, 36, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.44", ContainerID:"e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85", Pod:"nginx-deployment-845c78c8b9-5bvvc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.40.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali7dd2b04e392", MAC:"86:bc:dc:1d:0d:26", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Apr 12 18:50:48.644991 env[1141]: 2024-04-12 18:50:48.638 [INFO][2485] k8s.go 498: Wrote updated endpoint to datastore ContainerID="e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85" Namespace="default" Pod="nginx-deployment-845c78c8b9-5bvvc" WorkloadEndpoint="10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0"
Apr 12 18:50:48.553000 audit[2512]: NETFILTER_CFG table=nat:74 family=2 entries=27 op=nft_register_chain pid=2512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Apr 12 18:50:48.663073 kernel: audit: type=1325 audit(1712947848.553:765): table=nat:74 family=2 entries=27 op=nft_register_chain pid=2512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Apr 12 18:50:48.553000 audit[2512]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc3ed80580 a2=0 a3=7ffc3ed8056c items=0 ppid=1691 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:48.699082 kernel: audit: type=1300 audit(1712947848.553:765): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc3ed80580 a2=0 a3=7ffc3ed8056c items=0 ppid=1691 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:48.553000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Apr 12 18:50:48.716095 kernel: audit: type=1327 audit(1712947848.553:765): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Apr 12 18:50:48.718000 audit[2525]: NETFILTER_CFG table=filter:75 family=2 entries=36 op=nft_register_chain pid=2525 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Apr 12 18:50:48.733313 env[1141]: time="2024-04-12T18:50:48.733229609Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Apr 12 18:50:48.733606 env[1141]: time="2024-04-12T18:50:48.733557586Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Apr 12 18:50:48.733775 env[1141]: time="2024-04-12T18:50:48.733742297Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Apr 12 18:50:48.734129 env[1141]: time="2024-04-12T18:50:48.734081486Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85 pid=2539 runtime=io.containerd.runc.v2
Apr 12 18:50:48.736079 kernel: audit: type=1325 audit(1712947848.718:766): table=filter:75 family=2 entries=36 op=nft_register_chain pid=2525 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Apr 12 18:50:48.718000 audit[2525]: SYSCALL arch=c000003e syscall=46 success=yes exit=20372 a0=3 a1=7fff86548030 a2=0 a3=7fff8654801c items=0 ppid=2178 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:48.778441 kernel: audit: type=1300 audit(1712947848.718:766): arch=c000003e syscall=46 success=yes exit=20372 a0=3 a1=7fff86548030 a2=0 a3=7fff8654801c items=0 ppid=2178 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:48.778580 kernel: audit: type=1327 audit(1712947848.718:766): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Apr 12 18:50:48.718000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Apr 12 18:50:48.784000 audit[2557]: NETFILTER_CFG table=filter:76 family=2 entries=8 op=nft_register_rule pid=2557 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Apr 12 18:50:48.817682 kernel: audit: type=1325 audit(1712947848.784:767): table=filter:76 family=2 entries=8 op=nft_register_rule pid=2557 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Apr 12 18:50:48.817852 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calieea43b0e41b: link becomes ready
Apr 12 18:50:48.784000 audit[2557]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff9742b410 a2=0 a3=7fff9742b3fc items=0 ppid=1691 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:48.784000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Apr 12 18:50:48.789000 audit[2557]: NETFILTER_CFG table=nat:77 family=2 entries=34 op=nft_register_chain pid=2557 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Apr 12 18:50:48.789000 audit[2557]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff9742b410 a2=0 a3=7fff9742b3fc items=0 ppid=1691 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:48.789000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Apr 12 18:50:48.810946 systemd-networkd[1023]: calieea43b0e41b: Link UP
Apr 12 18:50:48.825420 systemd[1]: Started cri-containerd-e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85.scope.
Apr 12 18:50:48.826003 systemd-networkd[1023]: calieea43b0e41b: Gained carrier
Apr 12 18:50:48.854000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.854000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.854000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.854000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.854000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.854000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.854000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.854000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.854000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.854000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.854000 audit: BPF prog-id=94 op=LOAD
Apr 12 18:50:48.856000 audit[2549]: AVC avc:  denied  { bpf } for  pid=2549 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.856000 audit[2549]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2539 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:48.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535343364646261653530626466393336663164633539663666396433
Apr 12 18:50:48.858000 audit[2549]: AVC avc:  denied  { perfmon } for  pid=2549 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.858000 audit[2549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2539 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:48.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535343364646261653530626466393336663164633539663666396433
Apr 12 18:50:48.858000 audit[2549]: AVC avc:  denied  { bpf } for  pid=2549 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.858000 audit[2549]: AVC avc:  denied  { bpf } for  pid=2549 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.858000 audit[2549]: AVC avc:  denied  { bpf } for  pid=2549 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.858000 audit[2549]: AVC avc:  denied  { perfmon } for  pid=2549 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.858000 audit[2549]: AVC avc:  denied  { perfmon } for  pid=2549 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.858000 audit[2549]: AVC avc:  denied  { perfmon } for  pid=2549 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.858000 audit[2549]: AVC avc:  denied  { perfmon } for  pid=2549 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.858000 audit[2549]: AVC avc:  denied  { perfmon } for  pid=2549 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.858000 audit[2549]: AVC avc:  denied  { bpf } for  pid=2549 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.858000 audit[2549]: AVC avc:  denied  { bpf } for  pid=2549 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.858000 audit: BPF prog-id=95 op=LOAD
Apr 12 18:50:48.858000 audit[2549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b70d0 items=0 ppid=2539 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:48.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535343364646261653530626466393336663164633539663666396433
Apr 12 18:50:48.858000 audit[2549]: AVC avc:  denied  { bpf } for  pid=2549 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.858000 audit[2549]: AVC avc:  denied  { bpf } for  pid=2549 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.858000 audit[2549]: AVC avc:  denied  { perfmon } for  pid=2549 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.858000 audit[2549]: AVC avc:  denied  { perfmon } for  pid=2549 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.858000 audit[2549]: AVC avc:  denied  { perfmon } for  pid=2549 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.858000 audit[2549]: AVC avc:  denied  { perfmon } for  pid=2549 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.858000 audit[2549]: AVC avc:  denied  { perfmon } for  pid=2549 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.858000 audit[2549]: AVC avc:  denied  { bpf } for  pid=2549 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.858000 audit[2549]: AVC avc:  denied  { bpf } for  pid=2549 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.858000 audit: BPF prog-id=96 op=LOAD
Apr 12 18:50:48.858000 audit[2549]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b7118 items=0 ppid=2539 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:48.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535343364646261653530626466393336663164633539663666396433
Apr 12 18:50:48.859000 audit: BPF prog-id=96 op=UNLOAD
Apr 12 18:50:48.859000 audit: BPF prog-id=95 op=UNLOAD
Apr 12 18:50:48.859000 audit[2549]: AVC avc:  denied  { bpf } for  pid=2549 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.859000 audit[2549]: AVC avc:  denied  { bpf } for  pid=2549 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.859000 audit[2549]: AVC avc:  denied  { bpf } for  pid=2549 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.859000 audit[2549]: AVC avc:  denied  { perfmon } for  pid=2549 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.859000 audit[2549]: AVC avc:  denied  { perfmon } for  pid=2549 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.859000 audit[2549]: AVC avc:  denied  { perfmon } for  pid=2549 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.859000 audit[2549]: AVC avc:  denied  { perfmon } for  pid=2549 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.859000 audit[2549]: AVC avc:  denied  { perfmon } for  pid=2549 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.859000 audit[2549]: AVC avc:  denied  { bpf } for  pid=2549 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.859000 audit[2549]: AVC avc:  denied  { bpf } for  pid=2549 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.859000 audit: BPF prog-id=97 op=LOAD
Apr 12 18:50:48.859000 audit[2549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b7528 items=0 ppid=2539 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:48.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535343364646261653530626466393336663164633539663666396433
Apr 12 18:50:48.869761 env[1141]: 2024-04-12 18:50:48.405 [INFO][2478] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.44-k8s-csi--node--driver--qf2nb-eth0 csi-node-driver- calico-system  0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db 1036 0 2024-04-12 18:50:16 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:54c68f759 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s  10.128.0.44  csi-node-driver-qf2nb eth0 default [] []   [kns.calico-system ksa.calico-system.default] calieea43b0e41b  [] []}} ContainerID="9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2" Namespace="calico-system" Pod="csi-node-driver-qf2nb" WorkloadEndpoint="10.128.0.44-k8s-csi--node--driver--qf2nb-"
Apr 12 18:50:48.869761 env[1141]: 2024-04-12 18:50:48.406 [INFO][2478] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2" Namespace="calico-system" Pod="csi-node-driver-qf2nb" WorkloadEndpoint="10.128.0.44-k8s-csi--node--driver--qf2nb-eth0"
Apr 12 18:50:48.869761 env[1141]: 2024-04-12 18:50:48.466 [INFO][2499] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2" HandleID="k8s-pod-network.9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2" Workload="10.128.0.44-k8s-csi--node--driver--qf2nb-eth0"
Apr 12 18:50:48.869761 env[1141]: 2024-04-12 18:50:48.519 [INFO][2499] ipam_plugin.go 268: Auto assigning IP ContainerID="9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2" HandleID="k8s-pod-network.9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2" Workload="10.128.0.44-k8s-csi--node--driver--qf2nb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003300d0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.128.0.44", "pod":"csi-node-driver-qf2nb", "timestamp":"2024-04-12 18:50:48.46605502 +0000 UTC"}, Hostname:"10.128.0.44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Apr 12 18:50:48.869761 env[1141]: 2024-04-12 18:50:48.519 [INFO][2499] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Apr 12 18:50:48.869761 env[1141]: 2024-04-12 18:50:48.594 [INFO][2499] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Apr 12 18:50:48.869761 env[1141]: 2024-04-12 18:50:48.594 [INFO][2499] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.44'
Apr 12 18:50:48.869761 env[1141]: 2024-04-12 18:50:48.624 [INFO][2499] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2" host="10.128.0.44"
Apr 12 18:50:48.869761 env[1141]: 2024-04-12 18:50:48.663 [INFO][2499] ipam.go 372: Looking up existing affinities for host host="10.128.0.44"
Apr 12 18:50:48.869761 env[1141]: 2024-04-12 18:50:48.712 [INFO][2499] ipam.go 489: Trying affinity for 192.168.40.128/26 host="10.128.0.44"
Apr 12 18:50:48.869761 env[1141]: 2024-04-12 18:50:48.716 [INFO][2499] ipam.go 155: Attempting to load block cidr=192.168.40.128/26 host="10.128.0.44"
Apr 12 18:50:48.869761 env[1141]: 2024-04-12 18:50:48.722 [INFO][2499] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.40.128/26 host="10.128.0.44"
Apr 12 18:50:48.869761 env[1141]: 2024-04-12 18:50:48.722 [INFO][2499] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.40.128/26 handle="k8s-pod-network.9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2" host="10.128.0.44"
Apr 12 18:50:48.869761 env[1141]: 2024-04-12 18:50:48.729 [INFO][2499] ipam.go 1682: Creating new handle: k8s-pod-network.9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2
Apr 12 18:50:48.869761 env[1141]: 2024-04-12 18:50:48.736 [INFO][2499] ipam.go 1203: Writing block in order to claim IPs block=192.168.40.128/26 handle="k8s-pod-network.9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2" host="10.128.0.44"
Apr 12 18:50:48.869761 env[1141]: 2024-04-12 18:50:48.770 [INFO][2499] ipam.go 1216: Successfully claimed IPs: [192.168.40.130/26] block=192.168.40.128/26 handle="k8s-pod-network.9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2" host="10.128.0.44"
Apr 12 18:50:48.869761 env[1141]: 2024-04-12 18:50:48.770 [INFO][2499] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.40.130/26] handle="k8s-pod-network.9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2" host="10.128.0.44"
Apr 12 18:50:48.869761 env[1141]: 2024-04-12 18:50:48.771 [INFO][2499] ipam_plugin.go 377: Released host-wide IPAM lock.
