Apr 12 18:47:05.071603 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 18:47:05.071651 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:47:05.071680 kernel: BIOS-provided physical RAM map: Apr 12 18:47:05.071698 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Apr 12 18:47:05.071748 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Apr 12 18:47:05.071765 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Apr 12 18:47:05.071785 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdcfff] usable Apr 12 18:47:05.071802 kernel: BIOS-e820: [mem 0x000000007ffdd000-0x000000007fffffff] reserved Apr 12 18:47:05.071824 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Apr 12 18:47:05.071840 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Apr 12 18:47:05.071856 kernel: NX (Execute Disable) protection: active Apr 12 18:47:05.071872 kernel: SMBIOS 2.8 present. Apr 12 18:47:05.071889 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Apr 12 18:47:05.071905 kernel: Hypervisor detected: KVM Apr 12 18:47:05.071926 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Apr 12 18:47:05.071948 kernel: kvm-clock: cpu 0, msr 5b191001, primary cpu clock Apr 12 18:47:05.071965 kernel: kvm-clock: using sched offset of 8638054237 cycles Apr 12 18:47:05.071985 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Apr 12 18:47:05.072003 kernel: tsc: Detected 1996.249 MHz processor Apr 12 18:47:05.072022 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 18:47:05.072041 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 18:47:05.072059 kernel: last_pfn = 0x7ffdd max_arch_pfn = 0x400000000 Apr 12 18:47:05.072078 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 18:47:05.072101 kernel: ACPI: Early table checksum verification disabled Apr 12 18:47:05.072119 kernel: ACPI: RSDP 0x00000000000F5930 000014 (v00 BOCHS ) Apr 12 18:47:05.072137 kernel: ACPI: RSDT 0x000000007FFE1848 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:47:05.072156 kernel: ACPI: FACP 0x000000007FFE172C 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:47:05.072174 kernel: ACPI: DSDT 0x000000007FFE0040 0016EC (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:47:05.072192 kernel: ACPI: FACS 0x000000007FFE0000 000040 Apr 12 18:47:05.072210 kernel: ACPI: APIC 0x000000007FFE17A0 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:47:05.072228 kernel: ACPI: WAET 0x000000007FFE1820 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:47:05.072246 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe172c-0x7ffe179f] Apr 12 18:47:05.072268 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe172b] Apr 12 18:47:05.072286 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Apr 12 18:47:05.072304 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17a0-0x7ffe181f] Apr 12 18:47:05.072322 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe1820-0x7ffe1847] Apr 12 18:47:05.072340 kernel: No NUMA configuration found Apr 12 18:47:05.072357 kernel: Faking a node at [mem 0x0000000000000000-0x000000007ffdcfff] Apr 12 18:47:05.072375 kernel: NODE_DATA(0) allocated [mem 0x7ffd7000-0x7ffdcfff] Apr 12 18:47:05.072394 kernel: Zone ranges: Apr 12 18:47:05.072423 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 18:47:05.072442 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdcfff] Apr 12 18:47:05.072461 kernel: Normal empty Apr 12 18:47:05.072480 kernel: Movable zone start for each node Apr 12 18:47:05.072498 kernel: Early memory node ranges Apr 12 18:47:05.072517 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Apr 12 18:47:05.072539 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdcfff] Apr 12 18:47:05.072558 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdcfff] Apr 12 18:47:05.072577 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 18:47:05.072595 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Apr 12 18:47:05.072614 kernel: On node 0, zone DMA32: 35 pages in unavailable ranges Apr 12 18:47:05.072632 kernel: ACPI: PM-Timer IO Port: 0x608 Apr 12 18:47:05.072651 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Apr 12 18:47:05.072670 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Apr 12 18:47:05.072689 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Apr 12 18:47:05.072734 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Apr 12 18:47:05.072754 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 18:47:05.072773 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Apr 12 18:47:05.072792 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Apr 12 18:47:05.072810 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 18:47:05.072829 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Apr 12 18:47:05.072848 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Apr 12 18:47:05.072867 kernel: Booting paravirtualized kernel on KVM Apr 12 18:47:05.072887 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 18:47:05.072907 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Apr 12 18:47:05.072931 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Apr 12 18:47:05.072950 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Apr 12 18:47:05.072968 kernel: pcpu-alloc: [0] 0 1 Apr 12 18:47:05.072986 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Apr 12 18:47:05.073005 kernel: kvm-guest: PV spinlocks disabled, no host support Apr 12 18:47:05.073024 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515805 Apr 12 18:47:05.073043 kernel: Policy zone: DMA32 Apr 12 18:47:05.073065 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:47:05.073089 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:47:05.073108 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 18:47:05.073127 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Apr 12 18:47:05.073146 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:47:05.073166 kernel: Memory: 1973284K/2096620K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 123076K reserved, 0K cma-reserved) Apr 12 18:47:05.073185 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Apr 12 18:47:05.073204 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 18:47:05.073223 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 18:47:05.073245 kernel: rcu: Hierarchical RCU implementation. Apr 12 18:47:05.073266 kernel: rcu: RCU event tracing is enabled. Apr 12 18:47:05.073285 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Apr 12 18:47:05.073305 kernel: Rude variant of Tasks RCU enabled. Apr 12 18:47:05.073324 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:47:05.073343 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:47:05.073362 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Apr 12 18:47:05.073381 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Apr 12 18:47:05.073399 kernel: Console: colour VGA+ 80x25 Apr 12 18:47:05.073422 kernel: printk: console [tty0] enabled Apr 12 18:47:05.073442 kernel: printk: console [ttyS0] enabled Apr 12 18:47:05.073461 kernel: ACPI: Core revision 20210730 Apr 12 18:47:05.073480 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 18:47:05.073498 kernel: x2apic enabled Apr 12 18:47:05.073517 kernel: Switched APIC routing to physical x2apic. Apr 12 18:47:05.073537 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Apr 12 18:47:05.073555 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Apr 12 18:47:05.073574 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) Apr 12 18:47:05.073593 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Apr 12 18:47:05.073616 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Apr 12 18:47:05.073635 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 18:47:05.073655 kernel: Spectre V2 : Mitigation: Retpolines Apr 12 18:47:05.073673 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 18:47:05.073693 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Apr 12 18:47:05.076778 kernel: Speculative Store Bypass: Vulnerable Apr 12 18:47:05.076800 kernel: x86/fpu: x87 FPU will use FXSAVE Apr 12 18:47:05.076815 kernel: Freeing SMP alternatives memory: 32K Apr 12 18:47:05.076830 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:47:05.076851 kernel: LSM: Security Framework initializing Apr 12 18:47:05.076865 kernel: SELinux: Initializing. Apr 12 18:47:05.076879 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Apr 12 18:47:05.076894 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Apr 12 18:47:05.076909 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) Apr 12 18:47:05.076923 kernel: Performance Events: AMD PMU driver. Apr 12 18:47:05.076937 kernel: ... version: 0 Apr 12 18:47:05.076951 kernel: ... bit width: 48 Apr 12 18:47:05.076966 kernel: ... generic registers: 4 Apr 12 18:47:05.076993 kernel: ... value mask: 0000ffffffffffff Apr 12 18:47:05.077008 kernel: ... max period: 00007fffffffffff Apr 12 18:47:05.077025 kernel: ... fixed-purpose events: 0 Apr 12 18:47:05.077039 kernel: ... event mask: 000000000000000f Apr 12 18:47:05.077054 kernel: signal: max sigframe size: 1440 Apr 12 18:47:05.077069 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:47:05.077084 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:47:05.077099 kernel: x86: Booting SMP configuration: Apr 12 18:47:05.077117 kernel: .... node #0, CPUs: #1 Apr 12 18:47:05.077132 kernel: kvm-clock: cpu 1, msr 5b191041, secondary cpu clock Apr 12 18:47:05.077147 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Apr 12 18:47:05.077162 kernel: smp: Brought up 1 node, 2 CPUs Apr 12 18:47:05.077177 kernel: smpboot: Max logical packages: 2 Apr 12 18:47:05.077192 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) Apr 12 18:47:05.077207 kernel: devtmpfs: initialized Apr 12 18:47:05.077222 kernel: x86/mm: Memory block size: 128MB Apr 12 18:47:05.077238 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:47:05.077257 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Apr 12 18:47:05.077272 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:47:05.077287 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:47:05.077302 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:47:05.077317 kernel: audit: type=2000 audit(1712947624.161:1): state=initialized audit_enabled=0 res=1 Apr 12 18:47:05.077332 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:47:05.077347 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 18:47:05.077362 kernel: cpuidle: using governor menu Apr 12 18:47:05.077377 kernel: ACPI: bus type PCI registered Apr 12 18:47:05.077396 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:47:05.077411 kernel: dca service started, version 1.12.1 Apr 12 18:47:05.077426 kernel: PCI: Using configuration type 1 for base access Apr 12 18:47:05.077441 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 18:47:05.077456 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:47:05.077471 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:47:05.077486 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:47:05.077500 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:47:05.077515 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:47:05.077534 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:47:05.077549 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:47:05.077564 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:47:05.077578 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Apr 12 18:47:05.077593 kernel: ACPI: Interpreter enabled Apr 12 18:47:05.077608 kernel: ACPI: PM: (supports S0 S3 S5) Apr 12 18:47:05.077623 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 18:47:05.077638 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 18:47:05.077653 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Apr 12 18:47:05.077671 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Apr 12 18:47:05.077945 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Apr 12 18:47:05.078113 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Apr 12 18:47:05.078138 kernel: acpiphp: Slot [3] registered Apr 12 18:47:05.078153 kernel: acpiphp: Slot [4] registered Apr 12 18:47:05.078168 kernel: acpiphp: Slot [5] registered Apr 12 18:47:05.078183 kernel: acpiphp: Slot [6] registered Apr 12 18:47:05.078204 kernel: acpiphp: Slot [7] registered Apr 12 18:47:05.078220 kernel: acpiphp: Slot [8] registered Apr 12 18:47:05.078234 kernel: acpiphp: Slot [9] registered Apr 12 18:47:05.078249 kernel: acpiphp: Slot [10] registered Apr 12 18:47:05.078264 kernel: acpiphp: Slot [11] registered Apr 12 18:47:05.078279 kernel: acpiphp: Slot [12] registered Apr 12 18:47:05.078294 kernel: acpiphp: Slot [13] registered Apr 12 18:47:05.078309 kernel: acpiphp: Slot [14] registered Apr 12 18:47:05.078323 kernel: acpiphp: Slot [15] registered Apr 12 18:47:05.078338 kernel: acpiphp: Slot [16] registered Apr 12 18:47:05.078356 kernel: acpiphp: Slot [17] registered Apr 12 18:47:05.078371 kernel: acpiphp: Slot [18] registered Apr 12 18:47:05.078386 kernel: acpiphp: Slot [19] registered Apr 12 18:47:05.078401 kernel: acpiphp: Slot [20] registered Apr 12 18:47:05.078415 kernel: acpiphp: Slot [21] registered Apr 12 18:47:05.078449 kernel: acpiphp: Slot [22] registered Apr 12 18:47:05.078463 kernel: acpiphp: Slot [23] registered Apr 12 18:47:05.078478 kernel: acpiphp: Slot [24] registered Apr 12 18:47:05.078493 kernel: acpiphp: Slot [25] registered Apr 12 18:47:05.078513 kernel: acpiphp: Slot [26] registered Apr 12 18:47:05.078527 kernel: acpiphp: Slot [27] registered Apr 12 18:47:05.078542 kernel: acpiphp: Slot [28] registered Apr 12 18:47:05.078557 kernel: acpiphp: Slot [29] registered Apr 12 18:47:05.078572 kernel: acpiphp: Slot [30] registered Apr 12 18:47:05.078587 kernel: acpiphp: Slot [31] registered Apr 12 18:47:05.078602 kernel: PCI host bridge to bus 0000:00 Apr 12 18:47:05.080792 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 18:47:05.080877 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 18:47:05.080961 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 18:47:05.081037 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Apr 12 18:47:05.081110 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Apr 12 18:47:05.081183 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 18:47:05.081282 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Apr 12 18:47:05.081387 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Apr 12 18:47:05.081493 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Apr 12 18:47:05.081581 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Apr 12 18:47:05.081665 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Apr 12 18:47:05.081770 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Apr 12 18:47:05.081854 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Apr 12 18:47:05.081936 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Apr 12 18:47:05.082029 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Apr 12 18:47:05.082120 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Apr 12 18:47:05.082203 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Apr 12 18:47:05.082302 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Apr 12 18:47:05.082396 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Apr 12 18:47:05.082511 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Apr 12 18:47:05.082603 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Apr 12 18:47:05.082699 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Apr 12 18:47:05.086865 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Apr 12 18:47:05.086979 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Apr 12 18:47:05.087073 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Apr 12 18:47:05.087165 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Apr 12 18:47:05.087255 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Apr 12 18:47:05.087346 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Apr 12 18:47:05.087461 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Apr 12 18:47:05.087559 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Apr 12 18:47:05.087649 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Apr 12 18:47:05.087759 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Apr 12 18:47:05.087860 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Apr 12 18:47:05.087954 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Apr 12 18:47:05.088036 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Apr 12 18:47:05.088135 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Apr 12 18:47:05.088222 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] Apr 12 18:47:05.088306 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Apr 12 18:47:05.088318 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Apr 12 18:47:05.088327 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Apr 12 18:47:05.088335 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Apr 12 18:47:05.088343 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Apr 12 18:47:05.088351 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Apr 12 18:47:05.088363 kernel: iommu: Default domain type: Translated Apr 12 18:47:05.088371 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 18:47:05.088453 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Apr 12 18:47:05.088536 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Apr 12 18:47:05.088619 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Apr 12 18:47:05.088631 kernel: vgaarb: loaded Apr 12 18:47:05.088640 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:47:05.088648 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:47:05.088656 kernel: PTP clock support registered Apr 12 18:47:05.088667 kernel: PCI: Using ACPI for IRQ routing Apr 12 18:47:05.088675 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 18:47:05.088683 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Apr 12 18:47:05.088691 kernel: e820: reserve RAM buffer [mem 0x7ffdd000-0x7fffffff] Apr 12 18:47:05.088699 kernel: clocksource: Switched to clocksource kvm-clock Apr 12 18:47:05.088721 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:47:05.088729 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:47:05.088737 kernel: pnp: PnP ACPI init Apr 12 18:47:05.088829 kernel: pnp 00:03: [dma 2] Apr 12 18:47:05.088846 kernel: pnp: PnP ACPI: found 5 devices Apr 12 18:47:05.088855 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 18:47:05.088863 kernel: NET: Registered PF_INET protocol family Apr 12 18:47:05.088871 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 18:47:05.088880 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Apr 12 18:47:05.088888 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:47:05.088896 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Apr 12 18:47:05.088904 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Apr 12 18:47:05.088914 kernel: TCP: Hash tables configured (established 16384 bind 16384) Apr 12 18:47:05.088922 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Apr 12 18:47:05.088930 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Apr 12 18:47:05.088938 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:47:05.088946 kernel: NET: Registered PF_XDP protocol family Apr 12 18:47:05.089022 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 18:47:05.089103 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 18:47:05.089177 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 18:47:05.089250 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Apr 12 18:47:05.089328 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Apr 12 18:47:05.089414 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Apr 12 18:47:05.089501 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Apr 12 18:47:05.089589 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Apr 12 18:47:05.089604 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:47:05.089612 kernel: Initialise system trusted keyrings Apr 12 18:47:05.089621 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Apr 12 18:47:05.089633 kernel: Key type asymmetric registered Apr 12 18:47:05.089641 kernel: Asymmetric key parser 'x509' registered Apr 12 18:47:05.089648 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:47:05.089656 kernel: io scheduler mq-deadline registered Apr 12 18:47:05.089664 kernel: io scheduler kyber registered Apr 12 18:47:05.089672 kernel: io scheduler bfq registered Apr 12 18:47:05.089680 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 18:47:05.089689 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Apr 12 18:47:05.089697 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Apr 12 18:47:05.089719 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Apr 12 18:47:05.089731 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Apr 12 18:47:05.089739 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:47:05.089747 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 18:47:05.089755 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Apr 12 18:47:05.089763 kernel: random: crng init done Apr 12 18:47:05.089771 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Apr 12 18:47:05.089779 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Apr 12 18:47:05.089787 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Apr 12 18:47:05.089885 kernel: rtc_cmos 00:04: RTC can wake from S4 Apr 12 18:47:05.089970 kernel: rtc_cmos 00:04: registered as rtc0 Apr 12 18:47:05.090047 kernel: rtc_cmos 00:04: setting system clock to 2024-04-12T18:47:04 UTC (1712947624) Apr 12 18:47:05.090123 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Apr 12 18:47:05.090136 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:47:05.090144 kernel: Segment Routing with IPv6 Apr 12 18:47:05.090152 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:47:05.090160 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:47:05.090168 kernel: Key type dns_resolver registered Apr 12 18:47:05.090180 kernel: IPI shorthand broadcast: enabled Apr 12 18:47:05.090188 kernel: sched_clock: Marking stable (717109448, 119937099)->(865611263, -28564716) Apr 12 18:47:05.090196 kernel: registered taskstats version 1 Apr 12 18:47:05.090204 kernel: Loading compiled-in X.509 certificates Apr 12 18:47:05.090212 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 18:47:05.090220 kernel: Key type .fscrypt registered Apr 12 18:47:05.090228 kernel: Key type fscrypt-provisioning registered Apr 12 18:47:05.090236 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 18:47:05.090246 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:47:05.090254 kernel: ima: No architecture policies found Apr 12 18:47:05.090262 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 18:47:05.090270 kernel: Write protecting the kernel read-only data: 28672k Apr 12 18:47:05.090278 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 18:47:05.090287 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 18:47:05.090295 kernel: Run /init as init process Apr 12 18:47:05.090303 kernel: with arguments: Apr 12 18:47:05.090311 kernel: /init Apr 12 18:47:05.090320 kernel: with environment: Apr 12 18:47:05.090328 kernel: HOME=/ Apr 12 18:47:05.090337 kernel: TERM=linux Apr 12 18:47:05.090345 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:47:05.090356 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:47:05.090366 systemd[1]: Detected virtualization kvm. Apr 12 18:47:05.090375 systemd[1]: Detected architecture x86-64. Apr 12 18:47:05.090384 systemd[1]: Running in initrd. Apr 12 18:47:05.090395 systemd[1]: No hostname configured, using default hostname. Apr 12 18:47:05.090403 systemd[1]: Hostname set to . Apr 12 18:47:05.090412 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:47:05.090435 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:47:05.090444 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:47:05.090453 systemd[1]: Reached target cryptsetup.target. Apr 12 18:47:05.090461 systemd[1]: Reached target paths.target. Apr 12 18:47:05.090470 systemd[1]: Reached target slices.target. Apr 12 18:47:05.090481 systemd[1]: Reached target swap.target. Apr 12 18:47:05.090489 systemd[1]: Reached target timers.target. Apr 12 18:47:05.090500 systemd[1]: Listening on iscsid.socket. Apr 12 18:47:05.090510 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:47:05.090519 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:47:05.090528 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:47:05.090538 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:47:05.090550 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:47:05.090559 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:47:05.090569 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:47:05.090578 systemd[1]: Reached target sockets.target. Apr 12 18:47:05.090587 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:47:05.090608 systemd[1]: Finished network-cleanup.service. Apr 12 18:47:05.090619 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:47:05.090630 systemd[1]: Starting systemd-journald.service... Apr 12 18:47:05.090640 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:47:05.090649 systemd[1]: Starting systemd-resolved.service... Apr 12 18:47:05.090659 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:47:05.090668 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:47:05.090678 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:47:05.090692 systemd-journald[184]: Journal started Apr 12 18:47:05.092785 systemd-journald[184]: Runtime Journal (/run/log/journal/bf30357ee71b4b618e3dcadaf9ad7320) is 4.9M, max 39.5M, 34.5M free. Apr 12 18:47:05.052203 systemd-modules-load[185]: Inserted module 'overlay' Apr 12 18:47:05.124032 systemd[1]: Started systemd-journald.service. Apr 12 18:47:05.124064 kernel: audit: type=1130 audit(1712947625.111:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.124087 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:47:05.124099 kernel: audit: type=1130 audit(1712947625.113:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.104780 systemd-resolved[186]: Positive Trust Anchors: Apr 12 18:47:05.104798 systemd-resolved[186]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:47:05.104835 systemd-resolved[186]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:47:05.107575 systemd-resolved[186]: Defaulting to hostname 'linux'. Apr 12 18:47:05.131930 kernel: Bridge firewalling registered Apr 12 18:47:05.114355 systemd[1]: Started systemd-resolved.service. Apr 12 18:47:05.128029 systemd[1]: Reached target nss-lookup.target. Apr 12 18:47:05.138249 kernel: audit: type=1130 audit(1712947625.127:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.130267 systemd-modules-load[185]: Inserted module 'br_netfilter' Apr 12 18:47:05.131818 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:47:05.149888 kernel: audit: type=1130 audit(1712947625.138:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.134402 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:47:05.140481 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:47:05.151145 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:47:05.156617 kernel: audit: type=1130 audit(1712947625.151:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.166638 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:47:05.167615 kernel: SCSI subsystem initialized Apr 12 18:47:05.