Apr 12 18:50:48.869761 env[1141]: 2024-04-12 18:50:48.771 [INFO][2499] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.40.130/26] IPv6=[] ContainerID="9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2" HandleID="k8s-pod-network.9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2" Workload="10.128.0.44-k8s-csi--node--driver--qf2nb-eth0"
Apr 12 18:50:48.871086 env[1141]: 2024-04-12 18:50:48.792 [INFO][2478] k8s.go 385: Populated endpoint ContainerID="9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2" Namespace="calico-system" Pod="csi-node-driver-qf2nb" WorkloadEndpoint="10.128.0.44-k8s-csi--node--driver--qf2nb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44-k8s-csi--node--driver--qf2nb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db", ResourceVersion:"1036", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 50, 16, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.44", ContainerID:"", Pod:"csi-node-driver-qf2nb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.40.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calieea43b0e41b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Apr 12 18:50:48.871086 env[1141]: 2024-04-12 18:50:48.793 [INFO][2478] k8s.go 386: Calico CNI using IPs: [192.168.40.130/32] ContainerID="9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2" Namespace="calico-system" Pod="csi-node-driver-qf2nb" WorkloadEndpoint="10.128.0.44-k8s-csi--node--driver--qf2nb-eth0"
Apr 12 18:50:48.871086 env[1141]: 2024-04-12 18:50:48.793 [INFO][2478] dataplane_linux.go 68: Setting the host side veth name to calieea43b0e41b ContainerID="9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2" Namespace="calico-system" Pod="csi-node-driver-qf2nb" WorkloadEndpoint="10.128.0.44-k8s-csi--node--driver--qf2nb-eth0"
Apr 12 18:50:48.871086 env[1141]: 2024-04-12 18:50:48.836 [INFO][2478] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2" Namespace="calico-system" Pod="csi-node-driver-qf2nb" WorkloadEndpoint="10.128.0.44-k8s-csi--node--driver--qf2nb-eth0"
Apr 12 18:50:48.871086 env[1141]: 2024-04-12 18:50:48.838 [INFO][2478] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2" Namespace="calico-system" Pod="csi-node-driver-qf2nb" WorkloadEndpoint="10.128.0.44-k8s-csi--node--driver--qf2nb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44-k8s-csi--node--driver--qf2nb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db", ResourceVersion:"1036", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 50, 16, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.44", ContainerID:"9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2", Pod:"csi-node-driver-qf2nb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.40.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calieea43b0e41b", MAC:"ca:c3:59:6b:a3:ad", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Apr 12 18:50:48.871086 env[1141]: 2024-04-12 18:50:48.864 [INFO][2478] k8s.go 498: Wrote updated endpoint to datastore ContainerID="9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2" Namespace="calico-system" Pod="csi-node-driver-qf2nb" WorkloadEndpoint="10.128.0.44-k8s-csi--node--driver--qf2nb-eth0"
Apr 12 18:50:48.887907 kubelet[1529]: E0412 18:50:48.887775    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:48.899328 env[1141]: time="2024-04-12T18:50:48.899216843Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Apr 12 18:50:48.899508 env[1141]: time="2024-04-12T18:50:48.899362781Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Apr 12 18:50:48.899508 env[1141]: time="2024-04-12T18:50:48.899425969Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Apr 12 18:50:48.901118 env[1141]: time="2024-04-12T18:50:48.899760172Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2 pid=2590 runtime=io.containerd.runc.v2
Apr 12 18:50:48.921000 audit[2605]: NETFILTER_CFG table=filter:78 family=2 entries=40 op=nft_register_chain pid=2605 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Apr 12 18:50:48.921000 audit[2605]: SYSCALL arch=c000003e syscall=46 success=yes exit=21592 a0=3 a1=7fff49b27bd0 a2=0 a3=7fff49b27bbc items=0 ppid=2178 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:48.921000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Apr 12 18:50:48.932312 systemd[1]: Started cri-containerd-9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2.scope.
Apr 12 18:50:48.952803 env[1141]: time="2024-04-12T18:50:48.952658615Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-5bvvc,Uid:023eb7a0-872f-4c52-b99e-41551240ebde,Namespace:default,Attempt:1,} returns sandbox id \"e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85\""
Apr 12 18:50:48.956541 env[1141]: time="2024-04-12T18:50:48.955794963Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\""
Apr 12 18:50:48.966000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.966000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.966000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.966000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.966000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.966000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.966000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.966000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.966000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.967000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.967000 audit: BPF prog-id=98 op=LOAD
Apr 12 18:50:48.967000 audit[2599]: AVC avc:  denied  { bpf } for  pid=2599 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.967000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2590 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:48.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962376536616233663339323631353863643463636234653536613533
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { perfmon } for  pid=2599 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2590 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:48.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962376536616233663339323631353863643463636234653536613533
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { bpf } for  pid=2599 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { bpf } for  pid=2599 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { bpf } for  pid=2599 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { perfmon } for  pid=2599 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { perfmon } for  pid=2599 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { perfmon } for  pid=2599 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { perfmon } for  pid=2599 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { perfmon } for  pid=2599 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { bpf } for  pid=2599 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { bpf } for  pid=2599 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit: BPF prog-id=99 op=LOAD
Apr 12 18:50:48.968000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000095b10 items=0 ppid=2590 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:48.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962376536616233663339323631353863643463636234653536613533
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { bpf } for  pid=2599 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { bpf } for  pid=2599 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { perfmon } for  pid=2599 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { perfmon } for  pid=2599 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { perfmon } for  pid=2599 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { perfmon } for  pid=2599 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { perfmon } for  pid=2599 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { bpf } for  pid=2599 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { bpf } for  pid=2599 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit: BPF prog-id=100 op=LOAD
Apr 12 18:50:48.968000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000095b58 items=0 ppid=2590 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:48.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962376536616233663339323631353863643463636234653536613533
Apr 12 18:50:48.968000 audit: BPF prog-id=100 op=UNLOAD
Apr 12 18:50:48.968000 audit: BPF prog-id=99 op=UNLOAD
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { bpf } for  pid=2599 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { bpf } for  pid=2599 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { bpf } for  pid=2599 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { perfmon } for  pid=2599 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { perfmon } for  pid=2599 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { perfmon } for  pid=2599 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { perfmon } for  pid=2599 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { perfmon } for  pid=2599 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { bpf } for  pid=2599 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit[2599]: AVC avc:  denied  { bpf } for  pid=2599 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:48.968000 audit: BPF prog-id=101 op=LOAD
Apr 12 18:50:48.968000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000095f68 items=0 ppid=2590 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:48.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962376536616233663339323631353863643463636234653536613533
Apr 12 18:50:48.986083 env[1141]: time="2024-04-12T18:50:48.985989366Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qf2nb,Uid:0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db,Namespace:calico-system,Attempt:1,} returns sandbox id \"9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2\""
Apr 12 18:50:49.888267 kubelet[1529]: E0412 18:50:49.888219    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:50.482896 systemd-networkd[1023]: cali7dd2b04e392: Gained IPv6LL
Apr 12 18:50:50.483354 systemd-networkd[1023]: calieea43b0e41b: Gained IPv6LL
Apr 12 18:50:50.888548 kubelet[1529]: E0412 18:50:50.888456    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:51.752346 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount123535732.mount: Deactivated successfully.
Apr 12 18:50:51.889198 kubelet[1529]: E0412 18:50:51.889138    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:52.837464 env[1141]: time="2024-04-12T18:50:52.837396127Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:52.840428 env[1141]: time="2024-04-12T18:50:52.840376206Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:52.843498 env[1141]: time="2024-04-12T18:50:52.843446115Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:52.846999 env[1141]: time="2024-04-12T18:50:52.846944803Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:52.847982 env[1141]: time="2024-04-12T18:50:52.847921362Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83\""
Apr 12 18:50:52.850415 env[1141]: time="2024-04-12T18:50:52.850376484Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\""
Apr 12 18:50:52.853673 env[1141]: time="2024-04-12T18:50:52.853530902Z" level=info msg="CreateContainer within sandbox \"e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85\" for container &ContainerMetadata{Name:nginx,Attempt:0,}"
Apr 12 18:50:52.875815 env[1141]: time="2024-04-12T18:50:52.875754902Z" level=info msg="CreateContainer within sandbox \"e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"c81522d7f8e9960bfcb7dcb866172c93900b63c716dce83cde3bf09aec7b952b\""
Apr 12 18:50:52.876963 env[1141]: time="2024-04-12T18:50:52.876919681Z" level=info msg="StartContainer for \"c81522d7f8e9960bfcb7dcb866172c93900b63c716dce83cde3bf09aec7b952b\""
Apr 12 18:50:52.889951 kubelet[1529]: E0412 18:50:52.889886    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:52.910578 systemd[1]: run-containerd-runc-k8s.io-c81522d7f8e9960bfcb7dcb866172c93900b63c716dce83cde3bf09aec7b952b-runc.iSc8hs.mount: Deactivated successfully.
Apr 12 18:50:52.919054 systemd[1]: Started cri-containerd-c81522d7f8e9960bfcb7dcb866172c93900b63c716dce83cde3bf09aec7b952b.scope.
Apr 12 18:50:52.935000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.935000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.935000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.935000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.935000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.935000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.935000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.935000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.935000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.935000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.935000 audit: BPF prog-id=102 op=LOAD
Apr 12 18:50:52.937000 audit[2651]: AVC avc:  denied  { bpf } for  pid=2651 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.937000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2539 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:52.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338313532326437663865393936306266636237646362383636313732
Apr 12 18:50:52.937000 audit[2651]: AVC avc:  denied  { perfmon } for  pid=2651 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.937000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2539 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:52.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338313532326437663865393936306266636237646362383636313732
Apr 12 18:50:52.938000 audit[2651]: AVC avc:  denied  { bpf } for  pid=2651 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.938000 audit[2651]: AVC avc:  denied  { bpf } for  pid=2651 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.938000 audit[2651]: AVC avc:  denied  { bpf } for  pid=2651 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.938000 audit[2651]: AVC avc:  denied  { perfmon } for  pid=2651 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.938000 audit[2651]: AVC avc:  denied  { perfmon } for  pid=2651 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.938000 audit[2651]: AVC avc:  denied  { perfmon } for  pid=2651 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.938000 audit[2651]: AVC avc:  denied  { perfmon } for  pid=2651 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.938000 audit[2651]: AVC avc:  denied  { perfmon } for  pid=2651 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.938000 audit[2651]: AVC avc:  denied  { bpf } for  pid=2651 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.938000 audit[2651]: AVC avc:  denied  { bpf } for  pid=2651 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.938000 audit: BPF prog-id=103 op=LOAD
Apr 12 18:50:52.938000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0001af4b0 items=0 ppid=2539 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:52.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338313532326437663865393936306266636237646362383636313732
Apr 12 18:50:52.939000 audit[2651]: AVC avc:  denied  { bpf } for  pid=2651 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.939000 audit[2651]: AVC avc:  denied  { bpf } for  pid=2651 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.939000 audit[2651]: AVC avc:  denied  { perfmon } for  pid=2651 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.939000 audit[2651]: AVC avc:  denied  { perfmon } for  pid=2651 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.939000 audit[2651]: AVC avc:  denied  { perfmon } for  pid=2651 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.939000 audit[2651]: AVC avc:  denied  { perfmon } for  pid=2651 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.939000 audit[2651]: AVC avc:  denied  { perfmon } for  pid=2651 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.939000 audit[2651]: AVC avc:  denied  { bpf } for  pid=2651 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.939000 audit[2651]: AVC avc:  denied  { bpf } for  pid=2651 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.939000 audit: BPF prog-id=104 op=LOAD
Apr 12 18:50:52.939000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0001af4f8 items=0 ppid=2539 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:52.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338313532326437663865393936306266636237646362383636313732
Apr 12 18:50:52.939000 audit: BPF prog-id=104 op=UNLOAD
Apr 12 18:50:52.939000 audit: BPF prog-id=103 op=UNLOAD
Apr 12 18:50:52.939000 audit[2651]: AVC avc:  denied  { bpf } for  pid=2651 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.939000 audit[2651]: AVC avc:  denied  { bpf } for  pid=2651 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.939000 audit[2651]: AVC avc:  denied  { bpf } for  pid=2651 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.939000 audit[2651]: AVC avc:  denied  { perfmon } for  pid=2651 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.939000 audit[2651]: AVC avc:  denied  { perfmon } for  pid=2651 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.939000 audit[2651]: AVC avc:  denied  { perfmon } for  pid=2651 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.939000 audit[2651]: AVC avc:  denied  { perfmon } for  pid=2651 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.939000 audit[2651]: AVC avc:  denied  { perfmon } for  pid=2651 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.939000 audit[2651]: AVC avc:  denied  { bpf } for  pid=2651 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.939000 audit[2651]: AVC avc:  denied  { bpf } for  pid=2651 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:52.939000 audit: BPF prog-id=105 op=LOAD
Apr 12 18:50:52.939000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0001af908 items=0 ppid=2539 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:52.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338313532326437663865393936306266636237646362383636313732
Apr 12 18:50:52.964596 env[1141]: time="2024-04-12T18:50:52.963989768Z" level=info msg="StartContainer for \"c81522d7f8e9960bfcb7dcb866172c93900b63c716dce83cde3bf09aec7b952b\" returns successfully"
Apr 12 18:50:53.203764 kubelet[1529]: I0412 18:50:53.203586    1529 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-845c78c8b9-5bvvc" podStartSLOduration=13.308362888 podCreationTimestamp="2024-04-12 18:50:36 +0000 UTC" firstStartedPulling="2024-04-12 18:50:48.95500846 +0000 UTC m=+34.877610347" lastFinishedPulling="2024-04-12 18:50:52.850170632 +0000 UTC m=+38.772772528" observedRunningTime="2024-04-12 18:50:53.202834474 +0000 UTC m=+39.125436381" watchObservedRunningTime="2024-04-12 18:50:53.203525069 +0000 UTC m=+39.126126972"
Apr 12 18:50:53.890355 kubelet[1529]: E0412 18:50:53.890278    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:54.025502 env[1141]: time="2024-04-12T18:50:54.025428545Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:54.028243 env[1141]: time="2024-04-12T18:50:54.028194143Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:54.030562 env[1141]: time="2024-04-12T18:50:54.030522308Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:54.032709 env[1141]: time="2024-04-12T18:50:54.032671272Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:54.033587 env[1141]: time="2024-04-12T18:50:54.033545159Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\""
Apr 12 18:50:54.036622 env[1141]: time="2024-04-12T18:50:54.036570932Z" level=info msg="CreateContainer within sandbox \"9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}"
Apr 12 18:50:54.054251 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1206576233.mount: Deactivated successfully.