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.171740 kernel: audit: type=1130 audit(1712947625.166:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.172943 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:47:05.182824 dracut-cmdline[203]: dracut-dracut-053 Apr 12 18:47:05.186055 dracut-cmdline[203]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:47:05.193124 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:47:05.193154 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:47:05.193183 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:47:05.193439 systemd-modules-load[185]: Inserted module 'dm_multipath' Apr 12 18:47:05.194490 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:47:05.200951 kernel: audit: type=1130 audit(1712947625.195:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.200061 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:47:05.208511 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:47:05.213946 kernel: audit: type=1130 audit(1712947625.208:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.276756 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:47:05.297826 kernel: iscsi: registered transport (tcp) Apr 12 18:47:05.326998 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:47:05.327083 kernel: QLogic iSCSI HBA Driver Apr 12 18:47:05.383653 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:47:05.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.393446 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:47:05.393991 kernel: audit: type=1130 audit(1712947625.384:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.470832 kernel: raid6: sse2x4 gen() 12944 MB/s Apr 12 18:47:05.487797 kernel: raid6: sse2x4 xor() 4853 MB/s Apr 12 18:47:05.504808 kernel: raid6: sse2x2 gen() 14103 MB/s Apr 12 18:47:05.521819 kernel: raid6: sse2x2 xor() 8439 MB/s Apr 12 18:47:05.538787 kernel: raid6: sse2x1 gen() 10472 MB/s Apr 12 18:47:05.556620 kernel: raid6: sse2x1 xor() 6757 MB/s Apr 12 18:47:05.556701 kernel: raid6: using algorithm sse2x2 gen() 14103 MB/s Apr 12 18:47:05.556767 kernel: raid6: .... xor() 8439 MB/s, rmw enabled Apr 12 18:47:05.557491 kernel: raid6: using ssse3x2 recovery algorithm Apr 12 18:47:05.572808 kernel: xor: measuring software checksum speed Apr 12 18:47:05.575339 kernel: prefetch64-sse : 17232 MB/sec Apr 12 18:47:05.575389 kernel: generic_sse : 15697 MB/sec Apr 12 18:47:05.575416 kernel: xor: using function: prefetch64-sse (17232 MB/sec) Apr 12 18:47:05.692804 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 18:47:05.709804 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:47:05.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.713000 audit: BPF prog-id=7 op=LOAD Apr 12 18:47:05.713000 audit: BPF prog-id=8 op=LOAD Apr 12 18:47:05.715032 systemd[1]: Starting systemd-udevd.service... Apr 12 18:47:05.729298 systemd-udevd[385]: Using default interface naming scheme 'v252'. Apr 12 18:47:05.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.733897 systemd[1]: Started systemd-udevd.service. Apr 12 18:47:05.738863 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:47:05.764235 dracut-pre-trigger[399]: rd.md=0: removing MD RAID activation Apr 12 18:47:05.811327 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:47:05.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.814460 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:47:05.858609 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:47:05.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:05.913760 kernel: virtio_blk virtio2: [vda] 41943040 512-byte logical blocks (21.5 GB/20.0 GiB) Apr 12 18:47:05.936770 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 18:47:05.936831 kernel: GPT:17805311 != 41943039 Apr 12 18:47:05.936844 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 18:47:05.936857 kernel: GPT:17805311 != 41943039 Apr 12 18:47:05.938430 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 18:47:05.938451 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:47:05.964893 kernel: libata version 3.00 loaded. Apr 12 18:47:05.973735 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (444) Apr 12 18:47:05.977842 kernel: ata_piix 0000:00:01.1: version 2.13 Apr 12 18:47:05.979735 kernel: scsi host0: ata_piix Apr 12 18:47:05.979951 kernel: scsi host1: ata_piix Apr 12 18:47:05.980175 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Apr 12 18:47:05.980192 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Apr 12 18:47:05.993192 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:47:06.031608 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:47:06.035874 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:47:06.039912 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:47:06.043974 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:47:06.045372 systemd[1]: Starting disk-uuid.service... Apr 12 18:47:06.060382 disk-uuid[461]: Primary Header is updated. Apr 12 18:47:06.060382 disk-uuid[461]: Secondary Entries is updated. Apr 12 18:47:06.060382 disk-uuid[461]: Secondary Header is updated. Apr 12 18:47:06.067774 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:47:06.076751 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:47:07.159523 disk-uuid[462]: The operation has completed successfully. Apr 12 18:47:07.161290 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:47:07.256060 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:47:07.257156 systemd[1]: Finished disk-uuid.service. Apr 12 18:47:07.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:07.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:07.270540 systemd[1]: Starting verity-setup.service... Apr 12 18:47:07.314860 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" Apr 12 18:47:07.452232 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:47:07.455462 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:47:07.459332 systemd[1]: Finished verity-setup.service. Apr 12 18:47:07.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:07.622817 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:47:07.624275 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:47:07.624983 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:47:07.625964 systemd[1]: Starting ignition-setup.service... Apr 12 18:47:07.627278 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:47:07.666584 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:47:07.666676 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:47:07.666731 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:47:07.697033 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:47:07.745766 systemd[1]: Finished ignition-setup.service. Apr 12 18:47:07.747508 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:47:07.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:07.766985 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:47:07.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:07.767000 audit: BPF prog-id=9 op=LOAD Apr 12 18:47:07.769274 systemd[1]: Starting systemd-networkd.service... Apr 12 18:47:07.803550 systemd-networkd[632]: lo: Link UP Apr 12 18:47:07.803563 systemd-networkd[632]: lo: Gained carrier Apr 12 18:47:07.804374 systemd-networkd[632]: Enumeration completed Apr 12 18:47:07.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:07.804850 systemd-networkd[632]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:47:07.806216 systemd[1]: Started systemd-networkd.service. Apr 12 18:47:07.806781 systemd-networkd[632]: eth0: Link UP Apr 12 18:47:07.806785 systemd-networkd[632]: eth0: Gained carrier Apr 12 18:47:07.807945 systemd[1]: Reached target network.target. Apr 12 18:47:07.811550 systemd[1]: Starting iscsiuio.service... Apr 12 18:47:07.834448 systemd[1]: Started iscsiuio.service. Apr 12 18:47:07.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:07.836889 systemd[1]: Starting iscsid.service... Apr 12 18:47:07.841833 systemd-networkd[632]: eth0: DHCPv4 address 172.24.4.121/24, gateway 172.24.4.1 acquired from 172.24.4.1 Apr 12 18:47:07.844853 iscsid[637]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:47:07.845783 iscsid[637]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:47:07.845783 iscsid[637]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:47:07.845783 iscsid[637]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:47:07.845783 iscsid[637]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:47:07.845783 iscsid[637]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:47:07.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:07.849687 systemd[1]: Started iscsid.service. Apr 12 18:47:07.854019 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:47:07.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:07.880479 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:47:07.881114 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:47:07.881569 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:47:07.882050 systemd[1]: Reached target remote-fs.target. Apr 12 18:47:07.883558 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:47:07.893926 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:47:07.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:08.216933 ignition[628]: Ignition 2.14.0 Apr 12 18:47:08.216963 ignition[628]: Stage: fetch-offline Apr 12 18:47:08.217078 ignition[628]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:47:08.217125 ignition[628]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Apr 12 18:47:08.219586 ignition[628]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Apr 12 18:47:08.219865 ignition[628]: parsed url from cmdline: "" Apr 12 18:47:08.222748 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:47:08.219874 ignition[628]: no config URL provided Apr 12 18:47:08.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:08.227001 systemd[1]: Starting ignition-fetch.service... Apr 12 18:47:08.219888 ignition[628]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:47:08.219908 ignition[628]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:47:08.219918 ignition[628]: failed to fetch config: resource requires networking Apr 12 18:47:08.220620 ignition[628]: Ignition finished successfully Apr 12 18:47:08.248637 ignition[656]: Ignition 2.14.0 Apr 12 18:47:08.248665 ignition[656]: Stage: fetch Apr 12 18:47:08.248966 ignition[656]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:47:08.249012 ignition[656]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Apr 12 18:47:08.252253 ignition[656]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Apr 12 18:47:08.252468 ignition[656]: parsed url from cmdline: "" Apr 12 18:47:08.252478 ignition[656]: no config URL provided Apr 12 18:47:08.252491 ignition[656]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:47:08.252511 ignition[656]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:47:08.257276 ignition[656]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Apr 12 18:47:08.257364 ignition[656]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Apr 12 18:47:08.257512 ignition[656]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Apr 12 18:47:08.479472 ignition[656]: GET result: OK Apr 12 18:47:08.479598 ignition[656]: parsing config with SHA512: 403ad7918a0f3f98557a7feeb2405cf41a2fd69290b57390a8130052056623e1825c6b58687aff5b49974a365e77ee7cb23bd2f64bc968b95cbbb10fe8fabe6e Apr 12 18:47:08.515054 unknown[656]: fetched base config from "system" Apr 12 18:47:08.515070 unknown[656]: fetched base config from "system" Apr 12 18:47:08.515580 ignition[656]: fetch: fetch complete Apr 12 18:47:08.515078 unknown[656]: fetched user config from "openstack" Apr 12 18:47:08.515587 ignition[656]: fetch: fetch passed Apr 12 18:47:08.518603 systemd[1]: Finished ignition-fetch.service. Apr 12 18:47:08.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:08.515639 ignition[656]: Ignition finished successfully Apr 12 18:47:08.521849 systemd[1]: Starting ignition-kargs.service... Apr 12 18:47:08.546353 ignition[662]: Ignition 2.14.0 Apr 12 18:47:08.546381 ignition[662]: Stage: kargs Apr 12 18:47:08.546660 ignition[662]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:47:08.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:08.559552 systemd[1]: Finished ignition-kargs.service. Apr 12 18:47:08.546757 ignition[662]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Apr 12 18:47:08.549014 ignition[662]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Apr 12 18:47:08.551687 ignition[662]: kargs: kargs passed Apr 12 18:47:08.563070 systemd[1]: Starting ignition-disks.service... Apr 12 18:47:08.551821 ignition[662]: Ignition finished successfully Apr 12 18:47:08.580662 ignition[667]: Ignition 2.14.0 Apr 12 18:47:08.580691 ignition[667]: Stage: disks Apr 12 18:47:08.580993 ignition[667]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:47:08.581046 ignition[667]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Apr 12 18:47:08.582817 ignition[667]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Apr 12 18:47:08.584688 ignition[667]: disks: disks passed Apr 12 18:47:08.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:08.586337 systemd[1]: Finished ignition-disks.service. Apr 12 18:47:08.584762 ignition[667]: Ignition finished successfully Apr 12 18:47:08.588193 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:47:08.589512 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:47:08.591063 systemd[1]: Reached target local-fs.target. Apr 12 18:47:08.592576 systemd[1]: Reached target sysinit.target. Apr 12 18:47:08.594077 systemd[1]: Reached target basic.target. Apr 12 18:47:08.597486 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:47:08.638930 systemd-fsck[675]: ROOT: clean, 612/1628000 files, 124056/1617920 blocks Apr 12 18:47:08.653228 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:47:08.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:08.656365 systemd[1]: Mounting sysroot.mount... Apr 12 18:47:08.693780 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:47:08.694597 systemd[1]: Mounted sysroot.mount. Apr 12 18:47:08.695951 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:47:08.700558 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:47:08.702501 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 18:47:08.704013 systemd[1]: Starting flatcar-openstack-hostname.service... Apr 12 18:47:08.709475 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:47:08.709540 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:47:08.714654 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:47:08.734165 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:47:08.739011 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:47:08.764988 initrd-setup-root[687]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:47:08.766961 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (682) Apr 12 18:47:08.776478 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:47:08.776572 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:47:08.776600 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:47:08.791173 initrd-setup-root[711]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:47:08.809067 initrd-setup-root[719]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:47:08.820244 initrd-setup-root[729]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:47:08.828056 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:47:09.094914 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:47:09.109648 kernel: kauditd_printk_skb: 22 callbacks suppressed Apr 12 18:47:09.109700 kernel: audit: type=1130 audit(1712947629.095:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:09.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:09.098163 systemd[1]: Starting ignition-mount.service... Apr 12 18:47:09.116405 systemd[1]: Starting sysroot-boot.service... Apr 12 18:47:09.119256 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 18:47:09.119495 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 18:47:09.153556 ignition[749]: INFO : Ignition 2.14.0 Apr 12 18:47:09.153556 ignition[749]: INFO : Stage: mount Apr 12 18:47:09.154897 ignition[749]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:47:09.154897 ignition[749]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Apr 12 18:47:09.165263 ignition[749]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Apr 12 18:47:09.168760 ignition[749]: INFO : mount: mount passed Apr 12 18:47:09.168760 ignition[749]: INFO : Ignition finished successfully Apr 12 18:47:09.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:09.170790 systemd[1]: Finished ignition-mount.service. Apr 12 18:47:09.175241 kernel: audit: type=1130 audit(1712947629.170:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:09.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:09.180494 systemd[1]: Finished sysroot-boot.service. Apr 12 18:47:09.185171 kernel: audit: type=1130 audit(1712947629.180:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:09.210198 coreos-metadata[681]: Apr 12 18:47:09.210 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Apr 12 18:47:09.229743 coreos-metadata[681]: Apr 12 18:47:09.229 INFO Fetch successful Apr 12 18:47:09.229743 coreos-metadata[681]: Apr 12 18:47:09.229 INFO wrote hostname ci-3510-3-3-9-2820bc9f86.novalocal to /sysroot/etc/hostname Apr 12 18:47:09.233592 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Apr 12 18:47:09.233866 systemd[1]: Finished flatcar-openstack-hostname.service. Apr 12 18:47:09.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:09.237114 systemd[1]: Starting ignition-files.service... Apr 12 18:47:09.244499 kernel: audit: type=1130 audit(1712947629.234:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:09.244528 kernel: audit: type=1131 audit(1712947629.234:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:09.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:09.250126 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:47:09.266807 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (759) Apr 12 18:47:09.273943 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:47:09.274001 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:47:09.274023 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:47:09.287591 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:47:09.309605 ignition[778]: INFO : Ignition 2.14.0 Apr 12 18:47:09.311289 ignition[778]: INFO : Stage: files Apr 12 18:47:09.312690 ignition[778]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:47:09.314315 ignition[778]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Apr 12 18:47:09.319014 ignition[778]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Apr 12 18:47:09.328568 ignition[778]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:47:09.331462 ignition[778]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:47:09.333500 ignition[778]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:47:09.344063 ignition[778]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:47:09.346380 ignition[778]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:47:09.349868 unknown[778]: wrote ssh authorized keys file for user: core Apr 12 18:47:09.352525 ignition[778]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:47:09.354477 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:47:09.357349 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Apr 12 18:47:09.759275 systemd-networkd[632]: eth0: Gained IPv6LL Apr 12 18:47:09.815385 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 18:47:10.670140 ignition[778]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Apr 12 18:47:10.671932 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:47:10.672926 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:47:10.673923 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Apr 12 18:47:11.025406 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 18:47:11.499305 ignition[778]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Apr 12 18:47:11.503973 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:47:11.503973 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:47:11.503973 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Apr 12 18:47:11.642700 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 18:47:12.630350 ignition[778]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Apr 12 18:47:12.634313 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:47:12.634313 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:47:12.634313 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Apr 12 18:47:12.741129 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 18:47:14.898401 ignition[778]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Apr 12 18:47:14.900338 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:47:14.901242 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:47:14.902321 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:47:14.903339 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:47:14.904495 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:47:14.972945 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:47:14.975171 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:47:14.975171 ignition[778]: INFO : files: op(a): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:47:15.015679 ignition[778]: INFO : files: op(a): op(b): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Apr 12 18:47:15.015679 ignition[778]: INFO : files: op(a): op(b): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Apr 12 18:47:15.015679 ignition[778]: INFO : files: op(a): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:47:15.015679 ignition[778]: INFO : files: op(c): [started] processing unit "coreos-metadata.service" Apr 12 18:47:15.015679 ignition[778]: INFO : files: op(c): op(d): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Apr 12 18:47:15.015679 ignition[778]: INFO : files: op(c): op(d): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Apr 12 18:47:15.015679 ignition[778]: INFO : files: op(c): [finished] processing unit "coreos-metadata.service" Apr 12 18:47:15.015679 ignition[778]: INFO : files: op(e): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:47:15.015679 ignition[778]: INFO : files: op(e): op(f): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:47:15.039655 ignition[778]: INFO : files: op(e): op(f): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:47:15.039655 ignition[778]: INFO : files: op(e): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:47:15.039655 ignition[778]: INFO : files: op(10): [started] processing unit "prepare-critools.service" Apr 12 18:47:15.039655 ignition[778]: INFO : files: op(10): op(11): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:47:15.039655 ignition[778]: INFO : files: op(10): op(11): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:47:15.039655 ignition[778]: INFO : files: op(10): [finished] processing unit "prepare-critools.service" Apr 12 18:47:15.039655 ignition[778]: INFO : files: op(12): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:47:15.039655 ignition[778]: INFO : files: op(12): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:47:15.039655 ignition[778]: INFO : files: op(13): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:47:15.039655 ignition[778]: INFO : files: op(13): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:47:15.039655 ignition[778]: INFO : files: op(14): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:47:15.039655 ignition[778]: INFO : files: op(14): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:47:15.039655 ignition[778]: INFO : files: createResultFile: createFiles: op(15): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:47:15.039655 ignition[778]: INFO : files: createResultFile: createFiles: op(15): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:47:15.039655 ignition[778]: INFO : files: files passed Apr 12 18:47:15.039655 ignition[778]: INFO : Ignition finished successfully Apr 12 18:47:15.087832 kernel: audit: type=1130 audit(1712947635.042:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.037950 systemd[1]: Finished ignition-files.service. Apr 12 18:47:15.048072 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:47:15.057303 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:47:15.059001 systemd[1]: Starting ignition-quench.service... Apr 12 18:47:15.100247 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:47:15.120548 kernel: audit: type=1130 audit(1712947635.101:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.120608 kernel: audit: type=1131 audit(1712947635.101:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.120874 initrd-setup-root-after-ignition[803]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:47:15.131826 kernel: audit: type=1130 audit(1712947635.121:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.100545 systemd[1]: Finished ignition-quench.service. Apr 12 18:47:15.107177 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:47:15.122168 systemd[1]: Reached target ignition-complete.target. Apr 12 18:47:15.134663 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:47:15.159251 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:47:15.159433 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:47:15.179057 kernel: audit: type=1130 audit(1712947635.161:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.179114 kernel: audit: type=1131 audit(1712947635.161:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.161972 systemd[1]: Reached target initrd-fs.target. Apr 12 18:47:15.179845 systemd[1]: Reached target initrd.target. Apr 12 18:47:15.181854 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:47:15.183294 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:47:15.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.213783 kernel: audit: type=1130 audit(1712947635.206:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.206005 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:47:15.214990 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:47:15.240331 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:47:15.243131 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:47:15.245636 systemd[1]: Stopped target timers.target. Apr 12 18:47:15.246747 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:47:15.257491 kernel: audit: type=1131 audit(1712947635.248:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.246975 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:47:15.249034 systemd[1]: Stopped target initrd.target. Apr 12 18:47:15.258555 systemd[1]: Stopped target basic.target. Apr 12 18:47:15.266584 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:47:15.267952 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:47:15.269210 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:47:15.270550 systemd[1]: Stopped target remote-fs.target. Apr 12 18:47:15.271858 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:47:15.273195 systemd[1]: Stopped target sysinit.target. Apr 12 18:47:15.274419 systemd[1]: Stopped target local-fs.target. Apr 12 18:47:15.275672 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:47:15.276988 systemd[1]: Stopped target swap.target. Apr 12 18:47:15.283157 kernel: audit: type=1131 audit(1712947635.278:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.278153 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:47:15.278381 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:47:15.289283 kernel: audit: type=1131 audit(1712947635.284:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.279741 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:47:15.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.284020 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:47:15.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.284216 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:47:15.285649 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:47:15.285904 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:47:15.290364 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:47:15.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.290596 systemd[1]: Stopped ignition-files.service. Apr 12 18:47:15.293145 systemd[1]: Stopping ignition-mount.service... Apr 12 18:47:15.294189 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:47:15.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.294452 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:47:15.297158 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:47:15.303463 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:47:15.303794 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:47:15.