Apr 12 18:50:54.062612 env[1141]: time="2024-04-12T18:50:54.062546730Z" level=info msg="CreateContainer within sandbox \"9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"8f7dcdcb5e26cda6fc0e76d84dd49da5801afb025aceae2908cd105493e8c5f3\""
Apr 12 18:50:54.063575 env[1141]: time="2024-04-12T18:50:54.063531674Z" level=info msg="StartContainer for \"8f7dcdcb5e26cda6fc0e76d84dd49da5801afb025aceae2908cd105493e8c5f3\""
Apr 12 18:50:54.099576 systemd[1]: Started cri-containerd-8f7dcdcb5e26cda6fc0e76d84dd49da5801afb025aceae2908cd105493e8c5f3.scope.
Apr 12 18:50:54.148981 kernel: kauditd_printk_skb: 179 callbacks suppressed
Apr 12 18:50:54.149216 kernel: audit: type=1400 audit(1712947854.121:824): avc:  denied  { perfmon } for  pid=2707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.121000 audit[2707]: AVC avc:  denied  { perfmon } for  pid=2707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.121000 audit[2707]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fa3a6c97c48 items=0 ppid=2590 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:54.182330 kernel: audit: type=1300 audit(1712947854.121:824): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fa3a6c97c48 items=0 ppid=2590 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:54.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866376463646362356532366364613666633065373664383464643439
Apr 12 18:50:54.231956 kernel: audit: type=1327 audit(1712947854.121:824): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866376463646362356532366364613666633065373664383464643439
Apr 12 18:50:54.232144 kernel: audit: type=1400 audit(1712947854.121:825): avc:  denied  { bpf } for  pid=2707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.121000 audit[2707]: AVC avc:  denied  { bpf } for  pid=2707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.121000 audit[2707]: AVC avc:  denied  { bpf } for  pid=2707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.253117 kernel: audit: type=1400 audit(1712947854.121:825): avc:  denied  { bpf } for  pid=2707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.121000 audit[2707]: AVC avc:  denied  { bpf } for  pid=2707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.121000 audit[2707]: AVC avc:  denied  { perfmon } for  pid=2707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.280058 env[1141]: time="2024-04-12T18:50:54.279986201Z" level=info msg="StartContainer for \"8f7dcdcb5e26cda6fc0e76d84dd49da5801afb025aceae2908cd105493e8c5f3\" returns successfully"
Apr 12 18:50:54.281944 env[1141]: time="2024-04-12T18:50:54.281902656Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\""
Apr 12 18:50:54.297614 kernel: audit: type=1400 audit(1712947854.121:825): avc:  denied  { bpf } for  pid=2707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.297792 kernel: audit: type=1400 audit(1712947854.121:825): avc:  denied  { perfmon } for  pid=2707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.121000 audit[2707]: AVC avc:  denied  { perfmon } for  pid=2707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.318627 kernel: audit: type=1400 audit(1712947854.121:825): avc:  denied  { perfmon } for  pid=2707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.121000 audit[2707]: AVC avc:  denied  { perfmon } for  pid=2707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.339743 kernel: audit: type=1400 audit(1712947854.121:825): avc:  denied  { perfmon } for  pid=2707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.339910 kernel: audit: type=1400 audit(1712947854.121:825): avc:  denied  { perfmon } for  pid=2707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.121000 audit[2707]: AVC avc:  denied  { perfmon } for  pid=2707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.121000 audit[2707]: AVC avc:  denied  { perfmon } for  pid=2707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.121000 audit[2707]: AVC avc:  denied  { bpf } for  pid=2707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.121000 audit[2707]: AVC avc:  denied  { bpf } for  pid=2707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.121000 audit: BPF prog-id=106 op=LOAD
Apr 12 18:50:54.121000 audit[2707]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000390a38 items=0 ppid=2590 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:54.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866376463646362356532366364613666633065373664383464643439
Apr 12 18:50:54.148000 audit[2707]: AVC avc:  denied  { bpf } for  pid=2707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.148000 audit[2707]: AVC avc:  denied  { bpf } for  pid=2707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.148000 audit[2707]: AVC avc:  denied  { perfmon } for  pid=2707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.148000 audit[2707]: AVC avc:  denied  { perfmon } for  pid=2707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.148000 audit[2707]: AVC avc:  denied  { perfmon } for  pid=2707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.148000 audit[2707]: AVC avc:  denied  { perfmon } for  pid=2707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.148000 audit[2707]: AVC avc:  denied  { perfmon } for  pid=2707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.148000 audit[2707]: AVC avc:  denied  { bpf } for  pid=2707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.148000 audit[2707]: AVC avc:  denied  { bpf } for  pid=2707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.148000 audit: BPF prog-id=107 op=LOAD
Apr 12 18:50:54.148000 audit[2707]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000390a88 items=0 ppid=2590 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:54.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866376463646362356532366364613666633065373664383464643439
Apr 12 18:50:54.148000 audit: BPF prog-id=107 op=UNLOAD
Apr 12 18:50:54.148000 audit: BPF prog-id=106 op=UNLOAD
Apr 12 18:50:54.148000 audit[2707]: AVC avc:  denied  { bpf } for  pid=2707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.148000 audit[2707]: AVC avc:  denied  { bpf } for  pid=2707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.148000 audit[2707]: AVC avc:  denied  { bpf } for  pid=2707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.148000 audit[2707]: AVC avc:  denied  { perfmon } for  pid=2707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.148000 audit[2707]: AVC avc:  denied  { perfmon } for  pid=2707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.148000 audit[2707]: AVC avc:  denied  { perfmon } for  pid=2707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.148000 audit[2707]: AVC avc:  denied  { perfmon } for  pid=2707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.148000 audit[2707]: AVC avc:  denied  { perfmon } for  pid=2707 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.148000 audit[2707]: AVC avc:  denied  { bpf } for  pid=2707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.148000 audit[2707]: AVC avc:  denied  { bpf } for  pid=2707 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:54.148000 audit: BPF prog-id=108 op=LOAD
Apr 12 18:50:54.148000 audit[2707]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000390b18 items=0 ppid=2590 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:54.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866376463646362356532366364613666633065373664383464643439
Apr 12 18:50:54.857177 kubelet[1529]: E0412 18:50:54.857122    1529 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:54.890643 kubelet[1529]: E0412 18:50:54.890588    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:55.466520 env[1141]: time="2024-04-12T18:50:55.466431749Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:55.469890 env[1141]: time="2024-04-12T18:50:55.469828653Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:55.472758 env[1141]: time="2024-04-12T18:50:55.472700577Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:55.475573 env[1141]: time="2024-04-12T18:50:55.475510273Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:50:55.476746 env[1141]: time="2024-04-12T18:50:55.476604660Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\""
Apr 12 18:50:55.481836 env[1141]: time="2024-04-12T18:50:55.481775602Z" level=info msg="CreateContainer within sandbox \"9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}"
Apr 12 18:50:55.513013 env[1141]: time="2024-04-12T18:50:55.512940899Z" level=info msg="CreateContainer within sandbox \"9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"df95d43e211c3be0a353b6d0c85571325ff0d6a8e3e26931311f30d8aa7de255\""
Apr 12 18:50:55.513875 env[1141]: time="2024-04-12T18:50:55.513828838Z" level=info msg="StartContainer for \"df95d43e211c3be0a353b6d0c85571325ff0d6a8e3e26931311f30d8aa7de255\""
Apr 12 18:50:55.547561 systemd[1]: Started cri-containerd-df95d43e211c3be0a353b6d0c85571325ff0d6a8e3e26931311f30d8aa7de255.scope.
Apr 12 18:50:55.569000 audit[2743]: AVC avc:  denied  { perfmon } for  pid=2743 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.569000 audit[2743]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fd71abaaba8 items=0 ppid=2590 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:55.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466393564343365323131633362653061333533623664306338353537
Apr 12 18:50:55.569000 audit[2743]: AVC avc:  denied  { bpf } for  pid=2743 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.569000 audit[2743]: AVC avc:  denied  { bpf } for  pid=2743 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.569000 audit[2743]: AVC avc:  denied  { bpf } for  pid=2743 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.569000 audit[2743]: AVC avc:  denied  { perfmon } for  pid=2743 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.569000 audit[2743]: AVC avc:  denied  { perfmon } for  pid=2743 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.569000 audit[2743]: AVC avc:  denied  { perfmon } for  pid=2743 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.569000 audit[2743]: AVC avc:  denied  { perfmon } for  pid=2743 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.569000 audit[2743]: AVC avc:  denied  { perfmon } for  pid=2743 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.569000 audit[2743]: AVC avc:  denied  { bpf } for  pid=2743 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.569000 audit[2743]: AVC avc:  denied  { bpf } for  pid=2743 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.569000 audit: BPF prog-id=109 op=LOAD
Apr 12 18:50:55.569000 audit[2743]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003885b8 items=0 ppid=2590 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:55.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466393564343365323131633362653061333533623664306338353537
Apr 12 18:50:55.570000 audit[2743]: AVC avc:  denied  { bpf } for  pid=2743 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.570000 audit[2743]: AVC avc:  denied  { bpf } for  pid=2743 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.570000 audit[2743]: AVC avc:  denied  { perfmon } for  pid=2743 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.570000 audit[2743]: AVC avc:  denied  { perfmon } for  pid=2743 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.570000 audit[2743]: AVC avc:  denied  { perfmon } for  pid=2743 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.570000 audit[2743]: AVC avc:  denied  { perfmon } for  pid=2743 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.570000 audit[2743]: AVC avc:  denied  { perfmon } for  pid=2743 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.570000 audit[2743]: AVC avc:  denied  { bpf } for  pid=2743 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.570000 audit[2743]: AVC avc:  denied  { bpf } for  pid=2743 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.570000 audit: BPF prog-id=110 op=LOAD
Apr 12 18:50:55.570000 audit[2743]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000388608 items=0 ppid=2590 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:55.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466393564343365323131633362653061333533623664306338353537
Apr 12 18:50:55.571000 audit: BPF prog-id=110 op=UNLOAD
Apr 12 18:50:55.571000 audit: BPF prog-id=109 op=UNLOAD
Apr 12 18:50:55.571000 audit[2743]: AVC avc:  denied  { bpf } for  pid=2743 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.571000 audit[2743]: AVC avc:  denied  { bpf } for  pid=2743 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.571000 audit[2743]: AVC avc:  denied  { bpf } for  pid=2743 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.571000 audit[2743]: AVC avc:  denied  { perfmon } for  pid=2743 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.571000 audit[2743]: AVC avc:  denied  { perfmon } for  pid=2743 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.571000 audit[2743]: AVC avc:  denied  { perfmon } for  pid=2743 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.571000 audit[2743]: AVC avc:  denied  { perfmon } for  pid=2743 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.571000 audit[2743]: AVC avc:  denied  { perfmon } for  pid=2743 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.571000 audit[2743]: AVC avc:  denied  { bpf } for  pid=2743 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.571000 audit[2743]: AVC avc:  denied  { bpf } for  pid=2743 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:55.571000 audit: BPF prog-id=111 op=LOAD
Apr 12 18:50:55.571000 audit[2743]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000388698 items=0 ppid=2590 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:55.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466393564343365323131633362653061333533623664306338353537
Apr 12 18:50:55.598279 env[1141]: time="2024-04-12T18:50:55.598208644Z" level=info msg="StartContainer for \"df95d43e211c3be0a353b6d0c85571325ff0d6a8e3e26931311f30d8aa7de255\" returns successfully"
Apr 12 18:50:55.891374 kubelet[1529]: E0412 18:50:55.891320    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:56.014090 kubelet[1529]: I0412 18:50:56.014033    1529 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0
Apr 12 18:50:56.014090 kubelet[1529]: I0412 18:50:56.014106    1529 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock
Apr 12 18:50:56.223823 kubelet[1529]: I0412 18:50:56.223437    1529 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-qf2nb" podStartSLOduration=33.733925233 podCreationTimestamp="2024-04-12 18:50:16 +0000 UTC" firstStartedPulling="2024-04-12 18:50:48.98785898 +0000 UTC m=+34.910460878" lastFinishedPulling="2024-04-12 18:50:55.477321757 +0000 UTC m=+41.399923654" observedRunningTime="2024-04-12 18:50:56.221533997 +0000 UTC m=+42.144135902" watchObservedRunningTime="2024-04-12 18:50:56.223388009 +0000 UTC m=+42.145989914"
Apr 12 18:50:56.892267 kubelet[1529]: E0412 18:50:56.892166    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:57.441000 audit[2776]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=2776 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Apr 12 18:50:57.441000 audit[2776]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffeab535b40 a2=0 a3=7ffeab535b2c items=0 ppid=1691 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:57.441000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Apr 12 18:50:57.442000 audit[2776]: NETFILTER_CFG table=nat:80 family=2 entries=22 op=nft_register_rule pid=2776 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Apr 12 18:50:57.442000 audit[2776]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffeab535b40 a2=0 a3=0 items=0 ppid=1691 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:57.442000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Apr 12 18:50:57.456000 audit[2778]: NETFILTER_CFG table=filter:81 family=2 entries=32 op=nft_register_rule pid=2778 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Apr 12 18:50:57.456000 audit[2778]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff1ae66dc0 a2=0 a3=7fff1ae66dac items=0 ppid=1691 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:57.456000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Apr 12 18:50:57.457000 audit[2778]: NETFILTER_CFG table=nat:82 family=2 entries=22 op=nft_register_rule pid=2778 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Apr 12 18:50:57.457000 audit[2778]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff1ae66dc0 a2=0 a3=0 items=0 ppid=1691 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:57.457000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Apr 12 18:50:57.499161 kubelet[1529]: I0412 18:50:57.499115    1529 topology_manager.go:212] "Topology Admit Handler"
Apr 12 18:50:57.505799 systemd[1]: Created slice kubepods-besteffort-pod51383c2a_81e8_4fb5_beaa_67e6b30a5f68.slice.
Apr 12 18:50:57.699891 kubelet[1529]: I0412 18:50:57.699632    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/51383c2a-81e8-4fb5-beaa-67e6b30a5f68-data\") pod \"nfs-server-provisioner-0\" (UID: \"51383c2a-81e8-4fb5-beaa-67e6b30a5f68\") " pod="default/nfs-server-provisioner-0"
Apr 12 18:50:57.699891 kubelet[1529]: I0412 18:50:57.699731    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hnzqz\" (UniqueName: \"kubernetes.io/projected/51383c2a-81e8-4fb5-beaa-67e6b30a5f68-kube-api-access-hnzqz\") pod \"nfs-server-provisioner-0\" (UID: \"51383c2a-81e8-4fb5-beaa-67e6b30a5f68\") " pod="default/nfs-server-provisioner-0"
Apr 12 18:50:57.892436 kubelet[1529]: E0412 18:50:57.892354    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:58.111080 env[1141]: time="2024-04-12T18:50:58.111016211Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:51383c2a-81e8-4fb5-beaa-67e6b30a5f68,Namespace:default,Attempt:0,}"
Apr 12 18:50:58.288754 systemd-networkd[1023]: cali60e51b789ff: Link UP
Apr 12 18:50:58.304151 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Apr 12 18:50:58.304402 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready
Apr 12 18:50:58.304836 systemd-networkd[1023]: cali60e51b789ff: Gained carrier
Apr 12 18:50:58.319849 env[1141]: 2024-04-12 18:50:58.183 [INFO][2781] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.44-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default  51383c2a-81e8-4fb5-beaa-67e6b30a5f68 1124 0 2024-04-12 18:50:57 +0000 UTC <nil> <nil> map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s  10.128.0.44  nfs-server-provisioner-0 eth0 nfs-server-provisioner [] []   [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff  [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.44-k8s-nfs--server--provisioner--0-"
Apr 12 18:50:58.319849 env[1141]: 2024-04-12 18:50:58.183 [INFO][2781] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.44-k8s-nfs--server--provisioner--0-eth0"
Apr 12 18:50:58.319849 env[1141]: 2024-04-12 18:50:58.221 [INFO][2792] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6" HandleID="k8s-pod-network.94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6" Workload="10.128.0.44-k8s-nfs--server--provisioner--0-eth0"
Apr 12 18:50:58.319849 env[1141]: 2024-04-12 18:50:58.238 [INFO][2792] ipam_plugin.go 268: Auto assigning IP ContainerID="94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6" HandleID="k8s-pod-network.94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6" Workload="10.128.0.44-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b00b0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.44", "pod":"nfs-server-provisioner-0", "timestamp":"2024-04-12 18:50:58.221589108 +0000 UTC"}, Hostname:"10.128.0.44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Apr 12 18:50:58.319849 env[1141]: 2024-04-12 18:50:58.238 [INFO][2792] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Apr 12 18:50:58.319849 env[1141]: 2024-04-12 18:50:58.238 [INFO][2792] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Apr 12 18:50:58.319849 env[1141]: 2024-04-12 18:50:58.238 [INFO][2792] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.44'
Apr 12 18:50:58.319849 env[1141]: 2024-04-12 18:50:58.241 [INFO][2792] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6" host="10.128.0.44"
Apr 12 18:50:58.319849 env[1141]: 2024-04-12 18:50:58.247 [INFO][2792] ipam.go 372: Looking up existing affinities for host host="10.128.0.44"
Apr 12 18:50:58.319849 env[1141]: 2024-04-12 18:50:58.255 [INFO][2792] ipam.go 489: Trying affinity for 192.168.40.128/26 host="10.128.0.44"
Apr 12 18:50:58.319849 env[1141]: 2024-04-12 18:50:58.259 [INFO][2792] ipam.go 155: Attempting to load block cidr=192.168.40.128/26 host="10.128.0.44"
Apr 12 18:50:58.319849 env[1141]: 2024-04-12 18:50:58.262 [INFO][2792] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.40.128/26 host="10.128.0.44"
Apr 12 18:50:58.319849 env[1141]: 2024-04-12 18:50:58.262 [INFO][2792] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.40.128/26 handle="k8s-pod-network.94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6" host="10.128.0.44"
Apr 12 18:50:58.319849 env[1141]: 2024-04-12 18:50:58.266 [INFO][2792] ipam.go 1682: Creating new handle: k8s-pod-network.94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6
Apr 12 18:50:58.319849 env[1141]: 2024-04-12 18:50:58.273 [INFO][2792] ipam.go 1203: Writing block in order to claim IPs block=192.168.40.128/26 handle="k8s-pod-network.94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6" host="10.128.0.44"
Apr 12 18:50:58.319849 env[1141]: 2024-04-12 18:50:58.282 [INFO][2792] ipam.go 1216: Successfully claimed IPs: [192.168.40.131/26] block=192.168.40.128/26 handle="k8s-pod-network.94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6" host="10.128.0.44"
Apr 12 18:50:58.319849 env[1141]: 2024-04-12 18:50:58.283 [INFO][2792] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.40.131/26] handle="k8s-pod-network.94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6" host="10.128.0.44"
Apr 12 18:50:58.319849 env[1141]: 2024-04-12 18:50:58.283 [INFO][2792] ipam_plugin.go 377: Released host-wide IPAM lock.
Apr 12 18:50:58.319849 env[1141]: 2024-04-12 18:50:58.283 [INFO][2792] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.40.131/26] IPv6=[] ContainerID="94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6" HandleID="k8s-pod-network.94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6" Workload="10.128.0.44-k8s-nfs--server--provisioner--0-eth0"
Apr 12 18:50:58.321104 env[1141]: 2024-04-12 18:50:58.284 [INFO][2781] k8s.go 385: Populated endpoint ContainerID="94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.44-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"51383c2a-81e8-4fb5-beaa-67e6b30a5f68", ResourceVersion:"1124", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 50, 57, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.44", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.40.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Apr 12 18:50:58.321104 env[1141]: 2024-04-12 18:50:58.285 [INFO][2781] k8s.go 386: Calico CNI using IPs: [192.168.40.131/32] ContainerID="94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.44-k8s-nfs--server--provisioner--0-eth0"
Apr 12 18:50:58.321104 env[1141]: 2024-04-12 18:50:58.285 [INFO][2781] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.44-k8s-nfs--server--provisioner--0-eth0"
Apr 12 18:50:58.321104 env[1141]: 2024-04-12 18:50:58.305 [INFO][2781] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.44-k8s-nfs--server--provisioner--0-eth0"
Apr 12 18:50:58.321448 env[1141]: 2024-04-12 18:50:58.306 [INFO][2781] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.44-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"51383c2a-81e8-4fb5-beaa-67e6b30a5f68", ResourceVersion:"1124", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 50, 57, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.44", ContainerID:"94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.40.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"d2:27:81:dd:8f:a3", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Apr 12 18:50:58.321448 env[1141]: 2024-04-12 18:50:58.317 [INFO][2781] k8s.go 498: Wrote updated endpoint to datastore ContainerID="94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.44-k8s-nfs--server--provisioner--0-eth0"
Apr 12 18:50:58.346931 env[1141]: time="2024-04-12T18:50:58.346797301Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Apr 12 18:50:58.346931 env[1141]: time="2024-04-12T18:50:58.346863026Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Apr 12 18:50:58.346931 env[1141]: time="2024-04-12T18:50:58.346905089Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Apr 12 18:50:58.347769 env[1141]: time="2024-04-12T18:50:58.347681276Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6 pid=2819 runtime=io.containerd.runc.v2
Apr 12 18:50:58.381000 audit[2841]: NETFILTER_CFG table=filter:83 family=2 entries=38 op=nft_register_chain pid=2841 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Apr 12 18:50:58.381000 audit[2841]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7fffa26773c0 a2=0 a3=7fffa26773ac items=0 ppid=2178 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:58.381000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Apr 12 18:50:58.396865 systemd[1]: Started cri-containerd-94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6.scope.
Apr 12 18:50:58.420000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.420000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.420000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.420000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.420000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.420000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.420000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.420000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.420000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.421000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.421000 audit: BPF prog-id=112 op=LOAD
Apr 12 18:50:58.421000 audit[2833]: AVC avc:  denied  { bpf } for  pid=2833 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.421000 audit[2833]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2819 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:58.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934623731653865636666666135626537633466363234353961313632
Apr 12 18:50:58.421000 audit[2833]: AVC avc:  denied  { perfmon } for  pid=2833 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.421000 audit[2833]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2819 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:58.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934623731653865636666666135626537633466363234353961313632
Apr 12 18:50:58.421000 audit[2833]: AVC avc:  denied  { bpf } for  pid=2833 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.421000 audit[2833]: AVC avc:  denied  { bpf } for  pid=2833 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.421000 audit[2833]: AVC avc:  denied  { bpf } for  pid=2833 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.421000 audit[2833]: AVC avc:  denied  { perfmon } for  pid=2833 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.421000 audit[2833]: AVC avc:  denied  { perfmon } for  pid=2833 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.421000 audit[2833]: AVC avc:  denied  { perfmon } for  pid=2833 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.421000 audit[2833]: AVC avc:  denied  { perfmon } for  pid=2833 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.421000 audit[2833]: AVC avc:  denied  { perfmon } for  pid=2833 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.421000 audit[2833]: AVC avc:  denied  { bpf } for  pid=2833 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.421000 audit[2833]: AVC avc:  denied  { bpf } for  pid=2833 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.421000 audit: BPF prog-id=113 op=LOAD
Apr 12 18:50:58.421000 audit[2833]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00021c7f0 items=0 ppid=2819 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:58.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934623731653865636666666135626537633466363234353961313632
Apr 12 18:50:58.422000 audit[2833]: AVC avc:  denied  { bpf } for  pid=2833 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.422000 audit[2833]: AVC avc:  denied  { bpf } for  pid=2833 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.422000 audit[2833]: AVC avc:  denied  { perfmon } for  pid=2833 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.422000 audit[2833]: AVC avc:  denied  { perfmon } for  pid=2833 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.422000 audit[2833]: AVC avc:  denied  { perfmon } for  pid=2833 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.422000 audit[2833]: AVC avc:  denied  { perfmon } for  pid=2833 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.422000 audit[2833]: AVC avc:  denied  { perfmon } for  pid=2833 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.422000 audit[2833]: AVC avc:  denied  { bpf } for  pid=2833 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.422000 audit[2833]: AVC avc:  denied  { bpf } for  pid=2833 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.422000 audit: BPF prog-id=114 op=LOAD
Apr 12 18:50:58.422000 audit[2833]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00021c838 items=0 ppid=2819 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:58.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934623731653865636666666135626537633466363234353961313632
Apr 12 18:50:58.422000 audit: BPF prog-id=114 op=UNLOAD
Apr 12 18:50:58.422000 audit: BPF prog-id=113 op=UNLOAD
Apr 12 18:50:58.422000 audit[2833]: AVC avc:  denied  { bpf } for  pid=2833 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.422000 audit[2833]: AVC avc:  denied  { bpf } for  pid=2833 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.422000 audit[2833]: AVC avc:  denied  { bpf } for  pid=2833 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.422000 audit[2833]: AVC avc:  denied  { perfmon } for  pid=2833 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.422000 audit[2833]: AVC avc:  denied  { perfmon } for  pid=2833 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.422000 audit[2833]: AVC avc:  denied  { perfmon } for  pid=2833 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.422000 audit[2833]: AVC avc:  denied  { perfmon } for  pid=2833 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.422000 audit[2833]: AVC avc:  denied  { perfmon } for  pid=2833 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.422000 audit[2833]: AVC avc:  denied  { bpf } for  pid=2833 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.422000 audit[2833]: AVC avc:  denied  { bpf } for  pid=2833 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:50:58.422000 audit: BPF prog-id=115 op=LOAD
Apr 12 18:50:58.422000 audit[2833]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00021cc48 items=0 ppid=2819 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:50:58.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934623731653865636666666135626537633466363234353961313632
Apr 12 18:50:58.461357 env[1141]: time="2024-04-12T18:50:58.461291449Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:51383c2a-81e8-4fb5-beaa-67e6b30a5f68,Namespace:default,Attempt:0,} returns sandbox id \"94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6\""
Apr 12 18:50:58.463871 env[1141]: time="2024-04-12T18:50:58.463798642Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\""
Apr 12 18:50:58.816814 systemd[1]: run-containerd-runc-k8s.io-94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6-runc.iV1ECL.mount: Deactivated successfully.
Apr 12 18:50:58.893489 kubelet[1529]: E0412 18:50:58.893397    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:50:59.699448 systemd-networkd[1023]: cali60e51b789ff: Gained IPv6LL
Apr 12 18:50:59.893915 kubelet[1529]: E0412 18:50:59.893868    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:00.894358 kubelet[1529]: E0412 18:51:00.894223    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:01.195144 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1013081401.mount: Deactivated successfully.