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.309916 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:47:15.310201 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:47:15.318976 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:47:15.319095 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:47:15.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.320761 ignition[816]: INFO : Ignition 2.14.0 Apr 12 18:47:15.320761 ignition[816]: INFO : Stage: umount Apr 12 18:47:15.322039 ignition[816]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:47:15.322039 ignition[816]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Apr 12 18:47:15.325080 ignition[816]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Apr 12 18:47:15.325080 ignition[816]: INFO : umount: umount passed Apr 12 18:47:15.325080 ignition[816]: INFO : Ignition finished successfully Apr 12 18:47:15.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.324926 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:47:15.325054 systemd[1]: Stopped ignition-mount.service. Apr 12 18:47:15.326219 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:47:15.326274 systemd[1]: Stopped ignition-disks.service. Apr 12 18:47:15.326780 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:47:15.326820 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:47:15.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.327310 systemd[1]: ignition-fetch.service: Deactivated successfully. Apr 12 18:47:15.327357 systemd[1]: Stopped ignition-fetch.service. Apr 12 18:47:15.327859 systemd[1]: Stopped target network.target. Apr 12 18:47:15.328252 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:47:15.328292 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:47:15.333839 systemd[1]: Stopped target paths.target. Apr 12 18:47:15.336582 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:47:15.337756 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:47:15.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.338218 systemd[1]: Stopped target slices.target. Apr 12 18:47:15.338669 systemd[1]: Stopped target sockets.target. Apr 12 18:47:15.339154 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:47:15.339183 systemd[1]: Closed iscsid.socket. Apr 12 18:47:15.339653 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:47:15.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.339680 systemd[1]: Closed iscsiuio.socket. Apr 12 18:47:15.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.340214 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:47:15.340259 systemd[1]: Stopped ignition-setup.service. Apr 12 18:47:15.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.341455 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:47:15.351000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:47:15.342542 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:47:15.344571 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:47:15.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.344858 systemd-networkd[632]: eth0: DHCPv6 lease lost Apr 12 18:47:15.354000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:47:15.345115 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:47:15.345203 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:47:15.347796 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:47:15.347921 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:47:15.350077 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:47:15.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.350203 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:47:15.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.352400 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:47:15.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.352462 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:47:15.353139 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:47:15.353190 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:47:15.355053 systemd[1]: Stopping network-cleanup.service... Apr 12 18:47:15.357471 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:47:15.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.357523 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:47:15.358439 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:47:15.358478 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:47:15.359617 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:47:15.359659 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:47:15.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.360509 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:47:15.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.362741 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 18:47:15.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.363936 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:47:15.364100 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:47:15.365936 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:47:15.365993 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:47:15.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.368377 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:47:15.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.368432 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:47:15.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:15.369162 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:47:15.369220 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:47:15.370275 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:47:15.370318 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:47:15.371227 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:47:15.371269 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:47:15.372956 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:47:15.380138 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:47:15.380187 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:47:15.381665 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:47:15.381807 systemd[1]: Stopped network-cleanup.service. Apr 12 18:47:15.382562 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:47:15.382641 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:47:15.383538 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:47:15.385124 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:47:15.404355 systemd[1]: Switching root. Apr 12 18:47:15.428239 iscsid[637]: iscsid shutting down. Apr 12 18:47:15.428870 systemd-journald[184]: Received SIGTERM from PID 1 (n/a). Apr 12 18:47:15.428928 systemd-journald[184]: Journal stopped Apr 12 18:47:20.568467 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:47:20.568521 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:47:20.568538 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:47:20.568559 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:47:20.568571 kernel: SELinux: policy capability open_perms=1 Apr 12 18:47:20.568582 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:47:20.568595 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:47:20.568607 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:47:20.568622 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:47:20.568634 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:47:20.568651 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:47:20.568666 systemd[1]: Successfully loaded SELinux policy in 101.356ms. Apr 12 18:47:20.568688 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 21.623ms. Apr 12 18:47:20.568733 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:47:20.568753 systemd[1]: Detected virtualization kvm. Apr 12 18:47:20.568766 systemd[1]: Detected architecture x86-64. Apr 12 18:47:20.568778 systemd[1]: Detected first boot. Apr 12 18:47:20.568791 systemd[1]: Hostname set to . Apr 12 18:47:20.568806 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:47:20.568821 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:47:20.568833 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:47:20.568847 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:47:20.568861 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:47:20.568875 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:47:20.568888 kernel: kauditd_printk_skb: 46 callbacks suppressed Apr 12 18:47:20.568909 kernel: audit: type=1334 audit(1712947640.341:87): prog-id=12 op=LOAD Apr 12 18:47:20.568923 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:47:20.568935 kernel: audit: type=1334 audit(1712947640.341:88): prog-id=3 op=UNLOAD Apr 12 18:47:20.568947 systemd[1]: Stopped iscsiuio.service. Apr 12 18:47:20.568959 kernel: audit: type=1334 audit(1712947640.341:89): prog-id=13 op=LOAD Apr 12 18:47:20.568970 kernel: audit: type=1334 audit(1712947640.341:90): prog-id=14 op=LOAD Apr 12 18:47:20.568982 kernel: audit: type=1334 audit(1712947640.341:91): prog-id=4 op=UNLOAD Apr 12 18:47:20.568993 kernel: audit: type=1334 audit(1712947640.341:92): prog-id=5 op=UNLOAD Apr 12 18:47:20.569011 kernel: audit: type=1131 audit(1712947640.343:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.569025 kernel: audit: type=1131 audit(1712947640.372:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.569038 kernel: audit: type=1334 audit(1712947640.380:95): prog-id=12 op=UNLOAD Apr 12 18:47:20.569050 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:47:20.569063 systemd[1]: Stopped iscsid.service. Apr 12 18:47:20.569075 kernel: audit: type=1131 audit(1712947640.387:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.569087 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:47:20.569101 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:47:20.569116 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:47:20.569129 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:47:20.569142 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:47:20.569155 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 18:47:20.569168 systemd[1]: Created slice system-getty.slice. Apr 12 18:47:20.569181 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:47:20.569193 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:47:20.569208 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:47:20.569220 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:47:20.569233 systemd[1]: Created slice user.slice. Apr 12 18:47:20.569246 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:47:20.569259 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:47:20.569271 systemd[1]: Set up automount boot.automount. Apr 12 18:47:20.569283 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:47:20.569296 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:47:20.569309 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:47:20.569323 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:47:20.569335 systemd[1]: Reached target integritysetup.target. Apr 12 18:47:20.569348 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:47:20.569361 systemd[1]: Reached target remote-fs.target. Apr 12 18:47:20.569373 systemd[1]: Reached target slices.target. Apr 12 18:47:20.569385 systemd[1]: Reached target swap.target. Apr 12 18:47:20.569398 systemd[1]: Reached target torcx.target. Apr 12 18:47:20.569410 systemd[1]: Reached target veritysetup.target. Apr 12 18:47:20.569423 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:47:20.569435 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:47:20.569451 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:47:20.569463 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:47:20.569475 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:47:20.569487 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:47:20.569500 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:47:20.569512 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:47:20.569524 systemd[1]: Mounting media.mount... Apr 12 18:47:20.569537 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:47:20.569549 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:47:20.569564 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:47:20.569576 systemd[1]: Mounting tmp.mount... Apr 12 18:47:20.569588 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:47:20.569601 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:47:20.569614 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:47:20.569626 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:47:20.569638 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:47:20.569650 systemd[1]: Starting modprobe@drm.service... Apr 12 18:47:20.569663 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:47:20.569678 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:47:20.569691 systemd[1]: Starting modprobe@loop.service... Apr 12 18:47:20.569718 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:47:20.569734 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:47:20.569746 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:47:20.569759 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:47:20.569772 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:47:20.569784 systemd[1]: Stopped systemd-journald.service. Apr 12 18:47:20.569796 systemd[1]: Starting systemd-journald.service... Apr 12 18:47:20.569811 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:47:20.569824 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:47:20.569836 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:47:20.569849 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:47:20.569862 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:47:20.569875 systemd[1]: Stopped verity-setup.service. Apr 12 18:47:20.569887 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:47:20.569899 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:47:20.569919 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:47:20.569934 systemd[1]: Mounted media.mount. Apr 12 18:47:20.569947 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:47:20.569959 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:47:20.569971 systemd[1]: Mounted tmp.mount. Apr 12 18:47:20.569984 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:47:20.569999 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:47:20.570012 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:47:20.570026 systemd-journald[914]: Journal started Apr 12 18:47:20.570070 systemd-journald[914]: Runtime Journal (/run/log/journal/bf30357ee71b4b618e3dcadaf9ad7320) is 4.9M, max 39.5M, 34.5M free. Apr 12 18:47:15.764000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:47:15.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:47:15.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:47:15.892000 audit: BPF prog-id=10 op=LOAD Apr 12 18:47:15.892000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:47:15.892000 audit: BPF prog-id=11 op=LOAD Apr 12 18:47:20.573352 systemd[1]: Started systemd-journald.service. Apr 12 18:47:15.892000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:47:16.126000 audit[848]: AVC avc: denied { associate } for pid=848 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:47:16.126000 audit[848]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=831 pid=848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:16.126000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:47:16.129000 audit[848]: AVC avc: denied { associate } for pid=848 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:47:16.129000 audit[848]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179a9 a2=1ed a3=0 items=2 ppid=831 pid=848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:16.129000 audit: CWD cwd="/" Apr 12 18:47:16.129000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:16.129000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:16.129000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:47:20.341000 audit: BPF prog-id=12 op=LOAD Apr 12 18:47:20.341000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:47:20.341000 audit: BPF prog-id=13 op=LOAD Apr 12 18:47:20.341000 audit: BPF prog-id=14 op=LOAD Apr 12 18:47:20.341000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:47:20.341000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:47:20.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.380000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:47:20.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.518000 audit: BPF prog-id=15 op=LOAD Apr 12 18:47:20.518000 audit: BPF prog-id=16 op=LOAD Apr 12 18:47:20.518000 audit: BPF prog-id=17 op=LOAD Apr 12 18:47:20.518000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:47:20.518000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:47:20.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.567000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:47:20.567000 audit[914]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffee572eb10 a2=4000 a3=7ffee572ebac items=0 ppid=1 pid=914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:20.567000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:47:20.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.339668 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:47:16.120484 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:47:20.339682 systemd[1]: Unnecessary job was removed for dev-vda6.device. Apr 12 18:47:16.121556 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:16Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:47:20.344045 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:47:16.121610 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:16Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:47:20.572551 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:47:16.121764 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:16Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:47:20.572911 systemd[1]: Finished modprobe@drm.service. Apr 12 18:47:16.121794 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:16Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:47:20.573586 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:47:16.121872 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:16Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:47:20.574769 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:47:16.121909 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:16Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:47:20.575432 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:47:16.122437 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:16Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:47:20.575564 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:47:16.122538 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:16Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:47:20.576324 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:47:16.122574 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:16Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:47:20.577391 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:47:16.125912 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:16Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:47:20.579091 systemd[1]: Reached target network-pre.target. Apr 12 18:47:16.125989 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:16Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:47:20.580826 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:47:16.126029 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:16Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:47:20.586602 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:47:16.126060 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:16Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:47:16.126097 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:16Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:47:16.126127 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:16Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:47:19.892476 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:19Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:47:19.892870 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:19Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:47:19.893028 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:19Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:47:19.893518 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:19Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:47:20.588898 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:47:19.893595 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:19Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:47:19.893675 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-04-12T18:47:19Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:47:20.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.589547 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:47:20.590181 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:47:20.592987 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:47:20.612567 systemd-journald[914]: Time spent on flushing to /var/log/journal/bf30357ee71b4b618e3dcadaf9ad7320 is 32.773ms for 1101 entries. Apr 12 18:47:20.612567 systemd-journald[914]: System Journal (/var/log/journal/bf30357ee71b4b618e3dcadaf9ad7320) is 8.0M, max 584.8M, 576.8M free. Apr 12 18:47:20.668312 systemd-journald[914]: Received client request to flush runtime journal. Apr 12 18:47:20.668362 kernel: loop: module loaded Apr 12 18:47:20.668381 kernel: fuse: init (API version 7.34) Apr 12 18:47:20.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.594773 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:47:20.597279 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:47:20.598346 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:47:20.616722 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:47:20.618683 systemd[1]: Finished modprobe@loop.service. Apr 12 18:47:20.619359 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:47:20.625619 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:47:20.626184 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:47:20.634279 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:47:20.651841 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:47:20.654894 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:47:20.657668 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:47:20.661327 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:47:20.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.670461 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:47:20.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.687837 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:47:20.689652 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:47:20.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.711836 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:47:20.713643 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:47:20.722505 udevadm[959]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 18:47:20.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:20.731374 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:47:21.620957 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:47:21.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:21.622000 audit: BPF prog-id=18 op=LOAD Apr 12 18:47:21.623000 audit: BPF prog-id=19 op=LOAD Apr 12 18:47:21.623000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:47:21.623000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:47:21.626112 systemd[1]: Starting systemd-udevd.service... Apr 12 18:47:21.671178 systemd-udevd[960]: Using default interface naming scheme 'v252'. Apr 12 18:47:21.734696 systemd[1]: Started systemd-udevd.service. Apr 12 18:47:21.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:21.740000 audit: BPF prog-id=20 op=LOAD Apr 12 18:47:21.743942 systemd[1]: Starting systemd-networkd.service... Apr 12 18:47:21.809683 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Apr 12 18:47:21.856000 audit: BPF prog-id=21 op=LOAD Apr 12 18:47:21.856000 audit: BPF prog-id=22 op=LOAD Apr 12 18:47:21.856000 audit: BPF prog-id=23 op=LOAD Apr 12 18:47:21.858902 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:47:21.875377 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:47:21.911759 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Apr 12 18:47:21.916782 kernel: ACPI: button: Power Button [PWRF] Apr 12 18:47:21.