Apr 12 18:51:01.894914 kubelet[1529]: E0412 18:51:01.894860    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:02.895884 kubelet[1529]: E0412 18:51:02.895829    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:03.896895 kubelet[1529]: E0412 18:51:03.896817    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:04.897888 kubelet[1529]: E0412 18:51:04.897810    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:05.555537 env[1141]: time="2024-04-12T18:51:05.555468041Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:51:05.558873 env[1141]: time="2024-04-12T18:51:05.558819419Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:51:05.561415 env[1141]: time="2024-04-12T18:51:05.561370069Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:51:05.563883 env[1141]: time="2024-04-12T18:51:05.563836840Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:51:05.564901 env[1141]: time="2024-04-12T18:51:05.564847252Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\""
Apr 12 18:51:05.568029 env[1141]: time="2024-04-12T18:51:05.567975281Z" level=info msg="CreateContainer within sandbox \"94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}"
Apr 12 18:51:05.588084 env[1141]: time="2024-04-12T18:51:05.588009877Z" level=info msg="CreateContainer within sandbox \"94b71e8ecfffa5be7c4f62459a1629d8605b4c337032b0ea65bf4f78a9f6a7f6\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"b519d433101d50fc093244fa1267f98e2ddc4d9984ce9e7aab4464a5fd47f582\""
Apr 12 18:51:05.588999 env[1141]: time="2024-04-12T18:51:05.588956214Z" level=info msg="StartContainer for \"b519d433101d50fc093244fa1267f98e2ddc4d9984ce9e7aab4464a5fd47f582\""
Apr 12 18:51:05.629494 systemd[1]: Started cri-containerd-b519d433101d50fc093244fa1267f98e2ddc4d9984ce9e7aab4464a5fd47f582.scope.
Apr 12 18:51:05.674801 kernel: kauditd_printk_skb: 148 callbacks suppressed
Apr 12 18:51:05.674989 kernel: audit: type=1400 audit(1712947865.647:859): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.647000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.647000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.716939 kernel: audit: type=1400 audit(1712947865.647:860): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.717127 kernel: audit: type=1400 audit(1712947865.647:861): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.647000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.647000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.647000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.759741 kernel: audit: type=1400 audit(1712947865.647:862): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.759895 kernel: audit: type=1400 audit(1712947865.647:863): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.759940 kernel: audit: type=1400 audit(1712947865.647:864): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.647000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.782101 kernel: audit: type=1400 audit(1712947865.647:865): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.647000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.647000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.802230 kernel: audit: type=1400 audit(1712947865.647:866): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.647000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.848201 kernel: audit: type=1400 audit(1712947865.647:867): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.848392 kernel: audit: type=1400 audit(1712947865.673:868): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.673000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.673000 audit: BPF prog-id=116 op=LOAD
Apr 12 18:51:05.674000 audit[2878]: AVC avc:  denied  { bpf } for  pid=2878 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.674000 audit[2878]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2819 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:05.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235313964343333313031643530666330393332343466613132363766
Apr 12 18:51:05.674000 audit[2878]: AVC avc:  denied  { perfmon } for  pid=2878 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.674000 audit[2878]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2819 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:05.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235313964343333313031643530666330393332343466613132363766
Apr 12 18:51:05.674000 audit[2878]: AVC avc:  denied  { bpf } for  pid=2878 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.674000 audit[2878]: AVC avc:  denied  { bpf } for  pid=2878 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.674000 audit[2878]: AVC avc:  denied  { bpf } for  pid=2878 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.674000 audit[2878]: AVC avc:  denied  { perfmon } for  pid=2878 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.674000 audit[2878]: AVC avc:  denied  { perfmon } for  pid=2878 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.674000 audit[2878]: AVC avc:  denied  { perfmon } for  pid=2878 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.674000 audit[2878]: AVC avc:  denied  { perfmon } for  pid=2878 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.674000 audit[2878]: AVC avc:  denied  { perfmon } for  pid=2878 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.674000 audit[2878]: AVC avc:  denied  { bpf } for  pid=2878 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.674000 audit[2878]: AVC avc:  denied  { bpf } for  pid=2878 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.674000 audit: BPF prog-id=117 op=LOAD
Apr 12 18:51:05.674000 audit[2878]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003c6020 items=0 ppid=2819 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:05.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235313964343333313031643530666330393332343466613132363766
Apr 12 18:51:05.695000 audit[2878]: AVC avc:  denied  { bpf } for  pid=2878 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.695000 audit[2878]: AVC avc:  denied  { bpf } for  pid=2878 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.695000 audit[2878]: AVC avc:  denied  { perfmon } for  pid=2878 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.695000 audit[2878]: AVC avc:  denied  { perfmon } for  pid=2878 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.695000 audit[2878]: AVC avc:  denied  { perfmon } for  pid=2878 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.695000 audit[2878]: AVC avc:  denied  { perfmon } for  pid=2878 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.695000 audit[2878]: AVC avc:  denied  { perfmon } for  pid=2878 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.695000 audit[2878]: AVC avc:  denied  { bpf } for  pid=2878 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.695000 audit[2878]: AVC avc:  denied  { bpf } for  pid=2878 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.695000 audit: BPF prog-id=118 op=LOAD
Apr 12 18:51:05.695000 audit[2878]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003c6068 items=0 ppid=2819 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:05.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235313964343333313031643530666330393332343466613132363766
Apr 12 18:51:05.695000 audit: BPF prog-id=118 op=UNLOAD
Apr 12 18:51:05.695000 audit: BPF prog-id=117 op=UNLOAD
Apr 12 18:51:05.695000 audit[2878]: AVC avc:  denied  { bpf } for  pid=2878 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.695000 audit[2878]: AVC avc:  denied  { bpf } for  pid=2878 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.695000 audit[2878]: AVC avc:  denied  { bpf } for  pid=2878 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.695000 audit[2878]: AVC avc:  denied  { perfmon } for  pid=2878 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.695000 audit[2878]: AVC avc:  denied  { perfmon } for  pid=2878 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.695000 audit[2878]: AVC avc:  denied  { perfmon } for  pid=2878 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.695000 audit[2878]: AVC avc:  denied  { perfmon } for  pid=2878 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.695000 audit[2878]: AVC avc:  denied  { perfmon } for  pid=2878 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.695000 audit[2878]: AVC avc:  denied  { bpf } for  pid=2878 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.695000 audit[2878]: AVC avc:  denied  { bpf } for  pid=2878 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:05.695000 audit: BPF prog-id=119 op=LOAD
Apr 12 18:51:05.695000 audit[2878]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c6478 items=0 ppid=2819 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:05.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235313964343333313031643530666330393332343466613132363766
Apr 12 18:51:05.873674 env[1141]: time="2024-04-12T18:51:05.873618165Z" level=info msg="StartContainer for \"b519d433101d50fc093244fa1267f98e2ddc4d9984ce9e7aab4464a5fd47f582\" returns successfully"
Apr 12 18:51:05.898968 kubelet[1529]: E0412 18:51:05.898877    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:05.919000 audit[2905]: AVC avc:  denied  { search } for  pid=2905 comm="rpcbind" name="crypto" dev="proc" ino=22138 scontext=system_u:system_r:svirt_lxc_net_t:s0:c337,c617 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0
Apr 12 18:51:05.919000 audit[2905]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f518dca70c0 a2=0 a3=0 items=0 ppid=2888 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c337,c617 key=(null)
Apr 12 18:51:05.919000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77
Apr 12 18:51:05.965000 audit[2910]: AVC avc:  denied  { search } for  pid=2910 comm="dbus-daemon" name="crypto" dev="proc" ino=22138 scontext=system_u:system_r:svirt_lxc_net_t:s0:c337,c617 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0
Apr 12 18:51:05.965000 audit[2910]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f2ce0e000c0 a2=0 a3=0 items=0 ppid=2888 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c337,c617 key=(null)
Apr 12 18:51:05.965000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65
Apr 12 18:51:05.969000 audit[2911]: AVC avc:  denied  { watch } for  pid=2911 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538067 scontext=system_u:system_r:svirt_lxc_net_t:s0:c337,c617 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c337,c617 tclass=dir permissive=0
Apr 12 18:51:05.969000 audit[2911]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=560ede9850b0 a2=2c8 a3=7ffec4c1751c items=0 ppid=2888 pid=2911 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c337,c617 key=(null)
Apr 12 18:51:05.969000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65
Apr 12 18:51:05.975000 audit[2912]: AVC avc:  denied  { read } for  pid=2912 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23115 scontext=system_u:system_r:svirt_lxc_net_t:s0:c337,c617 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0
Apr 12 18:51:05.975000 audit[2912]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fac302f2320 a1=80000 a2=d a3=7ffc00295330 items=0 ppid=2888 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c337,c617 key=(null)
Apr 12 18:51:05.975000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66
Apr 12 18:51:05.977000 audit[2912]: AVC avc:  denied  { search } for  pid=2912 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22138 scontext=system_u:system_r:svirt_lxc_net_t:s0:c337,c617 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0
Apr 12 18:51:05.977000 audit[2912]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fac2f8460c0 a2=0 a3=0 items=0 ppid=2888 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c337,c617 key=(null)
Apr 12 18:51:05.977000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66
Apr 12 18:51:06.273982 kubelet[1529]: I0412 18:51:06.273834    1529 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.171391303 podCreationTimestamp="2024-04-12 18:50:57 +0000 UTC" firstStartedPulling="2024-04-12 18:50:58.462958901 +0000 UTC m=+44.385560791" lastFinishedPulling="2024-04-12 18:51:05.56535374 +0000 UTC m=+51.487955636" observedRunningTime="2024-04-12 18:51:06.273470689 +0000 UTC m=+52.196072596" watchObservedRunningTime="2024-04-12 18:51:06.273786148 +0000 UTC m=+52.196388056"
Apr 12 18:51:06.294000 audit[2931]: NETFILTER_CFG table=filter:84 family=2 entries=20 op=nft_register_rule pid=2931 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Apr 12 18:51:06.294000 audit[2931]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffb642bf70 a2=0 a3=7fffb642bf5c items=0 ppid=1691 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:06.294000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Apr 12 18:51:06.297000 audit[2931]: NETFILTER_CFG table=nat:85 family=2 entries=106 op=nft_register_chain pid=2931 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Apr 12 18:51:06.297000 audit[2931]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffb642bf70 a2=0 a3=7fffb642bf5c items=0 ppid=1691 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:06.297000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Apr 12 18:51:06.900233 kubelet[1529]: E0412 18:51:06.900163    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:07.900731 kubelet[1529]: E0412 18:51:07.900655    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:08.900924 kubelet[1529]: E0412 18:51:08.900859    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:09.901418 kubelet[1529]: E0412 18:51:09.901348    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:10.902586 kubelet[1529]: E0412 18:51:10.902511    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:11.903547 kubelet[1529]: E0412 18:51:11.903479    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:12.903801 kubelet[1529]: E0412 18:51:12.903722    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:13.904800 kubelet[1529]: E0412 18:51:13.904726    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:14.858013 kubelet[1529]: E0412 18:51:14.857943    1529 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:14.883776 env[1141]: time="2024-04-12T18:51:14.883140922Z" level=info msg="StopPodSandbox for \"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\""
Apr 12 18:51:14.905496 kubelet[1529]: E0412 18:51:14.905426    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:14.973032 env[1141]: 2024-04-12 18:51:14.933 [WARNING][2954] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44-k8s-csi--node--driver--qf2nb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db", ResourceVersion:"1101", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 50, 16, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.44", ContainerID:"9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2", Pod:"csi-node-driver-qf2nb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.40.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calieea43b0e41b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Apr 12 18:51:14.973032 env[1141]: 2024-04-12 18:51:14.933 [INFO][2954] k8s.go 585: Cleaning up netns ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914"
Apr 12 18:51:14.973032 env[1141]: 2024-04-12 18:51:14.933 [INFO][2954] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" iface="eth0" netns=""
Apr 12 18:51:14.973032 env[1141]: 2024-04-12 18:51:14.933 [INFO][2954] k8s.go 592: Releasing IP address(es) ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914"
Apr 12 18:51:14.973032 env[1141]: 2024-04-12 18:51:14.933 [INFO][2954] utils.go 188: Calico CNI releasing IP address ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914"
Apr 12 18:51:14.973032 env[1141]: 2024-04-12 18:51:14.958 [INFO][2960] ipam_plugin.go 415: Releasing address using handleID ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" HandleID="k8s-pod-network.71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" Workload="10.128.0.44-k8s-csi--node--driver--qf2nb-eth0"
Apr 12 18:51:14.973032 env[1141]: 2024-04-12 18:51:14.959 [INFO][2960] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Apr 12 18:51:14.973032 env[1141]: 2024-04-12 18:51:14.959 [INFO][2960] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Apr 12 18:51:14.973032 env[1141]: 2024-04-12 18:51:14.968 [WARNING][2960] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" HandleID="k8s-pod-network.71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" Workload="10.128.0.44-k8s-csi--node--driver--qf2nb-eth0"
Apr 12 18:51:14.973032 env[1141]: 2024-04-12 18:51:14.968 [INFO][2960] ipam_plugin.go 443: Releasing address using workloadID ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" HandleID="k8s-pod-network.71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" Workload="10.128.0.44-k8s-csi--node--driver--qf2nb-eth0"
Apr 12 18:51:14.973032 env[1141]: 2024-04-12 18:51:14.970 [INFO][2960] ipam_plugin.go 377: Released host-wide IPAM lock.