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:21.929773 systemd[1]: Started systemd-userdbd.service. Apr 12 18:47:21.936000 audit[970]: AVC avc: denied { confidentiality } for pid=970 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 18:47:21.936000 audit[970]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562a8232c480 a1=32194 a2=7f5c3ead8bc5 a3=5 items=108 ppid=960 pid=970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:21.936000 audit: CWD cwd="/" Apr 12 18:47:21.936000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=1 name=(null) inode=13637 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=2 name=(null) inode=13637 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=3 name=(null) inode=13638 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=4 name=(null) inode=13637 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=5 name=(null) inode=13639 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=6 name=(null) inode=13637 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=7 name=(null) inode=13640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=8 name=(null) inode=13640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=9 name=(null) inode=13641 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=10 name=(null) inode=13640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=11 name=(null) inode=13642 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=12 name=(null) inode=13640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=13 name=(null) inode=13643 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=14 name=(null) inode=13640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=15 name=(null) inode=13644 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=16 name=(null) inode=13640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=17 name=(null) inode=13645 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=18 name=(null) inode=13637 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=19 name=(null) inode=13646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=20 name=(null) inode=13646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=21 name=(null) inode=13647 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=22 name=(null) inode=13646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=23 name=(null) inode=13648 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=24 name=(null) inode=13646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=25 name=(null) inode=13649 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=26 name=(null) inode=13646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=27 name=(null) inode=13650 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=28 name=(null) inode=13646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=29 name=(null) inode=13651 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=30 name=(null) inode=13637 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=31 name=(null) inode=13652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=32 name=(null) inode=13652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=33 name=(null) inode=13653 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=34 name=(null) inode=13652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=35 name=(null) inode=13654 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=36 name=(null) inode=13652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=37 name=(null) inode=13655 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=38 name=(null) inode=13652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=39 name=(null) inode=13656 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=40 name=(null) inode=13652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=41 name=(null) inode=13657 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=42 name=(null) inode=13637 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=43 name=(null) inode=13658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=44 name=(null) inode=13658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=45 name=(null) inode=13659 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=46 name=(null) inode=13658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=47 name=(null) inode=13660 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=48 name=(null) inode=13658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=49 name=(null) inode=13661 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=50 name=(null) inode=13658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=51 name=(null) inode=13662 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=52 name=(null) inode=13658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=53 name=(null) inode=13663 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=55 name=(null) inode=13664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=56 name=(null) inode=13664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=57 name=(null) inode=13665 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=58 name=(null) inode=13664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=59 name=(null) inode=13666 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=60 name=(null) inode=13664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=61 name=(null) inode=13667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=62 name=(null) inode=13667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=63 name=(null) inode=13668 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=64 name=(null) inode=13667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=65 name=(null) inode=13669 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=66 name=(null) inode=13667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=67 name=(null) inode=13670 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=68 name=(null) inode=13667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=69 name=(null) inode=13671 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=70 name=(null) inode=13667 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=71 name=(null) inode=13672 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=72 name=(null) inode=13664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=73 name=(null) inode=13673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=74 name=(null) inode=13673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=75 name=(null) inode=13674 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=76 name=(null) inode=13673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=77 name=(null) inode=13675 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=78 name=(null) inode=13673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=79 name=(null) inode=13676 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=80 name=(null) inode=13673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=81 name=(null) inode=13677 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=82 name=(null) inode=13673 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=83 name=(null) inode=13678 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=84 name=(null) inode=13664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=85 name=(null) inode=13679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=86 name=(null) inode=13679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=87 name=(null) inode=13680 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=88 name=(null) inode=13679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=89 name=(null) inode=13681 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=90 name=(null) inode=13679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=91 name=(null) inode=13682 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=92 name=(null) inode=13679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=93 name=(null) inode=13683 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=94 name=(null) inode=13679 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=95 name=(null) inode=13684 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=96 name=(null) inode=13664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=97 name=(null) inode=13685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=98 name=(null) inode=13685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=99 name=(null) inode=13686 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=100 name=(null) inode=13685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=101 name=(null) inode=13687 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=102 name=(null) inode=13685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=103 name=(null) inode=13688 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=104 name=(null) inode=13685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=105 name=(null) inode=13689 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=106 name=(null) inode=13685 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PATH item=107 name=(null) inode=13690 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:47:21.936000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 18:47:21.985747 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Apr 12 18:47:21.993752 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Apr 12 18:47:22.005150 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 18:47:22.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:22.059234 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:47:22.061395 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:47:22.417095 lvm[988]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:47:22.454923 systemd-networkd[972]: lo: Link UP Apr 12 18:47:22.455475 systemd-networkd[972]: lo: Gained carrier Apr 12 18:47:22.456671 systemd-networkd[972]: Enumeration completed Apr 12 18:47:22.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:22.457096 systemd[1]: Started systemd-networkd.service. Apr 12 18:47:22.458848 systemd-networkd[972]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:47:22.462176 systemd-networkd[972]: eth0: Link UP Apr 12 18:47:22.462198 systemd-networkd[972]: eth0: Gained carrier Apr 12 18:47:22.465201 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:47:22.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:22.466614 systemd[1]: Reached target cryptsetup.target. Apr 12 18:47:22.470480 systemd[1]: Starting lvm2-activation.service... Apr 12 18:47:22.482874 lvm[990]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:47:22.482947 systemd-networkd[972]: eth0: DHCPv4 address 172.24.4.121/24, gateway 172.24.4.1 acquired from 172.24.4.1 Apr 12 18:47:22.532241 systemd[1]: Finished lvm2-activation.service. Apr 12 18:47:22.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:22.533684 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:47:22.534885 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:47:22.534963 systemd[1]: Reached target local-fs.target. Apr 12 18:47:22.536158 systemd[1]: Reached target machines.target. Apr 12 18:47:22.540381 systemd[1]: Starting ldconfig.service... Apr 12 18:47:22.544024 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:47:22.544125 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:47:22.546520 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:47:22.551057 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:47:22.556151 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:47:22.559236 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:47:22.559358 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:47:22.561611 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:47:22.581866 systemd[1]: boot.automount: Got automount request for /boot, triggered by 992 (bootctl) Apr 12 18:47:22.584580 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:47:22.701016 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:47:22.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:23.071449 systemd-tmpfiles[995]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:47:23.403984 systemd-tmpfiles[995]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:47:23.705306 systemd-tmpfiles[995]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:47:23.770643 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:47:23.772214 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:47:23.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:23.903221 systemd-networkd[972]: eth0: Gained IPv6LL Apr 12 18:47:24.073543 systemd-fsck[1001]: fsck.fat 4.2 (2021-01-31) Apr 12 18:47:24.073543 systemd-fsck[1001]: /dev/vda1: 789 files, 119240/258078 clusters Apr 12 18:47:24.077659 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:47:24.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:24.081930 systemd[1]: Mounting boot.mount... Apr 12 18:47:24.308455 systemd[1]: Mounted boot.mount. Apr 12 18:47:24.401969 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:47:24.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:24.593212 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:47:24.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:24.595762 systemd[1]: Starting audit-rules.service... Apr 12 18:47:24.597400 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:47:24.599410 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:47:24.603000 audit: BPF prog-id=24 op=LOAD Apr 12 18:47:24.608000 audit: BPF prog-id=25 op=LOAD Apr 12 18:47:24.606252 systemd[1]: Starting systemd-resolved.service... Apr 12 18:47:24.612955 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:47:24.617405 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:47:24.618490 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:47:24.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:24.619603 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:47:24.628000 audit[1010]: SYSTEM_BOOT pid=1010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:47:24.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:24.631017 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:47:24.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:24.683568 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:47:24.701701 augenrules[1024]: No rules Apr 12 18:47:24.700000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:47:24.700000 audit[1024]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeb00ff0a0 a2=420 a3=0 items=0 ppid=1004 pid=1024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:24.700000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:47:24.702486 systemd[1]: Finished audit-rules.service. Apr 12 18:47:24.714934 systemd-resolved[1008]: Positive Trust Anchors: Apr 12 18:47:24.715433 systemd-resolved[1008]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:47:24.715546 systemd-resolved[1008]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:47:24.730730 systemd-resolved[1008]: Using system hostname 'ci-3510-3-3-9-2820bc9f86.novalocal'. Apr 12 18:47:24.732687 systemd[1]: Started systemd-resolved.service. Apr 12 18:47:24.733317 systemd[1]: Reached target network.target. Apr 12 18:47:24.733778 systemd[1]: Reached target nss-lookup.target. Apr 12 18:47:24.734273 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:47:24.734971 systemd[1]: Reached target time-set.target. Apr 12 18:47:24.785980 systemd-timesyncd[1009]: Contacted time server 129.151.225.244:123 (0.flatcar.pool.ntp.org). Apr 12 18:47:24.786114 systemd-timesyncd[1009]: Initial clock synchronization to Fri 2024-04-12 18:47:25.075622 UTC. Apr 12 18:47:25.048359 ldconfig[991]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:47:25.068455 systemd[1]: Finished ldconfig.service. Apr 12 18:47:25.072249 systemd[1]: Starting systemd-update-done.service... Apr 12 18:47:25.089474 systemd[1]: Finished systemd-update-done.service. Apr 12 18:47:25.091009 systemd[1]: Reached target sysinit.target. Apr 12 18:47:25.092286 systemd[1]: Started motdgen.path. Apr 12 18:47:25.093376 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:47:25.095088 systemd[1]: Started logrotate.timer. Apr 12 18:47:25.096344 systemd[1]: Started mdadm.timer. Apr 12 18:47:25.097416 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:47:25.099182 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:47:25.099265 systemd[1]: Reached target paths.target. Apr 12 18:47:25.100446 systemd[1]: Reached target timers.target. Apr 12 18:47:25.102580 systemd[1]: Listening on dbus.socket. Apr 12 18:47:25.106175 systemd[1]: Starting docker.socket... Apr 12 18:47:25.114064 systemd[1]: Listening on sshd.socket. Apr 12 18:47:25.115683 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:47:25.116849 systemd[1]: Listening on docker.socket. Apr 12 18:47:25.124492 systemd[1]: Created slice system-sshd.slice. Apr 12 18:47:25.125852 systemd[1]: Reached target sockets.target. Apr 12 18:47:25.127089 systemd[1]: Reached target basic.target. Apr 12 18:47:25.128331 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:47:25.128402 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:47:25.130670 systemd[1]: Starting containerd.service... Apr 12 18:47:25.134078 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 18:47:25.137841 systemd[1]: Starting dbus.service... Apr 12 18:47:25.143105 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:47:25.153733 systemd[1]: Starting extend-filesystems.service... Apr 12 18:47:25.155417 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:47:25.161163 systemd[1]: Starting motdgen.service... Apr 12 18:47:25.166025 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:47:25.167902 systemd[1]: Starting prepare-critools.service... Apr 12 18:47:25.171631 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:47:25.173393 systemd[1]: Starting sshd-keygen.service... Apr 12 18:47:25.179841 systemd[1]: Starting systemd-logind.service... Apr 12 18:47:25.180443 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:47:25.180517 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 18:47:25.181050 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:47:25.181892 systemd[1]: Starting update-engine.service... Apr 12 18:47:25.185920 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:47:25.212916 jq[1050]: true Apr 12 18:47:25.218421 tar[1052]: ./ Apr 12 18:47:25.218421 tar[1052]: ./loopback Apr 12 18:47:25.223797 tar[1053]: crictl Apr 12 18:47:25.222675 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:47:25.222944 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:47:25.224209 jq[1039]: false Apr 12 18:47:25.224617 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:47:25.224813 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:47:25.231937 jq[1058]: true Apr 12 18:47:25.244509 dbus-daemon[1036]: [system] SELinux support is enabled Apr 12 18:47:25.244725 systemd[1]: Started dbus.service. Apr 12 18:47:25.247823 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:47:25.247853 systemd[1]: Reached target system-config.target. Apr 12 18:47:25.248402 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:47:25.248426 systemd[1]: Reached target user-config.target. Apr 12 18:47:25.292167 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:47:25.292385 systemd[1]: Finished motdgen.service. Apr 12 18:47:25.308316 extend-filesystems[1040]: Found vda Apr 12 18:47:25.308316 extend-filesystems[1040]: Found vda1 Apr 12 18:47:25.308316 extend-filesystems[1040]: Found vda2 Apr 12 18:47:25.308316 extend-filesystems[1040]: Found vda3 Apr 12 18:47:25.308316 extend-filesystems[1040]: Found usr Apr 12 18:47:25.308316 extend-filesystems[1040]: Found vda4 Apr 12 18:47:25.308316 extend-filesystems[1040]: Found vda6 Apr 12 18:47:25.308316 extend-filesystems[1040]: Found vda7 Apr 12 18:47:25.308316 extend-filesystems[1040]: Found vda9 Apr 12 18:47:25.308316 extend-filesystems[1040]: Checking size of /dev/vda9 Apr 12 18:47:25.334686 extend-filesystems[1040]: Resized partition /dev/vda9 Apr 12 18:47:25.357126 extend-filesystems[1091]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 18:47:25.402770 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 4635643 blocks Apr 12 18:47:25.419781 env[1055]: time="2024-04-12T18:47:25.419193039Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:47:25.435283 update_engine[1049]: I0412 18:47:25.434111 1049 main.cc:92] Flatcar Update Engine starting Apr 12 18:47:25.504449 update_engine[1049]: I0412 18:47:25.447724 1049 update_check_scheduler.cc:74] Next update check in 11m14s Apr 12 18:47:25.504614 env[1055]: time="2024-04-12T18:47:25.484990324Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:47:25.504701 coreos-metadata[1035]: Apr 12 18:47:25.465 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Apr 12 18:47:25.443214 systemd[1]: Started update-engine.service. Apr 12 18:47:25.446719 systemd[1]: Started locksmithd.service. Apr 12 18:47:25.516656 systemd-logind[1048]: Watching system buttons on /dev/input/event1 (Power Button) Apr 12 18:47:25.516683 systemd-logind[1048]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Apr 12 18:47:25.519278 systemd-logind[1048]: New seat seat0. Apr 12 18:47:25.524097 systemd[1]: Started systemd-logind.service. Apr 12 18:47:25.532771 tar[1052]: ./bandwidth Apr 12 18:47:25.542054 env[1055]: time="2024-04-12T18:47:25.541995279Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:47:25.544174 bash[1088]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:47:25.546378 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:47:25.552255 kernel: EXT4-fs (vda9): resized filesystem to 4635643 Apr 12 18:47:25.699127 env[1055]: time="2024-04-12T18:47:25.553316828Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:47:25.699127 env[1055]: time="2024-04-12T18:47:25.553407326Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:47:25.701793 extend-filesystems[1091]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Apr 12 18:47:25.701793 extend-filesystems[1091]: old_desc_blocks = 1, new_desc_blocks = 3 Apr 12 18:47:25.701793 extend-filesystems[1091]: The filesystem on /dev/vda9 is now 4635643 (4k) blocks long. Apr 12 18:47:25.718838 extend-filesystems[1040]: Resized filesystem in /dev/vda9 Apr 12 18:47:25.720883 env[1055]: time="2024-04-12T18:47:25.705621745Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:47:25.720883 env[1055]: time="2024-04-12T18:47:25.706865472Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:47:25.720883 env[1055]: time="2024-04-12T18:47:25.706946834Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:47:25.720883 env[1055]: time="2024-04-12T18:47:25.706971708Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:47:25.720883 env[1055]: time="2024-04-12T18:47:25.707337642Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:47:25.720883 env[1055]: time="2024-04-12T18:47:25.708348611Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:47:25.720883 env[1055]: time="2024-04-12T18:47:25.708614071Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:47:25.720883 env[1055]: time="2024-04-12T18:47:25.708653251Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:47:25.720883 env[1055]: time="2024-04-12T18:47:25.708836509Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:47:25.720883 env[1055]: time="2024-04-12T18:47:25.708857199Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:47:25.701920 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:47:25.702430 systemd[1]: Finished extend-filesystems.service. Apr 12 18:47:25.734420 env[1055]: time="2024-04-12T18:47:25.734338423Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:47:25.734580 env[1055]: time="2024-04-12T18:47:25.734422182Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:47:25.734580 env[1055]: time="2024-04-12T18:47:25.734501240Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:47:25.734724 env[1055]: time="2024-04-12T18:47:25.734585456Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:47:25.734724 env[1055]: time="2024-04-12T18:47:25.734612947Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:47:25.734724 env[1055]: time="2024-04-12T18:47:25.734635548Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:47:25.734724 env[1055]: time="2024-04-12T18:47:25.734670835Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:47:25.734724 env[1055]: time="2024-04-12T18:47:25.734694442Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:47:25.735093 env[1055]: time="2024-04-12T18:47:25.734736696Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:47:25.735093 env[1055]: time="2024-04-12T18:47:25.734760003Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:47:25.735093 env[1055]: time="2024-04-12T18:47:25.734819075Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:47:25.735093 env[1055]: time="2024-04-12T18:47:25.734844167Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:47:25.737789 env[1055]: time="2024-04-12T18:47:25.735594816Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:47:25.737789 env[1055]: time="2024-04-12T18:47:25.735953826Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:47:25.737789 env[1055]: time="2024-04-12T18:47:25.736579447Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:47:25.737789 env[1055]: time="2024-04-12T18:47:25.736653074Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:47:25.737789 env[1055]: time="2024-04-12T18:47:25.736710693Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:47:25.737789 env[1055]: time="2024-04-12T18:47:25.736860687Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:47:25.737789 env[1055]: time="2024-04-12T18:47:25.736902463Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:47:25.737789 env[1055]: time="2024-04-12T18:47:25.736936650Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:47:25.737789 env[1055]: time="2024-04-12T18:47:25.736966985Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:47:25.737789 env[1055]: time="2024-04-12T18:47:25.737002771Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:47:25.737789 env[1055]: time="2024-04-12T18:47:25.737048824Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:47:25.737789 env[1055]: time="2024-04-12T18:47:25.737083945Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:47:25.737789 env[1055]: time="2024-04-12T18:47:25.737114789Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:47:25.737789 env[1055]: time="2024-04-12T18:47:25.737149661Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:47:25.737789 env[1055]: time="2024-04-12T18:47:25.737506781Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:47:25.738674 env[1055]: time="2024-04-12T18:47:25.737554329Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:47:25.738674 env[1055]: time="2024-04-12T18:47:25.737593821Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:47:25.738674 env[1055]: time="2024-04-12T18:47:25.737626202Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:47:25.738674 env[1055]: time="2024-04-12T18:47:25.737666680Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:47:25.738674 env[1055]: time="2024-04-12T18:47:25.737716512Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:47:25.741962 env[1055]: time="2024-04-12T18:47:25.739107099Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:47:25.741962 env[1055]: time="2024-04-12T18:47:25.739222719Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:47:25.742160 env[1055]: time="2024-04-12T18:47:25.739795830Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:47:25.742160 env[1055]: time="2024-04-12T18:47:25.739964990Z" level=info msg="Connect containerd service" Apr 12 18:47:25.742160 env[1055]: time="2024-04-12T18:47:25.740056214Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:47:25.742160 env[1055]: time="2024-04-12T18:47:25.741275658Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:47:25.748222 env[1055]: time="2024-04-12T18:47:25.742596499Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:47:25.748222 env[1055]: time="2024-04-12T18:47:25.742731400Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:47:25.748222 env[1055]: time="2024-04-12T18:47:25.742903632Z" level=info msg="containerd successfully booted in 0.349776s" Apr 12 18:47:25.743022 systemd[1]: Started containerd.service. Apr 12 18:47:25.758964 env[1055]: time="2024-04-12T18:47:25.758872161Z" level=info msg="Start subscribing containerd event" Apr 12 18:47:25.759208 env[1055]: time="2024-04-12T18:47:25.759166347Z" level=info msg="Start recovering state" Apr 12 18:47:25.759517 env[1055]: time="2024-04-12T18:47:25.759466887Z" level=info msg="Start event monitor" Apr 12 18:47:25.759705 env[1055]: time="2024-04-12T18:47:25.759666527Z" level=info msg="Start snapshots syncer" Apr 12 18:47:25.759928 env[1055]: time="2024-04-12T18:47:25.759876455Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:47:25.760076 env[1055]: time="2024-04-12T18:47:25.760042999Z" level=info msg="Start streaming server" Apr 12 18:47:25.787751 tar[1052]: ./ptp Apr 12 18:47:25.821553 coreos-metadata[1035]: Apr 12 18:47:25.821 INFO Fetch successful Apr 12 18:47:25.821553 coreos-metadata[1035]: Apr 12 18:47:25.821 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Apr 12 18:47:25.835720 coreos-metadata[1035]: Apr 12 18:47:25.835 INFO Fetch successful Apr 12 18:47:25.840410 unknown[1035]: wrote ssh authorized keys file for user: core Apr 12 18:47:25.887519 update-ssh-keys[1104]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:47:25.888263 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 18:47:25.891183 tar[1052]: ./vlan Apr 12 18:47:25.964563 tar[1052]: ./host-device Apr 12 18:47:26.043697 tar[1052]: ./tuning Apr 12 18:47:26.108071 tar[1052]: ./vrf Apr 12 18:47:26.172541 tar[1052]: ./sbr Apr 12 18:47:26.247678 tar[1052]: ./tap Apr 12 18:47:26.318423 tar[1052]: ./dhcp Apr 12 18:47:26.476162 systemd[1]: Finished prepare-critools.service. Apr 12 18:47:26.508447 tar[1052]: ./static Apr 12 18:47:26.536681 tar[1052]: ./firewall Apr 12 18:47:26.581977 tar[1052]: ./macvlan Apr 12 18:47:26.620800 tar[1052]: ./dummy Apr 12 18:47:26.658767 tar[1052]: ./bridge Apr 12 18:47:26.700697 tar[1052]: ./ipvlan Apr 12 18:47:26.738994 tar[1052]: ./portmap Apr 12 18:47:26.777408 tar[1052]: ./host-local Apr 12 18:47:26.814878 locksmithd[1097]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:47:26.823422 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:47:26.963175 sshd_keygen[1068]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:47:26.994320 systemd[1]: Finished sshd-keygen.service. Apr 12 18:47:26.999140 systemd[1]: Starting issuegen.service... Apr 12 18:47:27.003380 systemd[1]: Started sshd@0-172.24.4.121:22-172.24.4.1:60614.service. Apr 12 18:47:27.006404 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:47:27.006607 systemd[1]: Finished issuegen.service. Apr 12 18:47:27.008951 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:47:27.017539 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:47:27.019783 systemd[1]: Started getty@tty1.service. Apr 12 18:47:27.023810 systemd[1]: Started serial-getty@ttyS0.service. Apr 12 18:47:27.025828 systemd[1]: Reached target getty.target. Apr 12 18:47:27.026821 systemd[1]: Reached target multi-user.target. Apr 12 18:47:27.029706 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:47:27.049487 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:47:27.049639 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:47:27.050636 systemd[1]: Startup finished in 1.014s (kernel) + 10.827s (initrd) + 11.411s (userspace) = 23.253s. Apr 12 18:47:28.388160 sshd[1116]: Accepted publickey for core from 172.24.4.1 port 60614 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:47:28.390917 sshd[1116]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:47:28.415140 systemd[1]: Created slice user-500.slice. Apr 12 18:47:28.417649 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:47:28.428114 systemd-logind[1048]: New session 1 of user core. Apr 12 18:47:28.440590 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:47:28.444855 systemd[1]: Starting user@500.service... Apr 12 18:47:28.454056 (systemd)[1125]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:47:28.581496 systemd[1125]: Queued start job for default target default.target. Apr 12 18:47:28.582094 systemd[1125]: Reached target paths.target. Apr 12 18:47:28.582114 systemd[1125]: Reached target sockets.target. Apr 12 18:47:28.582129 systemd[1125]: Reached target timers.target. Apr 12 18:47:28.582142 systemd[1125]: Reached target basic.target. Apr 12 18:47:28.582263 systemd[1]: Started user@500.service. Apr 12 18:47:28.583329 systemd[1]: Started session-1.scope. Apr 12 18:47:28.583935 systemd[1125]: Reached target default.target. Apr 12 18:47:28.584096 systemd[1125]: Startup finished in 116ms. Apr 12 18:47:29.355904 systemd[1]: Started sshd@1-172.24.4.121:22-172.24.4.1:60616.service. Apr 12 18:47:31.017335 sshd[1134]: Accepted publickey for core from 172.24.4.1 port 60616 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:47:31.022607 sshd[1134]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:47:31.037283 systemd-logind[1048]: New session 2 of user core. Apr 12 18:47:31.039493 systemd[1]: Started session-2.scope. Apr 12 18:47:31.831037 sshd[1134]: pam_unix(sshd:session): session closed for user core Apr 12 18:47:31.842322 systemd[1]: Started sshd@2-172.24.4.121:22-172.24.4.1:60630.service. Apr 12 18:47:31.843796 systemd[1]: sshd@1-172.24.4.121:22-172.24.4.1:60616.service: Deactivated successfully. Apr 12 18:47:31.845471 systemd[1]: session-2.scope: Deactivated successfully. Apr 12 18:47:31.850959 systemd-logind[1048]: Session 2 logged out. Waiting for processes to exit. Apr 12 18:47:31.854694 systemd-logind[1048]: Removed session 2. Apr 12 18:47:33.327958 sshd[1139]: Accepted publickey for core from 172.24.4.1 port 60630 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:47:33.331090 sshd[1139]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:47:33.340645 systemd-logind[1048]: New session 3 of user core. Apr 12 18:47:33.341455 systemd[1]: Started session-3.scope. Apr 12 18:47:34.148206 sshd[1139]: pam_unix(sshd:session): session closed for user core Apr 12 18:47:34.154539 systemd[1]: Started sshd@3-172.24.4.121:22-172.24.4.1:60632.service. Apr 12 18:47:34.159942 systemd[1]: sshd@2-172.24.4.121:22-172.24.4.1:60630.service: Deactivated successfully. Apr 12 18:47:34.161540 systemd[1]: session-3.scope: Deactivated successfully. Apr 12 18:47:34.164617 systemd-logind[1048]: Session 3 logged out. Waiting for processes to exit. Apr 12 18:47:34.167545 systemd-logind[1048]: Removed session 3. Apr 12 18:47:35.676062 sshd[1145]: Accepted publickey for core from 172.24.4.1 port 60632 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:47:35.679061 sshd[1145]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:47:35.690327 systemd-logind[1048]: New session 4 of user core. Apr 12 18:47:35.691507 systemd[1]: Started session-4.scope. Apr 12 18:47:36.334790 sshd[1145]: pam_unix(sshd:session): session closed for user core Apr 12 18:47:36.342021 systemd[1]: Started sshd@4-172.24.4.121:22-172.24.4.1:55316.service. Apr 12 18:47:36.347416 systemd[1]: sshd@3-172.24.4.121:22-172.24.4.1:60632.service: Deactivated successfully. Apr 12 18:47:36.349028 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:47:36.351678 systemd-logind[1048]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:47:36.353616 systemd-logind[1048]: Removed session 4. Apr 12 18:47:37.749491 sshd[1151]: Accepted publickey for core from 172.24.4.1 port 55316 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:47:37.753212 sshd[1151]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:47:37.764549 systemd-logind[1048]: New session 5 of user core. Apr 12 18:47:37.765190 systemd[1]: Started session-5.scope. Apr 12 18:47:38.453504 sudo[1155]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:47:38.454047 sudo[1155]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:47:38.467098 dbus-daemon[1036]: \xd0M\xcb\xedrU: received setenforce notice (enforcing=-300441904) Apr 12 18:47:38.470314 sudo[1155]: pam_unix(sudo:session): session closed for user root Apr 12 18:47:38.750902 sshd[1151]: pam_unix(sshd:session): session closed for user core Apr 12 18:47:38.756830 systemd[1]: Started sshd@5-172.24.4.121:22-172.24.4.1:55322.service. Apr 12 18:47:38.762982 systemd[1]: sshd@4-172.24.4.121:22-172.24.4.1:55316.service: Deactivated successfully. Apr 12 18:47:38.764573 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:47:38.768615 systemd-logind[1048]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:47:38.771079 systemd-logind[1048]: Removed session 5. Apr 12 18:47:40.152491 sshd[1158]: Accepted publickey for core from 172.24.4.1 port 55322 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:47:40.154858 sshd[1158]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:47:40.162348 systemd[1]: Started session-6.scope. Apr 12 18:47:40.162831 systemd-logind[1048]: New session 6 of user core. Apr 12 18:47:40.618312 sudo[1163]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:47:40.619574 sudo[1163]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:47:40.629577 sudo[1163]: pam_unix(sudo:session): session closed for user root Apr 12 18:47:40.642767 sudo[1162]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:47:40.643359 sudo[1162]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:47:40.666298 systemd[1]: Stopping audit-rules.service... Apr 12 18:47:40.668000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:47:40.672158 kernel: kauditd_printk_skb: 179 callbacks suppressed Apr 12 18:47:40.672280 kernel: audit: type=1305 audit(1712947660.668:161): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:47:40.668000 audit[1166]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff9eeeb200 a2=420 a3=0 items=0 ppid=1 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:40.688668 kernel: audit: type=1300 audit(1712947660.668:161): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff9eeeb200 a2=420 a3=0 items=0 ppid=1 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:40.688838 kernel: audit: type=1327 audit(1712947660.668:161): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:47:40.668000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:47:40.692330 auditctl[1166]: No rules Apr 12 18:47:40.693339 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:47:40.693861 systemd[1]: Stopped audit-rules.service. Apr 12 18:47:40.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:40.702873 kernel: audit: type=1131 audit(1712947660.693:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:40.703603 systemd[1]: Starting audit-rules.service... Apr 12 18:47:40.738939 augenrules[1183]: No rules Apr 12 18:47:40.740895 systemd[1]: Finished audit-rules.service. Apr 12 18:47:40.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:40.743832 sudo[1162]: pam_unix(sudo:session): session closed for user root Apr 12 18:47:40.749758 kernel: audit: type=1130 audit(1712947660.740:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:40.741000 audit[1162]: USER_END pid=1162 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:47:40.741000 audit[1162]: CRED_DISP pid=1162 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:47:40.769011 kernel: audit: type=1106 audit(1712947660.741:164): pid=1162 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:47:40.769120 kernel: audit: type=1104 audit(1712947660.741:165): pid=1162 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:47:40.965946 sshd[1158]: pam_unix(sshd:session): session closed for user core Apr 12 18:47:40.984920 kernel: audit: type=1106 audit(1712947660.969:166): pid=1158 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:47:40.969000 audit[1158]: USER_END pid=1158 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:47:40.976230 systemd[1]: sshd@5-172.24.4.121:22-172.24.4.1:55322.service: Deactivated successfully. Apr 12 18:47:40.977869 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:47:40.983531 systemd[1]: Started sshd@6-172.24.4.121:22-172.24.4.1:55324.service. Apr 12 18:47:40.991392 systemd-logind[1048]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:47:40.969000 audit[1158]: CRED_DISP pid=1158 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:47:41.001780 kernel: audit: type=1104 audit(1712947660.969:167): pid=1158 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:47:41.003091 systemd-logind[1048]: Removed session 6. Apr 12 18:47:40.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.121:22-172.24.4.1:55322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:40.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.121:22-172.24.4.1:55324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:41.013781 kernel: audit: type=1131 audit(1712947660.975:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.121:22-172.24.4.1:55322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:42.442000 audit[1189]: USER_ACCT pid=1189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:47:42.443559 sshd[1189]: Accepted publickey for core from 172.24.4.1 port 55324 ssh2: RSA SHA256:42mQe97mZjPI509lWDarWO51gHqkCVNTVOmB6aZ8SvU Apr 12 18:47:42.444000 audit[1189]: CRED_ACQ pid=1189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:47:42.444000 audit[1189]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff397f2710 a2=3 a3=0 items=0 ppid=1 pid=1189 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:42.444000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:47:42.446536 sshd[1189]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:47:42.456842 systemd-logind[1048]: New session 7 of user core. Apr 12 18:47:42.458523 systemd[1]: Started session-7.scope. Apr 12 18:47:42.472000 audit[1189]: USER_START pid=1189 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:47:42.475000 audit[1191]: CRED_ACQ pid=1191 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:47:42.912000 audit[1192]: USER_ACCT pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:47:42.913992 sudo[1192]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:47:42.914000 audit[1192]: CRED_REFR pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:47:42.915274 sudo[1192]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:47:42.919000 audit[1192]: USER_START pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:47:43.575972 systemd[1]: Reloading. Apr 12 18:47:43.705063 /usr/lib/systemd/system-generators/torcx-generator[1221]: time="2024-04-12T18:47:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:47:43.711912 /usr/lib/systemd/system-generators/torcx-generator[1221]: time="2024-04-12T18:47:43Z" level=info msg="torcx already run" Apr 12 18:47:43.803820 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:47:43.804039 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:47:43.827025 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:47:43.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.896000 audit: BPF prog-id=31 op=LOAD Apr 12 18:47:43.896000 audit: BPF prog-id=26 op=UNLOAD Apr 12 18:47:43.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.897000 audit: BPF prog-id=32 op=LOAD Apr 12 18:47:43.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.897000 audit: BPF prog-id=33 op=LOAD Apr 12 18:47:43.898000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:47:43.898000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:47:43.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.899000 audit: BPF prog-id=34 op=LOAD Apr 12 18:47:43.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.900000 audit: BPF prog-id=35 op=LOAD Apr 12 18:47:43.900000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:47:43.900000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:47:43.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.901000 audit: BPF prog-id=36 op=LOAD Apr 12 18:47:43.901000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:47:43.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.904000 audit: BPF prog-id=37 op=LOAD Apr 12 18:47:43.904000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:47:43.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.905000 audit: BPF prog-id=38 op=LOAD Apr 12 18:47:43.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.905000 audit: BPF prog-id=39 op=LOAD Apr 12 18:47:43.905000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:47:43.905000 audit: BPF prog-id=23 op=UNLOAD Apr 12 18:47:43.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.906000 audit: BPF prog-id=40 op=LOAD Apr 12 18:47:43.906000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:47:43.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.908000 audit: BPF prog-id=41 op=LOAD Apr 12 18:47:43.908000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:47:43.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.909000 audit: BPF prog-id=42 op=LOAD Apr 12 18:47:43.910000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:47:43.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.913000 audit: BPF prog-id=43 op=LOAD Apr 12 18:47:43.913000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:47:43.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.913000 audit: BPF prog-id=44 op=LOAD Apr 12 18:47:43.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:43.914000 audit: BPF prog-id=45 op=LOAD Apr 12 18:47:43.914000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:47:43.914000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:47:43.923992 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:47:43.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:43.939365 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:47:43.939968 systemd[1]: Reached target network-online.target. Apr 12 18:47:43.941940 systemd[1]: Started kubelet.service. Apr 12 18:47:43.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:43.959939 systemd[1]: Starting coreos-metadata.service... Apr 12 18:47:44.043298 coreos-metadata[1275]: Apr 12 18:47:44.041 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Apr 12 18:47:44.067900 kubelet[1268]: E0412 18:47:44.067803 1268 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:47:44.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:47:44.070170 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:47:44.070300 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:47:44.327351 coreos-metadata[1275]: Apr 12 18:47:44.327 INFO Fetch successful Apr 12 18:47:44.327351 coreos-metadata[1275]: Apr 12 18:47:44.327 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 Apr 12 18:47:44.343174 coreos-metadata[1275]: Apr 12 18:47:44.343 INFO Fetch successful Apr 12 18:47:44.343174 coreos-metadata[1275]: Apr 12 18:47:44.343 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 Apr 12 18:47:44.358937 coreos-metadata[1275]: Apr 12 18:47:44.358 INFO Fetch successful Apr 12 18:47:44.358937 coreos-metadata[1275]: Apr 12 18:47:44.358 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 Apr 12 18:47:44.373105 coreos-metadata[1275]: Apr 12 18:47:44.373 INFO Fetch successful Apr 12 18:47:44.373105 coreos-metadata[1275]: Apr 12 18:47:44.373 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 Apr 12 18:47:44.385059 coreos-metadata[1275]: Apr 12 18:47:44.384 INFO Fetch successful Apr 12 18:47:44.404229 systemd[1]: Finished coreos-metadata.service. Apr 12 18:47:44.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:45.743852 systemd[1]: Stopped kubelet.service. Apr 12 18:47:45.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:45.746783 kernel: kauditd_printk_skb: 187 callbacks suppressed Apr 12 18:47:45.746912 kernel: audit: type=1130 audit(1712947665.743:354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:45.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:45.766942 kernel: audit: type=1131 audit(1712947665.745:355): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:45.796294 systemd[1]: Reloading. Apr 12 18:47:45.949083 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-04-12T18:47:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:47:45.949157 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-04-12T18:47:45Z" level=info msg="torcx already run" Apr 12 18:47:46.011812 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:47:46.011835 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:47:46.035780 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:47:46.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.112998 kernel: audit: type=1400 audit(1712947666.105:356): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.113185 kernel: audit: type=1400 audit(1712947666.105:357): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.118797 kernel: audit: type=1400 audit(1712947666.112:358): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.135394 kernel: audit: type=1400 audit(1712947666.112:359): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.135598 kernel: audit: type=1400 audit(1712947666.112:360): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.135647 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:47:46.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.144632 kernel: audit: type=1400 audit(1712947666.112:361): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.144885 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:47:46.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.112000 audit: BPF prog-id=46 op=LOAD Apr 12 18:47:46.112000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:47:46.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.112000 audit: BPF prog-id=47 op=LOAD Apr 12 18:47:46.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.113000 audit: BPF prog-id=48 op=LOAD Apr 12 18:47:46.113000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:47:46.113000 audit: BPF prog-id=33 op=UNLOAD Apr 12 18:47:46.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.117000 audit: BPF prog-id=49 op=LOAD Apr 12 18:47:46.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.117000 audit: BPF prog-id=50 op=LOAD Apr 12 18:47:46.117000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:47:46.117000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:47:46.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.126000 audit: BPF prog-id=51 op=LOAD Apr 12 18:47:46.126000 audit: BPF prog-id=36 op=UNLOAD Apr 12 18:47:46.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.145000 audit: BPF prog-id=52 op=LOAD Apr 12 18:47:46.145000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:47:46.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.147000 audit: BPF prog-id=56 op=LOAD Apr 12 18:47:46.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.148000 audit: BPF prog-id=57 op=LOAD Apr 12 18:47:46.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.150000 audit: BPF prog-id=58 op=LOAD Apr 12 18:47:46.150000 audit: BPF prog-id=43 op=UNLOAD Apr 12 18:47:46.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.151000 audit: BPF prog-id=59 op=LOAD Apr 12 18:47:46.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.151000 audit: BPF prog-id=60 op=LOAD Apr 12 18:47:46.151000 audit: BPF prog-id=44 op=UNLOAD Apr 12 18:47:46.151000 audit: BPF prog-id=45 op=UNLOAD Apr 12 18:47:46.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:46.170680 systemd[1]: Started kubelet.service. Apr 12 18:47:46.238165 kubelet[1378]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:47:46.238165 kubelet[1378]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:47:46.238165 kubelet[1378]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:47:46.238889 kubelet[1378]: I0412 18:47:46.238197 1378 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:47:46.717099 kubelet[1378]: I0412 18:47:46.717036 1378 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 18:47:46.717401 kubelet[1378]: I0412 18:47:46.717374 1378 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:47:46.718139 kubelet[1378]: I0412 18:47:46.718103 1378 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 18:47:46.722973 kubelet[1378]: I0412 18:47:46.722927 1378 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:47:46.735394 kubelet[1378]: I0412 18:47:46.735350 1378 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:47:46.739443 kubelet[1378]: I0412 18:47:46.739410 1378 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:47:46.740040 kubelet[1378]: I0412 18:47:46.740003 1378 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:47:46.740405 kubelet[1378]: I0412 18:47:46.740330 1378 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:47:46.740606 kubelet[1378]: I0412 18:47:46.740580 1378 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:47:46.741104 kubelet[1378]: I0412 18:47:46.741072 1378 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:47:46.741456 kubelet[1378]: I0412 18:47:46.741428 1378 kubelet.go:393] "Attempting to sync node with API server" Apr 12 18:47:46.741776 kubelet[1378]: I0412 18:47:46.741667 1378 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:47:46.741776 kubelet[1378]: I0412 18:47:46.741740 1378 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:47:46.741776 kubelet[1378]: I0412 18:47:46.741763 1378 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:47:46.742233 kubelet[1378]: E0412 18:47:46.742183 1378 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:46.742319 kubelet[1378]: E0412 18:47:46.742239 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:46.743424 kubelet[1378]: I0412 18:47:46.743395 1378 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:47:46.743804 kubelet[1378]: W0412 18:47:46.743764 1378 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:47:46.744366 kubelet[1378]: I0412 18:47:46.744331 1378 server.go:1232] "Started kubelet" Apr 12 18:47:46.744000 audit[1378]: AVC avc: denied { mac_admin } for pid=1378 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.744000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:47:46.744000 audit[1378]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b1d140 a1=c0008d6df8 a2=c000b1d110 a3=25 items=0 ppid=1 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:46.744000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:47:46.744000 audit[1378]: AVC avc: denied { mac_admin } for pid=1378 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.744000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:47:46.744000 audit[1378]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005bf6c0 a1=c0008d6e10 a2=c000b1d1d0 a3=25 items=0 ppid=1 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:46.744000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:47:46.747551 kubelet[1378]: I0412 18:47:46.746664 1378 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:47:46.747551 kubelet[1378]: I0412 18:47:46.746726 1378 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:47:46.747551 kubelet[1378]: I0412 18:47:46.746799 1378 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:47:46.747920 kubelet[1378]: E0412 18:47:46.747864 1378 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:47:46.747920 kubelet[1378]: E0412 18:47:46.747899 1378 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:47:46.749349 kubelet[1378]: I0412 18:47:46.749294 1378 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:47:46.749907 kubelet[1378]: I0412 18:47:46.749786 1378 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:47:46.750017 kubelet[1378]: I0412 18:47:46.749918 1378 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:47:46.754903 kubelet[1378]: I0412 18:47:46.754012 1378 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:47:46.758866 kubelet[1378]: I0412 18:47:46.758790 1378 server.go:462] "Adding debug handlers to kubelet server" Apr 12 18:47:46.765038 kubelet[1378]: I0412 18:47:46.764992 1378 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:47:46.765355 kubelet[1378]: I0412 18:47:46.765313 1378 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:47:46.811260 kubelet[1378]: E0412 18:47:46.811038 1378 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.24.4.121\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Apr 12 18:47:46.811260 kubelet[1378]: W0412 18:47:46.811155 1378 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 18:47:46.811260 kubelet[1378]: E0412 18:47:46.811182 1378 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 18:47:46.811605 kubelet[1378]: W0412 18:47:46.811324 1378 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 18:47:46.811605 kubelet[1378]: E0412 18:47:46.811344 1378 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 18:47:46.811605 kubelet[1378]: W0412 18:47:46.811433 1378 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.24.4.121" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 18:47:46.811605 kubelet[1378]: E0412 18:47:46.811447 1378 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.24.4.121" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 18:47:46.811883 kubelet[1378]: E0412 18:47:46.811470 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121.17c59cd3cb20f353", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.121", UID:"172.24.4.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.121"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 744308563, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 744308563, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.121"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:47:46.817183 kubelet[1378]: E0412 18:47:46.817074 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121.17c59cd3cb578535", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.121", UID:"172.24.4.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.121"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 747884853, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 747884853, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.121"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:47:46.818461 kubelet[1378]: I0412 18:47:46.818448 1378 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:47:46.818552 kubelet[1378]: I0412 18:47:46.818543 1378 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:47:46.818614 kubelet[1378]: I0412 18:47:46.818606 1378 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:47:46.820227 kubelet[1378]: E0412 18:47:46.820163 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121.17c59cd3cf81cb7e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.121", UID:"172.24.4.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.121 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.121"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 817764222, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 817764222, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.121"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:47:46.821688 kubelet[1378]: E0412 18:47:46.821636 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121.17c59cd3cf81e7e4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.121", UID:"172.24.4.