Apr 12 18:51:14.973032 env[1141]: 2024-04-12 18:51:14.971 [INFO][2954] k8s.go 598: Teardown processing complete. ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914"
Apr 12 18:51:14.973891 env[1141]: time="2024-04-12T18:51:14.973186233Z" level=info msg="TearDown network for sandbox \"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\" successfully"
Apr 12 18:51:14.973891 env[1141]: time="2024-04-12T18:51:14.973244691Z" level=info msg="StopPodSandbox for \"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\" returns successfully"
Apr 12 18:51:14.974119 env[1141]: time="2024-04-12T18:51:14.974075393Z" level=info msg="RemovePodSandbox for \"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\""
Apr 12 18:51:14.974249 env[1141]: time="2024-04-12T18:51:14.974125809Z" level=info msg="Forcibly stopping sandbox \"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\""
Apr 12 18:51:15.084236 env[1141]: 2024-04-12 18:51:15.028 [WARNING][2978] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44-k8s-csi--node--driver--qf2nb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0e0e3d4a-f1e3-4b25-b663-e6bf26c4b6db", ResourceVersion:"1101", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 50, 16, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.44", ContainerID:"9b7e6ab3f3926158cd4ccb4e56a53d5de123e06295fed2ea0c748513c3865bc2", Pod:"csi-node-driver-qf2nb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.40.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calieea43b0e41b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Apr 12 18:51:15.084236 env[1141]: 2024-04-12 18:51:15.029 [INFO][2978] k8s.go 585: Cleaning up netns ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914"
Apr 12 18:51:15.084236 env[1141]: 2024-04-12 18:51:15.029 [INFO][2978] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" iface="eth0" netns=""
Apr 12 18:51:15.084236 env[1141]: 2024-04-12 18:51:15.029 [INFO][2978] k8s.go 592: Releasing IP address(es) ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914"
Apr 12 18:51:15.084236 env[1141]: 2024-04-12 18:51:15.029 [INFO][2978] utils.go 188: Calico CNI releasing IP address ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914"
Apr 12 18:51:15.084236 env[1141]: 2024-04-12 18:51:15.064 [INFO][2984] ipam_plugin.go 415: Releasing address using handleID ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" HandleID="k8s-pod-network.71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" Workload="10.128.0.44-k8s-csi--node--driver--qf2nb-eth0"
Apr 12 18:51:15.084236 env[1141]: 2024-04-12 18:51:15.064 [INFO][2984] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Apr 12 18:51:15.084236 env[1141]: 2024-04-12 18:51:15.065 [INFO][2984] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Apr 12 18:51:15.084236 env[1141]: 2024-04-12 18:51:15.076 [WARNING][2984] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" HandleID="k8s-pod-network.71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" Workload="10.128.0.44-k8s-csi--node--driver--qf2nb-eth0"
Apr 12 18:51:15.084236 env[1141]: 2024-04-12 18:51:15.076 [INFO][2984] ipam_plugin.go 443: Releasing address using workloadID ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" HandleID="k8s-pod-network.71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914" Workload="10.128.0.44-k8s-csi--node--driver--qf2nb-eth0"
Apr 12 18:51:15.084236 env[1141]: 2024-04-12 18:51:15.079 [INFO][2984] ipam_plugin.go 377: Released host-wide IPAM lock.
Apr 12 18:51:15.084236 env[1141]: 2024-04-12 18:51:15.082 [INFO][2978] k8s.go 598: Teardown processing complete. ContainerID="71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914"
Apr 12 18:51:15.085132 env[1141]: time="2024-04-12T18:51:15.084274249Z" level=info msg="TearDown network for sandbox \"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\" successfully"
Apr 12 18:51:15.089573 env[1141]: time="2024-04-12T18:51:15.089474888Z" level=info msg="RemovePodSandbox \"71c0ba6d29015065995b887084050fc9f208f311a07c92442ce8994ff5e56914\" returns successfully"
Apr 12 18:51:15.092302 env[1141]: time="2024-04-12T18:51:15.092254346Z" level=info msg="StopPodSandbox for \"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\""
Apr 12 18:51:15.185926 env[1141]: 2024-04-12 18:51:15.143 [WARNING][3004] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"023eb7a0-872f-4c52-b99e-41551240ebde", ResourceVersion:"1082", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 50, 36, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.44", ContainerID:"e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85", Pod:"nginx-deployment-845c78c8b9-5bvvc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.40.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali7dd2b04e392", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Apr 12 18:51:15.185926 env[1141]: 2024-04-12 18:51:15.143 [INFO][3004] k8s.go 585: Cleaning up netns ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a"
Apr 12 18:51:15.185926 env[1141]: 2024-04-12 18:51:15.143 [INFO][3004] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" iface="eth0" netns=""
Apr 12 18:51:15.185926 env[1141]: 2024-04-12 18:51:15.143 [INFO][3004] k8s.go 592: Releasing IP address(es) ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a"
Apr 12 18:51:15.185926 env[1141]: 2024-04-12 18:51:15.143 [INFO][3004] utils.go 188: Calico CNI releasing IP address ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a"
Apr 12 18:51:15.185926 env[1141]: 2024-04-12 18:51:15.169 [INFO][3010] ipam_plugin.go 415: Releasing address using handleID ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" HandleID="k8s-pod-network.a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" Workload="10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0"
Apr 12 18:51:15.185926 env[1141]: 2024-04-12 18:51:15.169 [INFO][3010] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Apr 12 18:51:15.185926 env[1141]: 2024-04-12 18:51:15.169 [INFO][3010] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Apr 12 18:51:15.185926 env[1141]: 2024-04-12 18:51:15.179 [WARNING][3010] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" HandleID="k8s-pod-network.a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" Workload="10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0"
Apr 12 18:51:15.185926 env[1141]: 2024-04-12 18:51:15.179 [INFO][3010] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" HandleID="k8s-pod-network.a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" Workload="10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0"
Apr 12 18:51:15.185926 env[1141]: 2024-04-12 18:51:15.181 [INFO][3010] ipam_plugin.go 377: Released host-wide IPAM lock.
Apr 12 18:51:15.185926 env[1141]: 2024-04-12 18:51:15.182 [INFO][3004] k8s.go 598: Teardown processing complete. ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a"
Apr 12 18:51:15.185926 env[1141]: time="2024-04-12T18:51:15.184184525Z" level=info msg="TearDown network for sandbox \"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\" successfully"
Apr 12 18:51:15.185926 env[1141]: time="2024-04-12T18:51:15.184305474Z" level=info msg="StopPodSandbox for \"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\" returns successfully"
Apr 12 18:51:15.187423 env[1141]: time="2024-04-12T18:51:15.187384863Z" level=info msg="RemovePodSandbox for \"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\""
Apr 12 18:51:15.187634 env[1141]: time="2024-04-12T18:51:15.187552493Z" level=info msg="Forcibly stopping sandbox \"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\""
Apr 12 18:51:15.271628 env[1141]: 2024-04-12 18:51:15.232 [WARNING][3029] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"023eb7a0-872f-4c52-b99e-41551240ebde", ResourceVersion:"1082", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 50, 36, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.44", ContainerID:"e543ddbae50bdf936f1dc59f6f9d38430624ca94025a19a72c853924021f6c85", Pod:"nginx-deployment-845c78c8b9-5bvvc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.40.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali7dd2b04e392", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Apr 12 18:51:15.271628 env[1141]: 2024-04-12 18:51:15.232 [INFO][3029] k8s.go 585: Cleaning up netns ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a"
Apr 12 18:51:15.271628 env[1141]: 2024-04-12 18:51:15.232 [INFO][3029] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" iface="eth0" netns=""
Apr 12 18:51:15.271628 env[1141]: 2024-04-12 18:51:15.233 [INFO][3029] k8s.go 592: Releasing IP address(es) ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a"
Apr 12 18:51:15.271628 env[1141]: 2024-04-12 18:51:15.233 [INFO][3029] utils.go 188: Calico CNI releasing IP address ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a"
Apr 12 18:51:15.271628 env[1141]: 2024-04-12 18:51:15.257 [INFO][3035] ipam_plugin.go 415: Releasing address using handleID ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" HandleID="k8s-pod-network.a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" Workload="10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0"
Apr 12 18:51:15.271628 env[1141]: 2024-04-12 18:51:15.257 [INFO][3035] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Apr 12 18:51:15.271628 env[1141]: 2024-04-12 18:51:15.257 [INFO][3035] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Apr 12 18:51:15.271628 env[1141]: 2024-04-12 18:51:15.267 [WARNING][3035] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" HandleID="k8s-pod-network.a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" Workload="10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0"
Apr 12 18:51:15.271628 env[1141]: 2024-04-12 18:51:15.267 [INFO][3035] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" HandleID="k8s-pod-network.a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a" Workload="10.128.0.44-k8s-nginx--deployment--845c78c8b9--5bvvc-eth0"
Apr 12 18:51:15.271628 env[1141]: 2024-04-12 18:51:15.269 [INFO][3035] ipam_plugin.go 377: Released host-wide IPAM lock.
Apr 12 18:51:15.271628 env[1141]: 2024-04-12 18:51:15.270 [INFO][3029] k8s.go 598: Teardown processing complete. ContainerID="a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a"
Apr 12 18:51:15.272585 env[1141]: time="2024-04-12T18:51:15.271675229Z" level=info msg="TearDown network for sandbox \"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\" successfully"
Apr 12 18:51:15.276478 env[1141]: time="2024-04-12T18:51:15.276425194Z" level=info msg="RemovePodSandbox \"a7cee958a25ff626737a9cc58e3d1f64fcf5a88c71da58a692ce9a548312ac9a\" returns successfully"
Apr 12 18:51:15.794151 kubelet[1529]: I0412 18:51:15.794095    1529 topology_manager.go:212] "Topology Admit Handler"
Apr 12 18:51:15.801006 systemd[1]: Created slice kubepods-besteffort-pod725436ee_fb44_4e22_8bc7_62fc73312e56.slice.
Apr 12 18:51:15.902270 systemd[1]: run-containerd-runc-k8s.io-390a2dce474dd8e273a55d7883e670342186c2f78af4f9183ea4d0b4c002d0ac-runc.BYFhEc.mount: Deactivated successfully.
Apr 12 18:51:15.905693 kubelet[1529]: E0412 18:51:15.905630    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:15.935147 kubelet[1529]: I0412 18:51:15.935096    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s4b69\" (UniqueName: \"kubernetes.io/projected/725436ee-fb44-4e22-8bc7-62fc73312e56-kube-api-access-s4b69\") pod \"test-pod-1\" (UID: \"725436ee-fb44-4e22-8bc7-62fc73312e56\") " pod="default/test-pod-1"
Apr 12 18:51:15.935335 kubelet[1529]: I0412 18:51:15.935239    1529 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-ddbeee65-8ef9-4136-8301-0953bc656fa6\" (UniqueName: \"kubernetes.io/nfs/725436ee-fb44-4e22-8bc7-62fc73312e56-pvc-ddbeee65-8ef9-4136-8301-0953bc656fa6\") pod \"test-pod-1\" (UID: \"725436ee-fb44-4e22-8bc7-62fc73312e56\") " pod="default/test-pod-1"
Apr 12 18:51:16.073960 kernel: Failed to create system directory netfs
Apr 12 18:51:16.074155 kernel: kauditd_printk_skb: 68 callbacks suppressed
Apr 12 18:51:16.074206 kernel: audit: type=1400 audit(1712947876.058:884): avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.074248 kernel: Failed to create system directory netfs
Apr 12 18:51:16.058000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.102583 kernel: audit: type=1400 audit(1712947876.058:884): avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.102733 kernel: Failed to create system directory netfs
Apr 12 18:51:16.058000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.130767 kernel: audit: type=1400 audit(1712947876.058:884): avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.130947 kernel: Failed to create system directory netfs
Apr 12 18:51:16.058000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.182018 kernel: audit: type=1400 audit(1712947876.058:884): avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.058000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.058000 audit[3066]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55eef69405e0 a1=153bc a2=55eef65f02b0 a3=5 items=0 ppid=56 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:16.058000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Apr 12 18:51:16.226619 kernel: audit: type=1300 audit(1712947876.058:884): arch=c000003e syscall=175 success=yes exit=0 a0=55eef69405e0 a1=153bc a2=55eef65f02b0 a3=5 items=0 ppid=56 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:16.226794 kernel: audit: type=1327 audit(1712947876.058:884): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Apr 12 18:51:16.232222 kernel: Failed to create system directory fscache
Apr 12 18:51:16.232326 kernel: audit: type=1400 audit(1712947876.219:885): avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.219000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.260682 kernel: Failed to create system directory fscache
Apr 12 18:51:16.260853 kernel: audit: type=1400 audit(1712947876.219:885): avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.219000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.289243 kernel: Failed to create system directory fscache
Apr 12 18:51:16.289412 kernel: audit: type=1400 audit(1712947876.219:885): avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.219000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.317714 kernel: Failed to create system directory fscache
Apr 12 18:51:16.317882 kernel: audit: type=1400 audit(1712947876.219:885): avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.219000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.341140 kernel: Failed to create system directory fscache
Apr 12 18:51:16.219000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.219000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.351180 kernel: Failed to create system directory fscache
Apr 12 18:51:16.351318 kernel: Failed to create system directory fscache
Apr 12 18:51:16.219000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.219000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.361659 kernel: Failed to create system directory fscache
Apr 12 18:51:16.361780 kernel: Failed to create system directory fscache
Apr 12 18:51:16.219000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.219000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.372094 kernel: Failed to create system directory fscache
Apr 12 18:51:16.372279 kernel: Failed to create system directory fscache
Apr 12 18:51:16.219000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.219000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.382717 kernel: Failed to create system directory fscache
Apr 12 18:51:16.219000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.388989 kernel: Failed to create system directory fscache
Apr 12 18:51:16.389098 kernel: Failed to create system directory fscache
Apr 12 18:51:16.219000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.399087 kernel: FS-Cache: Loaded
Apr 12 18:51:16.219000 audit[3066]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55eef6b559c0 a1=4c0fc a2=55eef65f02b0 a3=5 items=0 ppid=56 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:16.219000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.449647 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.449775 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.449824 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.459888 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.460012 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.470213 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.470314 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.480682 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.480791 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.490903 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.491018 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.506281 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.506404 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.506441 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.516617 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.516732 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.526869 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.526950 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.537107 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.537195 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.547330 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.547438 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.557600 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.557665 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.563079 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.573102 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.573181 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.583324 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.583409 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.593789 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.593880 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.604133 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.604217 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.614400 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.614509 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.624744 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.624848 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.635086 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.635212 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.645684 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.645784 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.656087 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.656199 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.666862 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.666989 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.677848 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.677972 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.683084 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.693332 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.693458 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.703660 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.703769 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.714256 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.714340 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.724307 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.724431 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.734616 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.734704 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.744987 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.745115 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.751079 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.760523 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.760641 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.771199 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.771310 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.777078 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.786838 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.786959 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.797055 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.797121 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.807921 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.808077 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.813073 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.823695 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.823776 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.833996 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.834123 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.844222 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.844331 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.854463 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.854612 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.859844 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.864880 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.870022 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.875162 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.880286 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.890511 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.890578 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.895718 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.900851 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.906341 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.906536 kubelet[1529]: E0412 18:51:16.906268    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:16.911274 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.918720 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.926955 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.927121 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.937411 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.937486 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.942529 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.952750 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.952927 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.958136 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.963190 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.973422 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.973505 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.983714 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.983783 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.994124 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.994193 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.000145 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.009848 kernel: Failed to create system directory sunrpc
Apr 12 18:51:17.009914 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.020278 kernel: Failed to create system directory sunrpc
Apr 12 18:51:17.020389 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.030593 kernel: Failed to create system directory sunrpc
Apr 12 18:51:17.030698 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.040852 kernel: Failed to create system directory sunrpc
Apr 12 18:51:17.040945 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.046655 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.056283 kernel: Failed to create system directory sunrpc
Apr 12 18:51:17.056385 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.066603 kernel: Failed to create system directory sunrpc
Apr 12 18:51:17.066723 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.076894 kernel: Failed to create system directory sunrpc
Apr 12 18:51:17.076989 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.082302 kernel: Failed to create system directory sunrpc
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:16.426000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.092684 kernel: Failed to create system directory sunrpc
Apr 12 18:51:17.112520 kernel: RPC: Registered named UNIX socket transport module.