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.121 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.121"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 817771492, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 817771492, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.121"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:47:46.824385 kubelet[1378]: I0412 18:47:46.824369 1378 policy_none.go:49] "None policy: Start" Apr 12 18:47:46.825143 kubelet[1378]: I0412 18:47:46.825112 1378 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:47:46.825229 kubelet[1378]: I0412 18:47:46.825219 1378 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:47:46.825785 kubelet[1378]: E0412 18:47:46.825729 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121.17c59cd3cf81ff12", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.121", UID:"172.24.4.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.121 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.121"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 817777426, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 817777426, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.121"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:47:46.828000 audit[1391]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:46.828000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdff4ed5e0 a2=0 a3=7ffdff4ed5cc items=0 ppid=1378 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:46.828000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:47:46.830000 audit[1395]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:46.830000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd6df23280 a2=0 a3=7ffd6df2326c items=0 ppid=1378 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:46.830000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:47:46.837698 systemd[1]: Created slice kubepods.slice. Apr 12 18:47:46.842544 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:47:46.846795 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:47:46.851134 kubelet[1378]: I0412 18:47:46.850874 1378 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.121" Apr 12 18:47:46.854038 kubelet[1378]: I0412 18:47:46.854005 1378 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:47:46.854160 kubelet[1378]: I0412 18:47:46.854077 1378 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:47:46.852000 audit[1378]: AVC avc: denied { mac_admin } for pid=1378 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:46.852000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:47:46.852000 audit[1378]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b1d710 a1=c0009d7068 a2=c000b1d6e0 a3=25 items=0 ppid=1 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:46.852000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:47:46.854459 kubelet[1378]: I0412 18:47:46.854283 1378 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:47:46.854459 kubelet[1378]: E0412 18:47:46.854402 1378 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.121" Apr 12 18:47:46.835000 audit[1397]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:46.835000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff5dfa16c0 a2=0 a3=7fff5dfa16ac items=0 ppid=1378 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:46.835000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:47:46.856561 kubelet[1378]: E0412 18:47:46.856335 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121.17c59cd3cf81cb7e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.121", UID:"172.24.4.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.121 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.121"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 817764222, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 850808637, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.121"}': 'events "172.24.4.121.17c59cd3cf81cb7e" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:47:46.857603 kubelet[1378]: E0412 18:47:46.857576 1378 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.24.4.121\" not found" Apr 12 18:47:46.858572 kubelet[1378]: E0412 18:47:46.858494 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121.17c59cd3cf81e7e4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.121", UID:"172.24.4.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.121 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.121"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 817771492, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 850813969, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.121"}': 'events "172.24.4.121.17c59cd3cf81e7e4" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:47:46.861001 kubelet[1378]: E0412 18:47:46.860918 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121.17c59cd3cf81ff12", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.121", UID:"172.24.4.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.121 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.121"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 817777426, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 850827524, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.121"}': 'events "172.24.4.121.17c59cd3cf81ff12" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:47:46.860000 audit[1402]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:46.860000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc8dc7a040 a2=0 a3=7ffc8dc7a02c items=0 ppid=1378 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:46.860000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:47:46.862436 kubelet[1378]: E0412 18:47:46.862359 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121.17c59cd3d1deb801", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.121", UID:"172.24.4.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.121"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 857408513, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 857408513, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.121"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:47:47.014238 kubelet[1378]: E0412 18:47:47.014039 1378 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.24.4.121\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Apr 12 18:47:47.056011 kubelet[1378]: I0412 18:47:47.055945 1378 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.121" Apr 12 18:47:47.059060 kubelet[1378]: E0412 18:47:47.058970 1378 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.121" Apr 12 18:47:47.059344 kubelet[1378]: E0412 18:47:47.058981 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121.17c59cd3cf81cb7e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.121", UID:"172.24.4.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.121 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.121"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 817764222, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 47, 47, 55852785, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.121"}': 'events "172.24.4.121.17c59cd3cf81cb7e" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:47:47.062163 kubelet[1378]: E0412 18:47:47.062020 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121.17c59cd3cf81e7e4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.121", UID:"172.24.4.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.121 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.121"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 817771492, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 47, 47, 55865412, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.121"}': 'events "172.24.4.121.17c59cd3cf81e7e4" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:47:47.064350 kubelet[1378]: E0412 18:47:47.064225 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121.17c59cd3cf81ff12", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.121", UID:"172.24.4.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.121 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.121"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 817777426, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 47, 47, 55873544, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.121"}': 'events "172.24.4.121.17c59cd3cf81ff12" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:47:47.417499 kubelet[1378]: E0412 18:47:47.417310 1378 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.24.4.121\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Apr 12 18:47:47.461311 kubelet[1378]: I0412 18:47:47.461226 1378 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.121" Apr 12 18:47:47.463970 kubelet[1378]: E0412 18:47:47.463894 1378 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.121" Apr 12 18:47:47.464890 kubelet[1378]: E0412 18:47:47.464693 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121.17c59cd3cf81cb7e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.121", UID:"172.24.4.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.121 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.121"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 817764222, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 47, 47, 461151093, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.121"}': 'events "172.24.4.121.17c59cd3cf81cb7e" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:47:47.467287 kubelet[1378]: E0412 18:47:47.467137 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121.17c59cd3cf81e7e4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.121", UID:"172.24.4.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.121 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.121"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 817771492, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 47, 47, 461161262, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.121"}': 'events "172.24.4.121.17c59cd3cf81e7e4" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:47:47.469581 kubelet[1378]: E0412 18:47:47.469465 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121.17c59cd3cf81ff12", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.121", UID:"172.24.4.121", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.121 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.121"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 47, 46, 817777426, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 47, 47, 461168198, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.121"}': 'events "172.24.4.121.17c59cd3cf81ff12" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:47:47.581000 audit[1407]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:47.581000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff2aa3bdf0 a2=0 a3=7fff2aa3bddc items=0 ppid=1378 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:47.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:47:47.583276 kubelet[1378]: I0412 18:47:47.583092 1378 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:47:47.585000 audit[1409]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:47.585000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf001a250 a2=0 a3=7ffdf001a23c items=0 ppid=1378 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:47.585000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:47:47.586000 audit[1408]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:47.586000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeab118a60 a2=0 a3=7ffeab118a4c items=0 ppid=1378 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:47.586000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:47:47.587893 kubelet[1378]: I0412 18:47:47.587829 1378 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:47:47.588023 kubelet[1378]: I0412 18:47:47.587899 1378 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:47:47.588023 kubelet[1378]: I0412 18:47:47.587951 1378 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 18:47:47.588152 kubelet[1378]: E0412 18:47:47.588047 1378 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Apr 12 18:47:47.590000 audit[1410]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:47.590000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe66c55a80 a2=0 a3=7ffe66c55a6c items=0 ppid=1378 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:47.590000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:47:47.592458 kubelet[1378]: W0412 18:47:47.592400 1378 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Apr 12 18:47:47.592598 kubelet[1378]: E0412 18:47:47.592466 1378 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Apr 12 18:47:47.593000 audit[1413]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_chain pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:47.593000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc55fe8f80 a2=0 a3=7ffc55fe8f6c items=0 ppid=1378 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:47.593000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:47:47.594000 audit[1411]: NETFILTER_CFG table=mangle:11 family=10 entries=1 op=nft_register_chain pid=1411 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:47.594000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7c705200 a2=0 a3=7ffc7c7051ec items=0 ppid=1378 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:47.594000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:47:47.598000 audit[1414]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1414 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:47.598000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdea8a7550 a2=0 a3=7ffdea8a753c items=0 ppid=1378 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:47.598000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:47:47.601000 audit[1415]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1415 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:47.601000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffaed68ee0 a2=0 a3=7fffaed68ecc items=0 ppid=1378 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:47.601000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:47:47.722918 kubelet[1378]: I0412 18:47:47.722530 1378 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Apr 12 18:47:47.743410 kubelet[1378]: E0412 18:47:47.743270 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:48.173368 kubelet[1378]: E0412 18:47:48.173128 1378 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.24.4.121" not found Apr 12 18:47:48.224277 kubelet[1378]: E0412 18:47:48.224226 1378 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.24.4.121\" not found" node="172.24.4.121" Apr 12 18:47:48.266620 kubelet[1378]: I0412 18:47:48.266547 1378 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.121" Apr 12 18:47:48.271975 kubelet[1378]: I0412 18:47:48.271909 1378 kubelet_node_status.go:73] "Successfully registered node" node="172.24.4.121" Apr 12 18:47:48.390906 kubelet[1378]: I0412 18:47:48.390841 1378 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Apr 12 18:47:48.391688 env[1055]: time="2024-04-12T18:47:48.391568495Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:47:48.393444 kubelet[1378]: I0412 18:47:48.393407 1378 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Apr 12 18:47:48.693000 audit[1192]: USER_END pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:47:48.693000 audit[1192]: CRED_DISP pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:47:48.693876 sudo[1192]: pam_unix(sudo:session): session closed for user root Apr 12 18:47:48.743382 kubelet[1378]: I0412 18:47:48.743335 1378 apiserver.go:52] "Watching apiserver" Apr 12 18:47:48.744213 kubelet[1378]: E0412 18:47:48.743647 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:48.751560 kubelet[1378]: I0412 18:47:48.751504 1378 topology_manager.go:215] "Topology Admit Handler" podUID="037d266a-b6c8-4e68-a213-5672f0d7abe5" podNamespace="kube-system" podName="kube-proxy-p2kpq" Apr 12 18:47:48.751820 kubelet[1378]: I0412 18:47:48.751786 1378 topology_manager.go:215] "Topology Admit Handler" podUID="c5071c4e-5ab4-47c3-ae50-29061fdcad15" podNamespace="calico-system" podName="calico-node-2pns4" Apr 12 18:47:48.752221 kubelet[1378]: I0412 18:47:48.752083 1378 topology_manager.go:215] "Topology Admit Handler" podUID="11ec87fb-2946-4b3a-9964-c58b0a4e068a" podNamespace="calico-system" podName="csi-node-driver-7m955" Apr 12 18:47:48.752793 kubelet[1378]: E0412 18:47:48.752748 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7m955" podUID="11ec87fb-2946-4b3a-9964-c58b0a4e068a" Apr 12 18:47:48.768118 systemd[1]: Created slice kubepods-besteffort-pod037d266a_b6c8_4e68_a213_5672f0d7abe5.slice. Apr 12 18:47:48.796657 systemd[1]: Created slice kubepods-besteffort-podc5071c4e_5ab4_47c3_ae50_29061fdcad15.slice. Apr 12 18:47:48.851073 kubelet[1378]: I0412 18:47:48.850980 1378 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:47:48.862397 kubelet[1378]: I0412 18:47:48.862324 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/c5071c4e-5ab4-47c3-ae50-29061fdcad15-var-run-calico\") pod \"calico-node-2pns4\" (UID: \"c5071c4e-5ab4-47c3-ae50-29061fdcad15\") " pod="calico-system/calico-node-2pns4" Apr 12 18:47:48.862552 kubelet[1378]: I0412 18:47:48.862413 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/c5071c4e-5ab4-47c3-ae50-29061fdcad15-cni-net-dir\") pod \"calico-node-2pns4\" (UID: \"c5071c4e-5ab4-47c3-ae50-29061fdcad15\") " pod="calico-system/calico-node-2pns4" Apr 12 18:47:48.862552 kubelet[1378]: I0412 18:47:48.862449 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/037d266a-b6c8-4e68-a213-5672f0d7abe5-xtables-lock\") pod \"kube-proxy-p2kpq\" (UID: \"037d266a-b6c8-4e68-a213-5672f0d7abe5\") " pod="kube-system/kube-proxy-p2kpq" Apr 12 18:47:48.862552 kubelet[1378]: I0412 18:47:48.862482 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c5071c4e-5ab4-47c3-ae50-29061fdcad15-xtables-lock\") pod \"calico-node-2pns4\" (UID: \"c5071c4e-5ab4-47c3-ae50-29061fdcad15\") " pod="calico-system/calico-node-2pns4" Apr 12 18:47:48.862552 kubelet[1378]: I0412 18:47:48.862520 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/c5071c4e-5ab4-47c3-ae50-29061fdcad15-flexvol-driver-host\") pod \"calico-node-2pns4\" (UID: \"c5071c4e-5ab4-47c3-ae50-29061fdcad15\") " pod="calico-system/calico-node-2pns4" Apr 12 18:47:48.862552 kubelet[1378]: I0412 18:47:48.862548 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fzlsz\" (UniqueName: \"kubernetes.io/projected/c5071c4e-5ab4-47c3-ae50-29061fdcad15-kube-api-access-fzlsz\") pod \"calico-node-2pns4\" (UID: \"c5071c4e-5ab4-47c3-ae50-29061fdcad15\") " pod="calico-system/calico-node-2pns4" Apr 12 18:47:48.863167 kubelet[1378]: I0412 18:47:48.862576 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/c5071c4e-5ab4-47c3-ae50-29061fdcad15-policysync\") pod \"calico-node-2pns4\" (UID: \"c5071c4e-5ab4-47c3-ae50-29061fdcad15\") " pod="calico-system/calico-node-2pns4" Apr 12 18:47:48.863167 kubelet[1378]: I0412 18:47:48.862604 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/c5071c4e-5ab4-47c3-ae50-29061fdcad15-node-certs\") pod \"calico-node-2pns4\" (UID: \"c5071c4e-5ab4-47c3-ae50-29061fdcad15\") " pod="calico-system/calico-node-2pns4" Apr 12 18:47:48.863167 kubelet[1378]: I0412 18:47:48.862632 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c5071c4e-5ab4-47c3-ae50-29061fdcad15-var-lib-calico\") pod \"calico-node-2pns4\" (UID: \"c5071c4e-5ab4-47c3-ae50-29061fdcad15\") " pod="calico-system/calico-node-2pns4" Apr 12 18:47:48.863167 kubelet[1378]: I0412 18:47:48.862656 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/11ec87fb-2946-4b3a-9964-c58b0a4e068a-varrun\") pod \"csi-node-driver-7m955\" (UID: \"11ec87fb-2946-4b3a-9964-c58b0a4e068a\") " pod="calico-system/csi-node-driver-7m955" Apr 12 18:47:48.863167 kubelet[1378]: I0412 18:47:48.862682 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/11ec87fb-2946-4b3a-9964-c58b0a4e068a-kubelet-dir\") pod \"csi-node-driver-7m955\" (UID: \"11ec87fb-2946-4b3a-9964-c58b0a4e068a\") " pod="calico-system/csi-node-driver-7m955" Apr 12 18:47:48.863475 kubelet[1378]: I0412 18:47:48.862808 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/11ec87fb-2946-4b3a-9964-c58b0a4e068a-registration-dir\") pod \"csi-node-driver-7m955\" (UID: \"11ec87fb-2946-4b3a-9964-c58b0a4e068a\") " pod="calico-system/csi-node-driver-7m955" Apr 12 18:47:48.863475 kubelet[1378]: I0412 18:47:48.862841 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/037d266a-b6c8-4e68-a213-5672f0d7abe5-lib-modules\") pod \"kube-proxy-p2kpq\" (UID: \"037d266a-b6c8-4e68-a213-5672f0d7abe5\") " pod="kube-system/kube-proxy-p2kpq" Apr 12 18:47:48.863475 kubelet[1378]: I0412 18:47:48.862867 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l4qdb\" (UniqueName: \"kubernetes.io/projected/037d266a-b6c8-4e68-a213-5672f0d7abe5-kube-api-access-l4qdb\") pod \"kube-proxy-p2kpq\" (UID: \"037d266a-b6c8-4e68-a213-5672f0d7abe5\") " pod="kube-system/kube-proxy-p2kpq" Apr 12 18:47:48.863475 kubelet[1378]: I0412 18:47:48.862896 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c5071c4e-5ab4-47c3-ae50-29061fdcad15-tigera-ca-bundle\") pod \"calico-node-2pns4\" (UID: \"c5071c4e-5ab4-47c3-ae50-29061fdcad15\") " pod="calico-system/calico-node-2pns4" Apr 12 18:47:48.863475 kubelet[1378]: I0412 18:47:48.862921 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/c5071c4e-5ab4-47c3-ae50-29061fdcad15-cni-bin-dir\") pod \"calico-node-2pns4\" (UID: \"c5071c4e-5ab4-47c3-ae50-29061fdcad15\") " pod="calico-system/calico-node-2pns4" Apr 12 18:47:48.863835 kubelet[1378]: I0412 18:47:48.862946 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/c5071c4e-5ab4-47c3-ae50-29061fdcad15-cni-log-dir\") pod \"calico-node-2pns4\" (UID: \"c5071c4e-5ab4-47c3-ae50-29061fdcad15\") " pod="calico-system/calico-node-2pns4" Apr 12 18:47:48.863835 kubelet[1378]: I0412 18:47:48.862977 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/11ec87fb-2946-4b3a-9964-c58b0a4e068a-socket-dir\") pod \"csi-node-driver-7m955\" (UID: \"11ec87fb-2946-4b3a-9964-c58b0a4e068a\") " pod="calico-system/csi-node-driver-7m955" Apr 12 18:47:48.863835 kubelet[1378]: I0412 18:47:48.863017 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6dfnk\" (UniqueName: \"kubernetes.io/projected/11ec87fb-2946-4b3a-9964-c58b0a4e068a-kube-api-access-6dfnk\") pod \"csi-node-driver-7m955\" (UID: \"11ec87fb-2946-4b3a-9964-c58b0a4e068a\") " pod="calico-system/csi-node-driver-7m955" Apr 12 18:47:48.863835 kubelet[1378]: I0412 18:47:48.863064 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/037d266a-b6c8-4e68-a213-5672f0d7abe5-kube-proxy\") pod \"kube-proxy-p2kpq\" (UID: \"037d266a-b6c8-4e68-a213-5672f0d7abe5\") " pod="kube-system/kube-proxy-p2kpq" Apr 12 18:47:48.863835 kubelet[1378]: I0412 18:47:48.863097 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c5071c4e-5ab4-47c3-ae50-29061fdcad15-lib-modules\") pod \"calico-node-2pns4\" (UID: \"c5071c4e-5ab4-47c3-ae50-29061fdcad15\") " pod="calico-system/calico-node-2pns4" Apr 12 18:47:48.899355 sshd[1189]: pam_unix(sshd:session): session closed for user core Apr 12 18:47:48.899000 audit[1189]: USER_END pid=1189 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:47:48.899000 audit[1189]: CRED_DISP pid=1189 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Apr 12 18:47:48.904948 systemd[1]: sshd@6-172.24.4.121:22-172.24.4.1:55324.service: Deactivated successfully. Apr 12 18:47:48.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.121:22-172.24.4.1:55324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:48.907014 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:47:48.908657 systemd-logind[1048]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:47:48.912379 systemd-logind[1048]: Removed session 7. Apr 12 18:47:48.969429 kubelet[1378]: E0412 18:47:48.969251 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:47:48.972369 kubelet[1378]: W0412 18:47:48.972257 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:47:48.972824 kubelet[1378]: E0412 18:47:48.972791 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:47:48.974349 kubelet[1378]: E0412 18:47:48.974318 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:47:48.985209 kubelet[1378]: W0412 18:47:48.985102 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:47:48.985629 kubelet[1378]: E0412 18:47:48.985602 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:47:49.010656 kubelet[1378]: E0412 18:47:49.010614 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:47:49.011821 kubelet[1378]: W0412 18:47:49.011778 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:47:49.012159 kubelet[1378]: E0412 18:47:49.012092 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:47:49.023108 kubelet[1378]: E0412 18:47:49.023067 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:47:49.023398 kubelet[1378]: W0412 18:47:49.023366 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:47:49.024244 kubelet[1378]: E0412 18:47:49.024202 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:47:49.025782 kubelet[1378]: E0412 18:47:49.025754 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:47:49.026008 kubelet[1378]: W0412 18:47:49.025979 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:47:49.027006 kubelet[1378]: E0412 18:47:49.026976 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:47:49.027361 kubelet[1378]: W0412 18:47:49.027266 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:47:49.027608 kubelet[1378]: E0412 18:47:49.027148 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:47:49.027741 kubelet[1378]: E0412 18:47:49.027610 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:47:49.028288 kubelet[1378]: E0412 18:47:49.028261 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:47:49.028460 kubelet[1378]: W0412 18:47:49.028434 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:47:49.028760 kubelet[1378]: E0412 18:47:49.028673 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:47:49.029316 kubelet[1378]: E0412 18:47:49.029290 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:47:49.029503 kubelet[1378]: W0412 18:47:49.029477 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:47:49.029829 kubelet[1378]: E0412 18:47:49.029704 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:47:49.030309 kubelet[1378]: E0412 18:47:49.030285 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:47:49.030473 kubelet[1378]: W0412 18:47:49.030448 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:47:49.030792 kubelet[1378]: E0412 18:47:49.030674 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:47:49.031455 kubelet[1378]: E0412 18:47:49.031428 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:47:49.031670 kubelet[1378]: W0412 18:47:49.031631 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:47:49.032318 kubelet[1378]: E0412 18:47:49.032290 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:47:49.032482 kubelet[1378]: W0412 18:47:49.032460 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:47:49.032680 kubelet[1378]: E0412 18:47:49.032304 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:47:49.032786 kubelet[1378]: E0412 18:47:49.032694 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:47:49.033301 kubelet[1378]: E0412 18:47:49.033276 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:47:49.033437 kubelet[1378]: W0412 18:47:49.033417 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:47:49.033804 kubelet[1378]: E0412 18:47:49.033761 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:47:49.034235 kubelet[1378]: E0412 18:47:49.034211 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:47:49.034390 kubelet[1378]: W0412 18:47:49.034367 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:47:49.034630 kubelet[1378]: E0412 18:47:49.034585 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:47:49.035213 kubelet[1378]: E0412 18:47:49.035184 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:47:49.035398 kubelet[1378]: W0412 18:47:49.035369 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:47:49.035652 kubelet[1378]: E0412 18:47:49.035614 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:47:49.036143 kubelet[1378]: E0412 18:47:49.036118 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:47:49.036226 kubelet[1378]: W0412 18:47:49.036213 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:47:49.036375 kubelet[1378]: E0412 18:47:49.036343 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:47:49.036679 kubelet[1378]: E0412 18:47:49.036664 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:47:49.036836 kubelet[1378]: W0412 18:47:49.036820 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:47:49.036970 kubelet[1378]: E0412 18:47:49.036954 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:47:49.037468 kubelet[1378]: E0412 18:47:49.037441 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:47:49.037468 kubelet[1378]: W0412 18:47:49.037470 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:47:49.037563 kubelet[1378]: E0412 18:47:49.037510 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:47:49.037841 kubelet[1378]: E0412 18:47:49.037818 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:47:49.037903 kubelet[1378]: W0412 18:47:49.037844 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:47:49.037903 kubelet[1378]: E0412 18:47:49.037867 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:47:49.095701 env[1055]: time="2024-04-12T18:47:49.095474189Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-p2kpq,Uid:037d266a-b6c8-4e68-a213-5672f0d7abe5,Namespace:kube-system,Attempt:0,}" Apr 12 18:47:49.104184 env[1055]: time="2024-04-12T18:47:49.103871356Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-2pns4,Uid:c5071c4e-5ab4-47c3-ae50-29061fdcad15,Namespace:calico-system,Attempt:0,}" Apr 12 18:47:49.745000 kubelet[1378]: E0412 18:47:49.744897 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:49.967912 env[1055]: time="2024-04-12T18:47:49.967827996Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:49.970887 env[1055]: time="2024-04-12T18:47:49.970835211Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:49.977261 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1156261561.mount: Deactivated successfully. Apr 12 18:47:49.979623 env[1055]: time="2024-04-12T18:47:49.979505330Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:49.984028 env[1055]: time="2024-04-12T18:47:49.983968207Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:49.993899 env[1055]: time="2024-04-12T18:47:49.993835424Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:50.011094 env[1055]: time="2024-04-12T18:47:50.010908546Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:50.013701 env[1055]: time="2024-04-12T18:47:50.013605421Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:50.015601 env[1055]: time="2024-04-12T18:47:50.015515281Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:50.089698 env[1055]: time="2024-04-12T18:47:50.089517986Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:47:50.089984 env[1055]: time="2024-04-12T18:47:50.089796023Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:47:50.089984 env[1055]: time="2024-04-12T18:47:50.089900112Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:47:50.090343 env[1055]: time="2024-04-12T18:47:50.090253609Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8b48ce92a4c749d3d4f0afd1d7aa54570b14efedc54893877977b2536bd527ea pid=1457 runtime=io.containerd.runc.v2 Apr 12 18:47:50.091012 env[1055]: time="2024-04-12T18:47:50.090862721Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:47:50.091012 env[1055]: time="2024-04-12T18:47:50.090961433Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:47:50.091334 env[1055]: time="2024-04-12T18:47:50.091234074Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:47:50.091937 env[1055]: time="2024-04-12T18:47:50.091827819Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/085e082f0987e34448492e2324dab4f8911c58b6a2b7d3c71508f581ee5be162 pid=1456 runtime=io.containerd.runc.v2 Apr 12 18:47:50.116746 systemd[1]: Started cri-containerd-8b48ce92a4c749d3d4f0afd1d7aa54570b14efedc54893877977b2536bd527ea.scope. Apr 12 18:47:50.125036 systemd[1]: Started cri-containerd-085e082f0987e34448492e2324dab4f8911c58b6a2b7d3c71508f581ee5be162.scope. Apr 12 18:47:50.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.142000 audit: BPF prog-id=61 op=LOAD Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { bpf } for pid=1477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1457 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:50.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862343863653932613463373439643364346630616664316437616135 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { perfmon } for pid=1477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1457 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:50.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862343863653932613463373439643364346630616664316437616135 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { bpf } for pid=1477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { bpf } for pid=1477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { bpf } for pid=1477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { perfmon } for pid=1477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { perfmon } for pid=1477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { perfmon } for pid=1477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { perfmon } for pid=1477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { perfmon } for pid=1477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { bpf } for pid=1477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { bpf } for pid=1477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit: BPF prog-id=62 op=LOAD Apr 12 18:47:50.143000 audit[1477]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000218d40 items=0 ppid=1457 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:50.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862343863653932613463373439643364346630616664316437616135 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { bpf } for pid=1477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { bpf } for pid=1477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { perfmon } for pid=1477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { perfmon } for pid=1477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { perfmon } for pid=1477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { perfmon } for pid=1477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { perfmon } for pid=1477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { bpf } for pid=1477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { bpf } for pid=1477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit: BPF prog-id=63 op=LOAD Apr 12 18:47:50.143000 audit[1477]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218d88 items=0 ppid=1457 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:50.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862343863653932613463373439643364346630616664316437616135 Apr 12 18:47:50.143000 audit: BPF prog-id=63 op=UNLOAD Apr 12 18:47:50.143000 audit: BPF prog-id=62 op=UNLOAD Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { bpf } for pid=1477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { bpf } for pid=1477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { bpf } for pid=1477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { perfmon } for pid=1477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { perfmon } for pid=1477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { perfmon } for pid=1477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { perfmon } for pid=1477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { perfmon } for pid=1477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { bpf } for pid=1477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit[1477]: AVC avc: denied { bpf } for pid=1477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.143000 audit: BPF prog-id=64 op=LOAD Apr 12 18:47:50.143000 audit[1477]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000219198 items=0 ppid=1457 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:50.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862343863653932613463373439643364346630616664316437616135 Apr 12 18:47:50.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.147000 audit: BPF prog-id=65 op=LOAD Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { bpf } for pid=1483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1456 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:50.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038356530383266303938376533343434383439326532333234646162 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { perfmon } for pid=1483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1456 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:50.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038356530383266303938376533343434383439326532333234646162 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { bpf } for pid=1483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { bpf } for pid=1483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { bpf } for pid=1483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { perfmon } for pid=1483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { perfmon } for pid=1483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { perfmon } for pid=1483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { perfmon } for pid=1483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { perfmon } for pid=1483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { bpf } for pid=1483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { bpf } for pid=1483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit: BPF prog-id=66 op=LOAD Apr 12 18:47:50.148000 audit[1483]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00038d150 items=0 ppid=1456 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:50.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038356530383266303938376533343434383439326532333234646162 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { bpf } for pid=1483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { bpf } for pid=1483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { perfmon } for pid=1483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { perfmon } for pid=1483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { perfmon } for pid=1483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { perfmon } for pid=1483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { perfmon } for pid=1483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { bpf } for pid=1483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { bpf } for pid=1483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit: BPF prog-id=67 op=LOAD Apr 12 18:47:50.148000 audit[1483]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00038d198 items=0 ppid=1456 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:50.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038356530383266303938376533343434383439326532333234646162 Apr 12 18:47:50.148000 audit: BPF prog-id=67 op=UNLOAD Apr 12 18:47:50.148000 audit: BPF prog-id=66 op=UNLOAD Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { bpf } for pid=1483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { bpf } for pid=1483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { bpf } for pid=1483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { perfmon } for pid=1483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { perfmon } for pid=1483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { perfmon } for pid=1483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { perfmon } for pid=1483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { perfmon } for pid=1483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { bpf } for pid=1483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit[1483]: AVC avc: denied { bpf } for pid=1483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:50.148000 audit: BPF prog-id=68 op=LOAD Apr 12 18:47:50.148000 audit[1483]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00038d5a8 items=0 ppid=1456 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:50.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038356530383266303938376533343434383439326532333234646162 Apr 12 18:47:50.167131 env[1055]: time="2024-04-12T18:47:50.167072144Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-2pns4,Uid:c5071c4e-5ab4-47c3-ae50-29061fdcad15,Namespace:calico-system,Attempt:0,} returns sandbox id \"8b48ce92a4c749d3d4f0afd1d7aa54570b14efedc54893877977b2536bd527ea\"" Apr 12 18:47:50.171068 env[1055]: time="2024-04-12T18:47:50.170678500Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:47:50.171960 env[1055]: time="2024-04-12T18:47:50.171920903Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-p2kpq,Uid:037d266a-b6c8-4e68-a213-5672f0d7abe5,Namespace:kube-system,Attempt:0,} returns sandbox id \"085e082f0987e34448492e2324dab4f8911c58b6a2b7d3c71508f581ee5be162\"" Apr 12 18:47:50.589732 kubelet[1378]: E0412 18:47:50.589615 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7m955" podUID="11ec87fb-2946-4b3a-9964-c58b0a4e068a" Apr 12 18:47:50.745826 kubelet[1378]: E0412 18:47:50.745769 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:51.507481 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3290289592.mount: Deactivated successfully. Apr 12 18:47:51.747354 kubelet[1378]: E0412 18:47:51.747228 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:52.589283 kubelet[1378]: E0412 18:47:52.589207 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7m955" podUID="11ec87fb-2946-4b3a-9964-c58b0a4e068a" Apr 12 18:47:52.691821 env[1055]: time="2024-04-12T18:47:52.691630085Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:52.696930 env[1055]: time="2024-04-12T18:47:52.696880085Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:52.701379 env[1055]: time="2024-04-12T18:47:52.701329407Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:52.705667 env[1055]: time="2024-04-12T18:47:52.705610580Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:52.709525 env[1055]: time="2024-04-12T18:47:52.709388945Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\"" Apr 12 18:47:52.712698 env[1055]: time="2024-04-12T18:47:52.712641427Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\"" Apr 12 18:47:52.714855 env[1055]: time="2024-04-12T18:47:52.714666413Z" level=info msg="CreateContainer within sandbox \"8b48ce92a4c749d3d4f0afd1d7aa54570b14efedc54893877977b2536bd527ea\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:47:52.733643 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1655786738.mount: Deactivated successfully. Apr 12 18:47:52.744826 env[1055]: time="2024-04-12T18:47:52.744645768Z" level=info msg="CreateContainer within sandbox \"8b48ce92a4c749d3d4f0afd1d7aa54570b14efedc54893877977b2536bd527ea\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"23506f5ccb119329c31964a33736b9af9bab37a6d098e011b5ea162e35bcd691\"" Apr 12 18:47:52.746211 env[1055]: time="2024-04-12T18:47:52.746145594Z" level=info msg="StartContainer for \"23506f5ccb119329c31964a33736b9af9bab37a6d098e011b5ea162e35bcd691\"" Apr 12 18:47:52.748007 kubelet[1378]: E0412 18:47:52.747969 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:52.780984 systemd[1]: Started cri-containerd-23506f5ccb119329c31964a33736b9af9bab37a6d098e011b5ea162e35bcd691.scope. Apr 12 18:47:52.795334 systemd[1]: run-containerd-runc-k8s.io-23506f5ccb119329c31964a33736b9af9bab37a6d098e011b5ea162e35bcd691-runc.ilmeLn.mount: Deactivated successfully. Apr 12 18:47:52.829526 kernel: kauditd_printk_skb: 406 callbacks suppressed Apr 12 18:47:52.829649 kernel: audit: type=1400 audit(1712947672.824:548): avc: denied { perfmon } for pid=1528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.824000 audit[1528]: AVC avc: denied { perfmon } for pid=1528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.824000 audit[1528]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fb809db96a8 items=0 ppid=1457 pid=1528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:52.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233353036663563636231313933323963333139363461333337333662 Apr 12 18:47:52.839643 kernel: audit: type=1300 audit(1712947672.824:548): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fb809db96a8 items=0 ppid=1457 pid=1528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:52.839759 kernel: audit: type=1327 audit(1712947672.824:548): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233353036663563636231313933323963333139363461333337333662 Apr 12 18:47:52.839785 kernel: audit: type=1400 audit(1712947672.824:549): avc: denied { bpf } for pid=1528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.824000 audit[1528]: AVC avc: denied { bpf } for pid=1528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.824000 audit[1528]: AVC avc: denied { bpf } for pid=1528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.824000 audit[1528]: AVC avc: denied { bpf } for pid=1528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.853053 kernel: audit: type=1400 audit(1712947672.824:549): avc: denied { bpf } for pid=1528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.853150 kernel: audit: type=1400 audit(1712947672.824:549): avc: denied { bpf } for pid=1528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.824000 audit[1528]: AVC avc: denied { perfmon } for pid=1528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.858769 kernel: audit: type=1400 audit(1712947672.824:549): avc: denied { perfmon } for pid=1528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.824000 audit[1528]: AVC avc: denied { perfmon } for pid=1528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.824000 audit[1528]: AVC avc: denied { perfmon } for pid=1528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.865597 kernel: audit: type=1400 audit(1712947672.824:549): avc: denied { perfmon } for pid=1528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.865749 kernel: audit: type=1400 audit(1712947672.824:549): avc: denied { perfmon } for pid=1528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.865791 kernel: audit: type=1400 audit(1712947672.824:549): avc: denied { perfmon } for pid=1528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.824000 audit[1528]: AVC avc: denied { perfmon } for pid=1528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.824000 audit[1528]: AVC avc: denied { perfmon } for pid=1528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.824000 audit[1528]: AVC avc: denied { bpf } for pid=1528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.824000 audit[1528]: AVC avc: denied { bpf } for pid=1528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.824000 audit: BPF prog-id=69 op=LOAD Apr 12 18:47:52.824000 audit[1528]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000331d98 items=0 ppid=1457 pid=1528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:52.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233353036663563636231313933323963333139363461333337333662 Apr 12 18:47:52.825000 audit[1528]: AVC avc: denied { bpf } for pid=1528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.825000 audit[1528]: AVC avc: denied { bpf } for pid=1528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.825000 audit[1528]: AVC avc: denied { perfmon } for pid=1528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.825000 audit[1528]: AVC avc: denied { perfmon } for pid=1528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.825000 audit[1528]: AVC avc: denied { perfmon } for pid=1528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.825000 audit[1528]: AVC avc: denied { perfmon } for pid=1528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.825000 audit[1528]: AVC avc: denied { perfmon } for pid=1528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.825000 audit[1528]: AVC avc: denied { bpf } for pid=1528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.825000 audit[1528]: AVC avc: denied { bpf } for pid=1528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.825000 audit: BPF prog-id=70 op=LOAD Apr 12 18:47:52.825000 audit[1528]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000331de8 items=0 ppid=1457 pid=1528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:52.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233353036663563636231313933323963333139363461333337333662 Apr 12 18:47:52.828000 audit: BPF prog-id=70 op=UNLOAD Apr 12 18:47:52.828000 audit: BPF prog-id=69 op=UNLOAD Apr 12 18:47:52.828000 audit[1528]: AVC avc: denied { bpf } for pid=1528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.828000 audit[1528]: AVC avc: denied { bpf } for pid=1528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.828000 audit[1528]: AVC avc: denied { bpf } for pid=1528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.828000 audit[1528]: AVC avc: denied { perfmon } for pid=1528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.828000 audit[1528]: AVC avc: denied { perfmon } for pid=1528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.828000 audit[1528]: AVC avc: denied { perfmon } for pid=1528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.828000 audit[1528]: AVC avc: denied { perfmon } for pid=1528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.828000 audit[1528]: AVC avc: denied { perfmon } for pid=1528 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.828000 audit[1528]: AVC avc: denied { bpf } for pid=1528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.828000 audit[1528]: AVC avc: denied { bpf } for pid=1528 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:52.828000 audit: BPF prog-id=71 op=LOAD Apr 12 18:47:52.828000 audit[1528]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000331e78 items=0 ppid=1457 pid=1528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:52.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233353036663563636231313933323963333139363461333337333662 Apr 12 18:47:52.872505 env[1055]: time="2024-04-12T18:47:52.872464955Z" level=info msg="StartContainer for \"23506f5ccb119329c31964a33736b9af9bab37a6d098e011b5ea162e35bcd691\" returns successfully" Apr 12 18:47:52.875050 systemd[1]: cri-containerd-23506f5ccb119329c31964a33736b9af9bab37a6d098e011b5ea162e35bcd691.scope: Deactivated successfully. Apr 12 18:47:52.879000 audit: BPF prog-id=71 op=UNLOAD Apr 12 18:47:53.076567 env[1055]: time="2024-04-12T18:47:53.076457043Z" level=info msg="shim disconnected" id=23506f5ccb119329c31964a33736b9af9bab37a6d098e011b5ea162e35bcd691 Apr 12 18:47:53.077274 env[1055]: time="2024-04-12T18:47:53.077197958Z" level=warning msg="cleaning up after shim disconnected" id=23506f5ccb119329c31964a33736b9af9bab37a6d098e011b5ea162e35bcd691 namespace=k8s.io Apr 12 18:47:53.077456 env[1055]: time="2024-04-12T18:47:53.077420798Z" level=info msg="cleaning up dead shim" Apr 12 18:47:53.101813 env[1055]: time="2024-04-12T18:47:53.099677811Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:47:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1572 runtime=io.containerd.runc.v2\n" Apr 12 18:47:53.731799 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-23506f5ccb119329c31964a33736b9af9bab37a6d098e011b5ea162e35bcd691-rootfs.mount: Deactivated successfully. Apr 12 18:47:53.748739 kubelet[1378]: E0412 18:47:53.748659 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:54.589171 kubelet[1378]: E0412 18:47:54.589111 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7m955" podUID="11ec87fb-2946-4b3a-9964-c58b0a4e068a" Apr 12 18:47:54.749532 kubelet[1378]: E0412 18:47:54.749484 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:54.841739 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount592792964.mount: Deactivated successfully. Apr 12 18:47:55.707528 env[1055]: time="2024-04-12T18:47:55.707466305Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:55.710358 env[1055]: time="2024-04-12T18:47:55.710332958Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5ce97277076c6f5c87d43fec5e3eacad030c82c81b2756d2bba4569d22fc65dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:55.716221 env[1055]: time="2024-04-12T18:47:55.716042281Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:55.719445 env[1055]: time="2024-04-12T18:47:55.719387977Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9e9dd46799712c58e1a49f973374ffa9ad4e5a6175896e5d805a8738bf5c5865,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:55.720090 env[1055]: time="2024-04-12T18:47:55.720061082Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\" returns image reference \"sha256:5ce97277076c6f5c87d43fec5e3eacad030c82c81b2756d2bba4569d22fc65dc\"" Apr 12 18:47:55.721789 env[1055]: time="2024-04-12T18:47:55.721696085Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:47:55.723365 env[1055]: time="2024-04-12T18:47:55.723333733Z" level=info msg="CreateContainer within sandbox \"085e082f0987e34448492e2324dab4f8911c58b6a2b7d3c71508f581ee5be162\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:47:55.740417 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2313461471.mount: Deactivated successfully. Apr 12 18:47:55.745702 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount11737067.mount: Deactivated successfully. Apr 12 18:47:55.750773 kubelet[1378]: E0412 18:47:55.750734 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:55.828679 env[1055]: time="2024-04-12T18:47:55.828593522Z" level=info msg="CreateContainer within sandbox \"085e082f0987e34448492e2324dab4f8911c58b6a2b7d3c71508f581ee5be162\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"10950a40c59fa214580c0bed8c4228df4649af9f6959718fd4c5fd9fbcf14919\"" Apr 12 18:47:55.830368 env[1055]: time="2024-04-12T18:47:55.830277838Z" level=info msg="StartContainer for \"10950a40c59fa214580c0bed8c4228df4649af9f6959718fd4c5fd9fbcf14919\"" Apr 12 18:47:55.884182 systemd[1]: run-containerd-runc-k8s.io-10950a40c59fa214580c0bed8c4228df4649af9f6959718fd4c5fd9fbcf14919-runc.sg1I9P.mount: Deactivated successfully. Apr 12 18:47:55.893134 systemd[1]: Started cri-containerd-10950a40c59fa214580c0bed8c4228df4649af9f6959718fd4c5fd9fbcf14919.scope. Apr 12 18:47:55.914000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.914000 audit[1597]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9294599718 items=0 ppid=1456 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:55.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130393530613430633539666132313435383063306265643863343232 Apr 12 18:47:55.915000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.915000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.915000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.915000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.915000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.915000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.915000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.915000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.915000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.915000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.915000 audit: BPF prog-id=72 op=LOAD Apr 12 18:47:55.915000 audit[1597]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00022c218 items=0 ppid=1456 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:55.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130393530613430633539666132313435383063306265643863343232 Apr 12 18:47:55.915000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.915000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.915000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.915000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.915000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.915000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.915000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.915000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.915000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.915000 audit: BPF prog-id=73 op=LOAD Apr 12 18:47:55.915000 audit[1597]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00022c268 items=0 ppid=1456 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:55.