Apr 12 18:51:17.112701 kernel: RPC: Registered udp transport module.
Apr 12 18:51:17.112749 kernel: RPC: Registered tcp transport module.
Apr 12 18:51:17.117346 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module.
Apr 12 18:51:16.426000 audit[3066]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55eef6ba1ad0 a1=1a7e9c a2=55eef65f02b0 a3=5 items=6 ppid=56 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:16.426000 audit: CWD cwd="/"
Apr 12 18:51:16.426000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:51:16.426000 audit: PATH item=1 name=(null) inode=23465 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:51:16.426000 audit: PATH item=2 name=(null) inode=23465 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:51:16.426000 audit: PATH item=3 name=(null) inode=23466 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:51:16.426000 audit: PATH item=4 name=(null) inode=23465 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:51:16.426000 audit: PATH item=5 name=(null) inode=23467 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Apr 12 18:51:16.426000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.183561 kernel: Failed to create system directory nfs
Apr 12 18:51:17.183663 kernel: Failed to create system directory nfs
Apr 12 18:51:17.183698 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.193287 kernel: Failed to create system directory nfs
Apr 12 18:51:17.193383 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.203274 kernel: Failed to create system directory nfs
Apr 12 18:51:17.203382 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.213083 kernel: Failed to create system directory nfs
Apr 12 18:51:17.213187 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.222956 kernel: Failed to create system directory nfs
Apr 12 18:51:17.223035 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.237745 kernel: Failed to create system directory nfs
Apr 12 18:51:17.237837 kernel: Failed to create system directory nfs
Apr 12 18:51:17.237874 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.247556 kernel: Failed to create system directory nfs
Apr 12 18:51:17.247632 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.257365 kernel: Failed to create system directory nfs
Apr 12 18:51:17.257441 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.267266 kernel: Failed to create system directory nfs
Apr 12 18:51:17.267391 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.277076 kernel: Failed to create system directory nfs
Apr 12 18:51:17.277168 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.286959 kernel: Failed to create system directory nfs
Apr 12 18:51:17.287067 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.296696 kernel: Failed to create system directory nfs
Apr 12 18:51:17.296783 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.306589 kernel: Failed to create system directory nfs
Apr 12 18:51:17.306681 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.316548 kernel: Failed to create system directory nfs
Apr 12 18:51:17.316647 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.326394 kernel: Failed to create system directory nfs
Apr 12 18:51:17.326518 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.337334 kernel: Failed to create system directory nfs
Apr 12 18:51:17.337472 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.347092 kernel: Failed to create system directory nfs
Apr 12 18:51:17.347204 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.356895 kernel: Failed to create system directory nfs
Apr 12 18:51:17.356985 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.366570 kernel: Failed to create system directory nfs
Apr 12 18:51:17.366720 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.376289 kernel: Failed to create system directory nfs
Apr 12 18:51:17.376423 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.386080 kernel: Failed to create system directory nfs
Apr 12 18:51:17.386170 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.400953 kernel: Failed to create system directory nfs
Apr 12 18:51:17.401107 kernel: Failed to create system directory nfs
Apr 12 18:51:17.401166 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.410784 kernel: Failed to create system directory nfs
Apr 12 18:51:17.410883 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.420769 kernel: Failed to create system directory nfs
Apr 12 18:51:17.420848 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.430668 kernel: Failed to create system directory nfs
Apr 12 18:51:17.430863 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.440844 kernel: Failed to create system directory nfs
Apr 12 18:51:17.440909 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.450741 kernel: Failed to create system directory nfs
Apr 12 18:51:17.450853 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.460494 kernel: Failed to create system directory nfs
Apr 12 18:51:17.460573 kernel: Failed to create system directory nfs
Apr 12 18:51:17.163000 audit[3066]: AVC avc:  denied  { confidentiality } for  pid=3066 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.163000 audit[3066]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55eef6dc2670 a1=16d85c a2=55eef65f02b0 a3=5 items=0 ppid=56 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:17.492993 kernel: FS-Cache: Netfs 'nfs' registered for caching
Apr 12 18:51:17.163000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.551661 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.551787 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.551828 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.561780 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.561877 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.571698 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.571812 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.581567 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.581654 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.591478 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.591563 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.596337 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.601374 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.611196 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.611278 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.616085 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.631348 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.631469 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.631509 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.637155 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.646223 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.646342 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.656136 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.656244 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.666149 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.666265 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.676139 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.676252 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.686336 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.686473 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.691388 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.701420 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.701544 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.711340 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.711440 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.721229 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.721324 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.731127 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.731251 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.740965 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.741092 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.751011 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.751152 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.756970 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.760845 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.770763 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.770909 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.780724 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.780881 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.790650 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.790780 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.800529 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.800659 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.810426 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.810541 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.820381 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.820512 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.830229 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.830358 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.835162 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.845081 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.845192 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.855294 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.855406 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.865174 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.865266 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.875096 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.875215 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.885116 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.885265 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.895006 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.895154 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.904919 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.905036 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.907228 kubelet[1529]: E0412 18:51:17.907107    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.914821 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.914932 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.924729 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.924815 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.934683 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.934783 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.940166 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.945143 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.954713 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.954806 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.964641 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.964759 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.974764 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.974854 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.984735 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.984868 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.994642 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.994749 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.004523 kernel: Failed to create system directory nfs4
Apr 12 18:51:18.004645 kernel: Failed to create system directory nfs4
Apr 12 18:51:17.527000 audit[3071]: AVC avc:  denied  { confidentiality } for  pid=3071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.162802 kernel: NFS: Registering the id_resolver key type
Apr 12 18:51:18.162983 kernel: Key type id_resolver registered
Apr 12 18:51:18.163028 kernel: Key type id_legacy registered
Apr 12 18:51:17.527000 audit[3071]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f70e2e0a010 a1=208ac4 a2=55f53dd9f2b0 a3=5 items=0 ppid=56 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:17.527000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.194115 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.194243 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.194312 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.199185 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.209384 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.209489 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.214596 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.224855 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.224985 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.235087 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.235188 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.245271 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.245393 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.255556 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.255660 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.261136 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.270973 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.271082 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.281345 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.281458 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.287134 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.296740 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.296855 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.301908 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.307287 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.179000 audit[3072]: AVC avc:  denied  { confidentiality } for  pid=3072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Apr 12 18:51:18.318539 kernel: Failed to create system directory rpcgss
Apr 12 18:51:18.179000 audit[3072]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f7de4f7c010 a1=70c3c a2=55bf1fd342b0 a3=5 items=0 ppid=56 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:18.179000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36
Apr 12 18:51:18.350201 nfsidmap[3080]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal'
Apr 12 18:51:18.362387 nfsidmap[3081]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal'
Apr 12 18:51:18.372000 audit[1]: AVC avc:  denied  { watch_reads } for  pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2508 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Apr 12 18:51:18.372000 audit[1]: AVC avc:  denied  { watch_reads } for  pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2508 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Apr 12 18:51:18.372000 audit[1]: AVC avc:  denied  { watch_reads } for  pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2508 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Apr 12 18:51:18.373000 audit[1257]: AVC avc:  denied  { watch_reads } for  pid=1257 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2508 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Apr 12 18:51:18.373000 audit[1257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f5d5047390 a2=10 a3=ae82509257ee667d items=0 ppid=1 pid=1257 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:18.373000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572
Apr 12 18:51:18.373000 audit[1257]: AVC avc:  denied  { watch_reads } for  pid=1257 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2508 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Apr 12 18:51:18.373000 audit[1257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f5d5047390 a2=10 a3=ae82509257ee667d items=0 ppid=1 pid=1257 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:18.373000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572
Apr 12 18:51:18.373000 audit[1257]: AVC avc:  denied  { watch_reads } for  pid=1257 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2508 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Apr 12 18:51:18.373000 audit[1257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f5d5047390 a2=10 a3=ae82509257ee667d items=0 ppid=1 pid=1257 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:18.373000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572
Apr 12 18:51:18.505425 env[1141]: time="2024-04-12T18:51:18.505213112Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:725436ee-fb44-4e22-8bc7-62fc73312e56,Namespace:default,Attempt:0,}"
Apr 12 18:51:18.671374 systemd-networkd[1023]: cali5ec59c6bf6e: Link UP
Apr 12 18:51:18.682354 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Apr 12 18:51:18.683626 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready
Apr 12 18:51:18.682651 systemd-networkd[1023]: cali5ec59c6bf6e: Gained carrier
Apr 12 18:51:18.701567 env[1141]: 2024-04-12 18:51:18.573 [INFO][3085] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.44-k8s-test--pod--1-eth0  default  725436ee-fb44-4e22-8bc7-62fc73312e56 1191 0 2024-04-12 18:50:58 +0000 UTC <nil> <nil> map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s  10.128.0.44  test-pod-1 eth0 default [] []   [kns.default ksa.default.default] cali5ec59c6bf6e  [] []}} ContainerID="b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.44-k8s-test--pod--1-"
Apr 12 18:51:18.701567 env[1141]: 2024-04-12 18:51:18.573 [INFO][3085] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.44-k8s-test--pod--1-eth0"
Apr 12 18:51:18.701567 env[1141]: 2024-04-12 18:51:18.608 [INFO][3096] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52" HandleID="k8s-pod-network.b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52" Workload="10.128.0.44-k8s-test--pod--1-eth0"
Apr 12 18:51:18.701567 env[1141]: 2024-04-12 18:51:18.624 [INFO][3096] ipam_plugin.go 268: Auto assigning IP ContainerID="b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52" HandleID="k8s-pod-network.b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52" Workload="10.128.0.44-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000281d50), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.44", "pod":"test-pod-1", "timestamp":"2024-04-12 18:51:18.608527423 +0000 UTC"}, Hostname:"10.128.0.44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Apr 12 18:51:18.701567 env[1141]: 2024-04-12 18:51:18.624 [INFO][3096] ipam_plugin.go 356: About to acquire host-wide IPAM lock.
Apr 12 18:51:18.701567 env[1141]: 2024-04-12 18:51:18.625 [INFO][3096] ipam_plugin.go 371: Acquired host-wide IPAM lock.
Apr 12 18:51:18.701567 env[1141]: 2024-04-12 18:51:18.625 [INFO][3096] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.44'
Apr 12 18:51:18.701567 env[1141]: 2024-04-12 18:51:18.627 [INFO][3096] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52" host="10.128.0.44"
Apr 12 18:51:18.701567 env[1141]: 2024-04-12 18:51:18.634 [INFO][3096] ipam.go 372: Looking up existing affinities for host host="10.128.0.44"
Apr 12 18:51:18.701567 env[1141]: 2024-04-12 18:51:18.640 [INFO][3096] ipam.go 489: Trying affinity for 192.168.40.128/26 host="10.128.0.44"
Apr 12 18:51:18.701567 env[1141]: 2024-04-12 18:51:18.642 [INFO][3096] ipam.go 155: Attempting to load block cidr=192.168.40.128/26 host="10.128.0.44"
Apr 12 18:51:18.701567 env[1141]: 2024-04-12 18:51:18.645 [INFO][3096] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.40.128/26 host="10.128.0.44"
Apr 12 18:51:18.701567 env[1141]: 2024-04-12 18:51:18.645 [INFO][3096] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.40.128/26 handle="k8s-pod-network.b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52" host="10.128.0.44"
Apr 12 18:51:18.701567 env[1141]: 2024-04-12 18:51:18.647 [INFO][3096] ipam.go 1682: Creating new handle: k8s-pod-network.b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52
Apr 12 18:51:18.701567 env[1141]: 2024-04-12 18:51:18.653 [INFO][3096] ipam.go 1203: Writing block in order to claim IPs block=192.168.40.128/26 handle="k8s-pod-network.b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52" host="10.128.0.44"
Apr 12 18:51:18.701567 env[1141]: 2024-04-12 18:51:18.664 [INFO][3096] ipam.go 1216: Successfully claimed IPs: [192.168.40.132/26] block=192.168.40.128/26 handle="k8s-pod-network.b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52" host="10.128.0.44"
Apr 12 18:51:18.701567 env[1141]: 2024-04-12 18:51:18.664 [INFO][3096] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.40.132/26] handle="k8s-pod-network.b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52" host="10.128.0.44"
Apr 12 18:51:18.701567 env[1141]: 2024-04-12 18:51:18.664 [INFO][3096] ipam_plugin.go 377: Released host-wide IPAM lock.
Apr 12 18:51:18.701567 env[1141]: 2024-04-12 18:51:18.664 [INFO][3096] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.40.132/26] IPv6=[] ContainerID="b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52" HandleID="k8s-pod-network.b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52" Workload="10.128.0.44-k8s-test--pod--1-eth0"
Apr 12 18:51:18.701567 env[1141]: 2024-04-12 18:51:18.666 [INFO][3085] k8s.go 385: Populated endpoint ContainerID="b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.44-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"725436ee-fb44-4e22-8bc7-62fc73312e56", ResourceVersion:"1191", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 50, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.44", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.40.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Apr 12 18:51:18.701567 env[1141]: 2024-04-12 18:51:18.666 [INFO][3085] k8s.go 386: Calico CNI using IPs: [192.168.40.132/32] ContainerID="b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.44-k8s-test--pod--1-eth0"
Apr 12 18:51:18.702993 env[1141]: 2024-04-12 18:51:18.666 [INFO][3085] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.44-k8s-test--pod--1-eth0"
Apr 12 18:51:18.702993 env[1141]: 2024-04-12 18:51:18.684 [INFO][3085] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.44-k8s-test--pod--1-eth0"
Apr 12 18:51:18.702993 env[1141]: 2024-04-12 18:51:18.685 [INFO][3085] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.44-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.44-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"725436ee-fb44-4e22-8bc7-62fc73312e56", ResourceVersion:"1191", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 50, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.44", ContainerID:"b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.40.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"0a:ad:67:98:e0:04", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Apr 12 18:51:18.702993 env[1141]: 2024-04-12 18:51:18.697 [INFO][3085] k8s.go 498: Wrote updated endpoint to datastore ContainerID="b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.44-k8s-test--pod--1-eth0"
Apr 12 18:51:18.719000 audit[3116]: NETFILTER_CFG table=filter:86 family=2 entries=38 op=nft_register_chain pid=3116 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Apr 12 18:51:18.719000 audit[3116]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffc0705cc10 a2=0 a3=7ffc0705cbfc items=0 ppid=2178 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:18.719000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Apr 12 18:51:18.726118 env[1141]: time="2024-04-12T18:51:18.725993228Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Apr 12 18:51:18.726118 env[1141]: time="2024-04-12T18:51:18.726066865Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Apr 12 18:51:18.726118 env[1141]: time="2024-04-12T18:51:18.726087593Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Apr 12 18:51:18.726653 env[1141]: time="2024-04-12T18:51:18.726591142Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52 pid=3123 runtime=io.containerd.runc.v2
Apr 12 18:51:18.747205 systemd[1]: Started cri-containerd-b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52.scope.
Apr 12 18:51:18.773000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.773000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.773000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.773000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.774000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.774000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.774000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.774000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.774000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.774000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.774000 audit: BPF prog-id=120 op=LOAD
Apr 12 18:51:18.776000 audit[3134]: AVC avc:  denied  { bpf } for  pid=3134 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.776000 audit[3134]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3123 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:18.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238363430663231303663336632656566613063383434353762626637
Apr 12 18:51:18.776000 audit[3134]: AVC avc:  denied  { perfmon } for  pid=3134 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.776000 audit[3134]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3123 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:18.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238363430663231303663336632656566613063383434353762626637
Apr 12 18:51:18.776000 audit[3134]: AVC avc:  denied  { bpf } for  pid=3134 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.776000 audit[3134]: AVC avc:  denied  { bpf } for  pid=3134 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.776000 audit[3134]: AVC avc:  denied  { bpf } for  pid=3134 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.776000 audit[3134]: AVC avc:  denied  { perfmon } for  pid=3134 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.776000 audit[3134]: AVC avc:  denied  { perfmon } for  pid=3134 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.776000 audit[3134]: AVC avc:  denied  { perfmon } for  pid=3134 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.776000 audit[3134]: AVC avc:  denied  { perfmon } for  pid=3134 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.776000 audit[3134]: AVC avc:  denied  { perfmon } for  pid=3134 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.776000 audit[3134]: AVC avc:  denied  { bpf } for  pid=3134 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.776000 audit[3134]: AVC avc:  denied  { bpf } for  pid=3134 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.776000 audit: BPF prog-id=121 op=LOAD
Apr 12 18:51:18.776000 audit[3134]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e62b0 items=0 ppid=3123 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:18.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238363430663231303663336632656566613063383434353762626637
Apr 12 18:51:18.776000 audit[3134]: AVC avc:  denied  { bpf } for  pid=3134 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.776000 audit[3134]: AVC avc:  denied  { bpf } for  pid=3134 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.776000 audit[3134]: AVC avc:  denied  { perfmon } for  pid=3134 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.776000 audit[3134]: AVC avc:  denied  { perfmon } for  pid=3134 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.776000 audit[3134]: AVC avc:  denied  { perfmon } for  pid=3134 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.776000 audit[3134]: AVC avc:  denied  { perfmon } for  pid=3134 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.776000 audit[3134]: AVC avc:  denied  { perfmon } for  pid=3134 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.776000 audit[3134]: AVC avc:  denied  { bpf } for  pid=3134 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.776000 audit[3134]: AVC avc:  denied  { bpf } for  pid=3134 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.776000 audit: BPF prog-id=122 op=LOAD
Apr 12 18:51:18.776000 audit[3134]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e62f8 items=0 ppid=3123 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:18.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238363430663231303663336632656566613063383434353762626637
Apr 12 18:51:18.778000 audit: BPF prog-id=122 op=UNLOAD
Apr 12 18:51:18.778000 audit: BPF prog-id=121 op=UNLOAD
Apr 12 18:51:18.778000 audit[3134]: AVC avc:  denied  { bpf } for  pid=3134 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.778000 audit[3134]: AVC avc:  denied  { bpf } for  pid=3134 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.778000 audit[3134]: AVC avc:  denied  { bpf } for  pid=3134 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.778000 audit[3134]: AVC avc:  denied  { perfmon } for  pid=3134 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.778000 audit[3134]: AVC avc:  denied  { perfmon } for  pid=3134 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.778000 audit[3134]: AVC avc:  denied  { perfmon } for  pid=3134 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.778000 audit[3134]: AVC avc:  denied  { perfmon } for  pid=3134 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.778000 audit[3134]: AVC avc:  denied  { perfmon } for  pid=3134 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.778000 audit[3134]: AVC avc:  denied  { bpf } for  pid=3134 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.778000 audit[3134]: AVC avc:  denied  { bpf } for  pid=3134 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:18.778000 audit: BPF prog-id=123 op=LOAD
Apr 12 18:51:18.778000 audit[3134]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e6708 items=0 ppid=3123 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:18.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238363430663231303663336632656566613063383434353762626637
Apr 12 18:51:18.817624 env[1141]: time="2024-04-12T18:51:18.817562752Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:725436ee-fb44-4e22-8bc7-62fc73312e56,Namespace:default,Attempt:0,} returns sandbox id \"b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52\""
Apr 12 18:51:18.820228 env[1141]: time="2024-04-12T18:51:18.820186535Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\""
Apr 12 18:51:18.908009 kubelet[1529]: E0412 18:51:18.907950    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:19.039126 env[1141]: time="2024-04-12T18:51:19.039078950Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:51:19.043182 env[1141]: time="2024-04-12T18:51:19.043131840Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:51:19.046457 env[1141]: time="2024-04-12T18:51:19.046412328Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:51:19.049009 env[1141]: time="2024-04-12T18:51:19.048894553Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Apr 12 18:51:19.051080 env[1141]: time="2024-04-12T18:51:19.051004529Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83\""
Apr 12 18:51:19.053288 env[1141]: time="2024-04-12T18:51:19.053187727Z" level=info msg="CreateContainer within sandbox \"b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52\" for container &ContainerMetadata{Name:test,Attempt:0,}"
Apr 12 18:51:19.073539 env[1141]: time="2024-04-12T18:51:19.073446084Z" level=info msg="CreateContainer within sandbox \"b8640f2106c3f2eefa0c84457bbf7d6b2c6e1e881a55308830995c7c19005f52\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"10e5e0c710ff83163c9a7a314058e4657ce3d9d8ef5ca628d4f069a0e83df7c8\""
Apr 12 18:51:19.076348 env[1141]: time="2024-04-12T18:51:19.076281415Z" level=info msg="StartContainer for \"10e5e0c710ff83163c9a7a314058e4657ce3d9d8ef5ca628d4f069a0e83df7c8\""
Apr 12 18:51:19.102522 systemd[1]: Started cri-containerd-10e5e0c710ff83163c9a7a314058e4657ce3d9d8ef5ca628d4f069a0e83df7c8.scope.
Apr 12 18:51:19.122000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.122000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.122000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.122000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.122000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.122000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.122000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.122000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.122000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.122000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.122000 audit: BPF prog-id=124 op=LOAD
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { bpf } for  pid=3169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3123 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:19.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653565306337313066663833313633633961376133313430353865
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { perfmon } for  pid=3169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3123 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:19.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653565306337313066663833313633633961376133313430353865
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { bpf } for  pid=3169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { bpf } for  pid=3169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { bpf } for  pid=3169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { perfmon } for  pid=3169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { perfmon } for  pid=3169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { perfmon } for  pid=3169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { perfmon } for  pid=3169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { perfmon } for  pid=3169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { bpf } for  pid=3169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { bpf } for  pid=3169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit: BPF prog-id=125 op=LOAD
Apr 12 18:51:19.123000 audit[3169]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000d7d10 items=0 ppid=3123 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:19.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653565306337313066663833313633633961376133313430353865
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { bpf } for  pid=3169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { bpf } for  pid=3169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { perfmon } for  pid=3169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { perfmon } for  pid=3169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { perfmon } for  pid=3169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { perfmon } for  pid=3169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { perfmon } for  pid=3169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { bpf } for  pid=3169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { bpf } for  pid=3169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit: BPF prog-id=126 op=LOAD
Apr 12 18:51:19.123000 audit[3169]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000d7d58 items=0 ppid=3123 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:19.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653565306337313066663833313633633961376133313430353865
Apr 12 18:51:19.123000 audit: BPF prog-id=126 op=UNLOAD
Apr 12 18:51:19.123000 audit: BPF prog-id=125 op=UNLOAD
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { bpf } for  pid=3169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { bpf } for  pid=3169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { bpf } for  pid=3169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { perfmon } for  pid=3169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { perfmon } for  pid=3169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { perfmon } for  pid=3169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { perfmon } for  pid=3169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { perfmon } for  pid=3169 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { bpf } for  pid=3169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit[3169]: AVC avc:  denied  { bpf } for  pid=3169 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Apr 12 18:51:19.123000 audit: BPF prog-id=127 op=LOAD
Apr 12 18:51:19.123000 audit[3169]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c0168 items=0 ppid=3123 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Apr 12 18:51:19.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653565306337313066663833313633633961376133313430353865
Apr 12 18:51:19.146541 env[1141]: time="2024-04-12T18:51:19.144995929Z" level=info msg="StartContainer for \"10e5e0c710ff83163c9a7a314058e4657ce3d9d8ef5ca628d4f069a0e83df7c8\" returns successfully"
Apr 12 18:51:19.338280 kubelet[1529]: I0412 18:51:19.335171    1529 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=21.103538012 podCreationTimestamp="2024-04-12 18:50:58 +0000 UTC" firstStartedPulling="2024-04-12 18:51:18.819671681 +0000 UTC m=+64.742273578" lastFinishedPulling="2024-04-12 18:51:19.051254469 +0000 UTC m=+64.973856364" observedRunningTime="2024-04-12 18:51:19.334954873 +0000 UTC m=+65.257556777" watchObservedRunningTime="2024-04-12 18:51:19.335120798 +0000 UTC m=+65.257722694"
Apr 12 18:51:19.908196 kubelet[1529]: E0412 18:51:19.908132    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:19.922392 systemd-networkd[1023]: cali5ec59c6bf6e: Gained IPv6LL
Apr 12 18:51:20.908689 kubelet[1529]: E0412 18:51:20.908620    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:21.908831 kubelet[1529]: E0412 18:51:21.908768    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:22.909646 kubelet[1529]: E0412 18:51:22.909587    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:23.909870 kubelet[1529]: E0412 18:51:23.909795    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:24.910814 kubelet[1529]: E0412 18:51:24.910747    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Apr 12 18:51:25.911552 kubelet[1529]: E0412 18:51:25.911456    1529 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"