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130393530613430633539666132313435383063306265643863343232 Apr 12 18:47:55.916000 audit: BPF prog-id=73 op=UNLOAD Apr 12 18:47:55.916000 audit: BPF prog-id=72 op=UNLOAD Apr 12 18:47:55.916000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.916000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.916000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.916000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.916000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.916000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.916000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.916000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.916000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.916000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:55.916000 audit: BPF prog-id=74 op=LOAD Apr 12 18:47:55.916000 audit[1597]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00022c2f8 items=0 ppid=1456 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:55.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130393530613430633539666132313435383063306265643863343232 Apr 12 18:47:55.941440 env[1055]: time="2024-04-12T18:47:55.941327454Z" level=info msg="StartContainer for \"10950a40c59fa214580c0bed8c4228df4649af9f6959718fd4c5fd9fbcf14919\" returns successfully" Apr 12 18:47:56.025000 audit[1647]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.025000 audit[1647]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9c1e40c0 a2=0 a3=7fff9c1e40ac items=0 ppid=1607 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.025000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:47:56.029000 audit[1648]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1648 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.029000 audit[1648]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff2393f8b0 a2=0 a3=7fff2393f89c items=0 ppid=1607 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.029000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:47:56.032000 audit[1649]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1649 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.032000 audit[1649]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc429d2d40 a2=0 a3=7ffc429d2d2c items=0 ppid=1607 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.032000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:47:56.033000 audit[1650]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1650 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.033000 audit[1650]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcda2d8260 a2=0 a3=7ffcda2d824c items=0 ppid=1607 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.033000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:47:56.035000 audit[1652]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1652 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.035000 audit[1652]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd42616760 a2=0 a3=7ffd4261674c items=0 ppid=1607 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:47:56.036000 audit[1651]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1651 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.036000 audit[1651]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf515aa60 a2=0 a3=7ffcf515aa4c items=0 ppid=1607 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.036000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:47:56.127000 audit[1653]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1653 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.127000 audit[1653]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcd3a77210 a2=0 a3=7ffcd3a771fc items=0 ppid=1607 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:47:56.133000 audit[1655]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1655 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.133000 audit[1655]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff6e7ac530 a2=0 a3=7fff6e7ac51c items=0 ppid=1607 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.133000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:47:56.142000 audit[1658]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1658 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.142000 audit[1658]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe7fddb610 a2=0 a3=7ffe7fddb5fc items=0 ppid=1607 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.142000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:47:56.146000 audit[1659]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1659 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.146000 audit[1659]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc715178b0 a2=0 a3=7ffc7151789c items=0 ppid=1607 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.146000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:47:56.151000 audit[1661]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1661 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.151000 audit[1661]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd1c9b5060 a2=0 a3=7ffd1c9b504c items=0 ppid=1607 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.151000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:47:56.154000 audit[1662]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1662 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.154000 audit[1662]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb5d9ce40 a2=0 a3=7ffeb5d9ce2c items=0 ppid=1607 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.154000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:47:56.159000 audit[1664]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1664 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.159000 audit[1664]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffa9545670 a2=0 a3=7fffa954565c items=0 ppid=1607 pid=1664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.159000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:47:56.166000 audit[1667]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1667 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.166000 audit[1667]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff880d8360 a2=0 a3=7fff880d834c items=0 ppid=1607 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.166000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:47:56.168000 audit[1668]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1668 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.168000 audit[1668]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf8040060 a2=0 a3=7ffdf804004c items=0 ppid=1607 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:47:56.173000 audit[1670]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1670 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.173000 audit[1670]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd0314f9f0 a2=0 a3=7ffd0314f9dc items=0 ppid=1607 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.173000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:47:56.175000 audit[1671]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1671 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.175000 audit[1671]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa4314410 a2=0 a3=7fffa43143fc items=0 ppid=1607 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.175000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:47:56.180000 audit[1673]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1673 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.180000 audit[1673]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc93d472e0 a2=0 a3=7ffc93d472cc items=0 ppid=1607 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.180000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:47:56.189000 audit[1676]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1676 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.189000 audit[1676]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffccdedae90 a2=0 a3=7ffccdedae7c items=0 ppid=1607 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.189000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:47:56.197000 audit[1679]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1679 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.197000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeecc952e0 a2=0 a3=7ffeecc952cc items=0 ppid=1607 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.197000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:47:56.200000 audit[1680]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1680 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.200000 audit[1680]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffef024e0d0 a2=0 a3=7ffef024e0bc items=0 ppid=1607 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.200000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:47:56.206000 audit[1682]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1682 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.206000 audit[1682]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffa8795cc0 a2=0 a3=7fffa8795cac items=0 ppid=1607 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:47:56.258000 audit[1687]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.258000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffff09bbe50 a2=0 a3=7ffff09bbe3c items=0 ppid=1607 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.258000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:47:56.260000 audit[1688]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.260000 audit[1688]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcfa68a6c0 a2=0 a3=7ffcfa68a6ac items=0 ppid=1607 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.260000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:47:56.263000 audit[1690]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:47:56.263000 audit[1690]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd508c2e90 a2=0 a3=7ffd508c2e7c items=0 ppid=1607 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.263000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:47:56.277000 audit[1696]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:56.277000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffdfc0a440 a2=0 a3=7fffdfc0a42c items=0 ppid=1607 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.277000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:56.314000 audit[1696]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:56.314000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=25476 a0=3 a1=7fffdfc0a440 a2=0 a3=7fffdfc0a42c items=0 ppid=1607 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.314000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:56.338000 audit[1704]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.338000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffed0f30570 a2=0 a3=7ffed0f3055c items=0 ppid=1607 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.338000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:47:56.342000 audit[1706]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.342000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd70f6f170 a2=0 a3=7ffd70f6f15c items=0 ppid=1607 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.342000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:47:56.346000 audit[1709]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.346000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcb064bbb0 a2=0 a3=7ffcb064bb9c items=0 ppid=1607 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.346000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:47:56.347000 audit[1710]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.347000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3dabede0 a2=0 a3=7ffc3dabedcc items=0 ppid=1607 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.347000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:47:56.350000 audit[1712]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.350000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd40209660 a2=0 a3=7ffd4020964c items=0 ppid=1607 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.350000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:47:56.351000 audit[1713]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.351000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff18b9090 a2=0 a3=7ffff18b907c items=0 ppid=1607 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.351000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:47:56.354000 audit[1715]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1715 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.354000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffab3159b0 a2=0 a3=7fffab31599c items=0 ppid=1607 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.354000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:47:56.358000 audit[1718]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.358000 audit[1718]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff572fc7f0 a2=0 a3=7fff572fc7dc items=0 ppid=1607 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.358000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:47:56.359000 audit[1719]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.359000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbb5155a0 a2=0 a3=7fffbb51558c items=0 ppid=1607 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.359000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:47:56.362000 audit[1721]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1721 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.362000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcfecd9ed0 a2=0 a3=7ffcfecd9ebc items=0 ppid=1607 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.362000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:47:56.364000 audit[1722]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.364000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca12a0350 a2=0 a3=7ffca12a033c items=0 ppid=1607 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.364000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:47:56.367000 audit[1724]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1724 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.367000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffee47a5e20 a2=0 a3=7ffee47a5e0c items=0 ppid=1607 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.367000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:47:56.371000 audit[1727]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1727 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.371000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffca3c05b30 a2=0 a3=7ffca3c05b1c items=0 ppid=1607 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.371000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:47:56.375000 audit[1730]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.375000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffdcce01e0 a2=0 a3=7fffdcce01cc items=0 ppid=1607 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.375000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:47:56.377000 audit[1731]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.377000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdd65422a0 a2=0 a3=7ffdd654228c items=0 ppid=1607 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.377000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:47:56.379000 audit[1733]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.379000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe9f250070 a2=0 a3=7ffe9f25005c items=0 ppid=1607 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.379000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:47:56.383000 audit[1736]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.383000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe5c4fde10 a2=0 a3=7ffe5c4fddfc items=0 ppid=1607 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.383000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:47:56.384000 audit[1737]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.384000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffceb2292b0 a2=0 a3=7ffceb22929c items=0 ppid=1607 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.384000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:47:56.387000 audit[1739]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.387000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcf9abccc0 a2=0 a3=7ffcf9abccac items=0 ppid=1607 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.387000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:47:56.388000 audit[1740]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.388000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccb91de70 a2=0 a3=7ffccb91de5c items=0 ppid=1607 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.388000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:47:56.393000 audit[1742]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.393000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff6ce76b90 a2=0 a3=7fff6ce76b7c items=0 ppid=1607 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.393000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:47:56.397000 audit[1745]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:47:56.397000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff3f94d2f0 a2=0 a3=7fff3f94d2dc items=0 ppid=1607 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.397000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:47:56.400000 audit[1747]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:47:56.400000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffd498c6a00 a2=0 a3=7ffd498c69ec items=0 ppid=1607 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.400000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:56.401000 audit[1747]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:47:56.401000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd498c6a00 a2=0 a3=7ffd498c69ec items=0 ppid=1607 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:56.401000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:56.594877 kubelet[1378]: E0412 18:47:56.589279 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7m955" podUID="11ec87fb-2946-4b3a-9964-c58b0a4e068a" Apr 12 18:47:56.667124 kubelet[1378]: I0412 18:47:56.666996 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-p2kpq" podStartSLOduration=3.120790108 podCreationTimestamp="2024-04-12 18:47:48 +0000 UTC" firstStartedPulling="2024-04-12 18:47:50.174356322 +0000 UTC m=+3.994194268" lastFinishedPulling="2024-04-12 18:47:55.720430117 +0000 UTC m=+9.540268053" observedRunningTime="2024-04-12 18:47:56.666462228 +0000 UTC m=+10.486300214" watchObservedRunningTime="2024-04-12 18:47:56.666863893 +0000 UTC m=+10.486701879" Apr 12 18:47:56.751606 kubelet[1378]: E0412 18:47:56.751505 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:57.093996 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3969895968.mount: Deactivated successfully. Apr 12 18:47:57.752492 kubelet[1378]: E0412 18:47:57.752447 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:58.589275 kubelet[1378]: E0412 18:47:58.589237 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7m955" podUID="11ec87fb-2946-4b3a-9964-c58b0a4e068a" Apr 12 18:47:58.753515 kubelet[1378]: E0412 18:47:58.753471 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:47:59.754101 kubelet[1378]: E0412 18:47:59.754001 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:00.588922 kubelet[1378]: E0412 18:48:00.588702 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7m955" podUID="11ec87fb-2946-4b3a-9964-c58b0a4e068a" Apr 12 18:48:00.755594 kubelet[1378]: E0412 18:48:00.755536 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:01.756264 kubelet[1378]: E0412 18:48:01.756209 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:02.589898 kubelet[1378]: E0412 18:48:02.589449 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7m955" podUID="11ec87fb-2946-4b3a-9964-c58b0a4e068a" Apr 12 18:48:02.643798 env[1055]: time="2024-04-12T18:48:02.643604130Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:02.646911 env[1055]: time="2024-04-12T18:48:02.646852106Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:02.650801 env[1055]: time="2024-04-12T18:48:02.650768379Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:02.655630 env[1055]: time="2024-04-12T18:48:02.655606047Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:02.657909 env[1055]: time="2024-04-12T18:48:02.657836868Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\"" Apr 12 18:48:02.662575 env[1055]: time="2024-04-12T18:48:02.662539742Z" level=info msg="CreateContainer within sandbox \"8b48ce92a4c749d3d4f0afd1d7aa54570b14efedc54893877977b2536bd527ea\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:48:02.681613 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1503435029.mount: Deactivated successfully. Apr 12 18:48:02.688685 env[1055]: time="2024-04-12T18:48:02.688639895Z" level=info msg="CreateContainer within sandbox \"8b48ce92a4c749d3d4f0afd1d7aa54570b14efedc54893877977b2536bd527ea\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"37c7f44d93fcc9507121cd415ab87b8be69b5a3c89df44db267ee0fd0f238b57\"" Apr 12 18:48:02.689995 env[1055]: time="2024-04-12T18:48:02.689970393Z" level=info msg="StartContainer for \"37c7f44d93fcc9507121cd415ab87b8be69b5a3c89df44db267ee0fd0f238b57\"" Apr 12 18:48:02.732287 systemd[1]: Started cri-containerd-37c7f44d93fcc9507121cd415ab87b8be69b5a3c89df44db267ee0fd0f238b57.scope. Apr 12 18:48:02.758864 kubelet[1378]: E0412 18:48:02.758834 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:02.768755 kernel: kauditd_printk_skb: 230 callbacks suppressed Apr 12 18:48:02.768832 kernel: audit: type=1400 audit(1712947682.758:612): avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.768859 kernel: audit: type=1300 audit(1712947682.758:612): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f65e7d9e2f8 items=0 ppid=1457 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:02.758000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.758000 audit[1756]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f65e7d9e2f8 items=0 ppid=1457 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:02.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337633766343464393366636339353037313231636434313561623837 Apr 12 18:48:02.774796 kernel: audit: type=1327 audit(1712947682.758:612): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337633766343464393366636339353037313231636434313561623837 Apr 12 18:48:02.758000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.778736 kernel: audit: type=1400 audit(1712947682.758:613): avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.758000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.758000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.787423 kernel: audit: type=1400 audit(1712947682.758:613): avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.787495 kernel: audit: type=1400 audit(1712947682.758:613): avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.787514 kernel: audit: type=1400 audit(1712947682.758:613): avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.758000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.795830 kernel: audit: type=1400 audit(1712947682.758:613): avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.795939 kernel: audit: type=1400 audit(1712947682.758:613): avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.758000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.758000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.758000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.800861 kernel: audit: type=1400 audit(1712947682.758:613): avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.758000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.758000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.758000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.758000 audit: BPF prog-id=75 op=LOAD Apr 12 18:48:02.758000 audit[1756]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000025098 items=0 ppid=1457 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:02.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337633766343464393366636339353037313231636434313561623837 Apr 12 18:48:02.767000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.767000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.767000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.767000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.767000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.767000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.767000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.767000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.767000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.767000 audit: BPF prog-id=76 op=LOAD Apr 12 18:48:02.767000 audit[1756]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0000250e8 items=0 ppid=1457 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:02.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337633766343464393366636339353037313231636434313561623837 Apr 12 18:48:02.767000 audit: BPF prog-id=76 op=UNLOAD Apr 12 18:48:02.767000 audit: BPF prog-id=75 op=UNLOAD Apr 12 18:48:02.767000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.767000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.767000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.767000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.767000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.767000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.767000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.767000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.767000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.767000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:02.767000 audit: BPF prog-id=77 op=LOAD Apr 12 18:48:02.767000 audit[1756]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000025178 items=0 ppid=1457 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:02.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337633766343464393366636339353037313231636434313561623837 Apr 12 18:48:02.807105 env[1055]: time="2024-04-12T18:48:02.807042940Z" level=info msg="StartContainer for \"37c7f44d93fcc9507121cd415ab87b8be69b5a3c89df44db267ee0fd0f238b57\" returns successfully" Apr 12 18:48:03.770303 kubelet[1378]: E0412 18:48:03.770167 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:04.422145 env[1055]: time="2024-04-12T18:48:04.421989567Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:48:04.426099 systemd[1]: cri-containerd-37c7f44d93fcc9507121cd415ab87b8be69b5a3c89df44db267ee0fd0f238b57.scope: Deactivated successfully. Apr 12 18:48:04.427000 audit: BPF prog-id=77 op=UNLOAD Apr 12 18:48:04.452428 kubelet[1378]: I0412 18:48:04.452339 1378 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 18:48:04.475259 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-37c7f44d93fcc9507121cd415ab87b8be69b5a3c89df44db267ee0fd0f238b57-rootfs.mount: Deactivated successfully. Apr 12 18:48:04.600222 systemd[1]: Created slice kubepods-besteffort-pod11ec87fb_2946_4b3a_9964_c58b0a4e068a.slice. Apr 12 18:48:04.835315 kubelet[1378]: E0412 18:48:04.771310 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:04.837786 env[1055]: time="2024-04-12T18:48:04.837066696Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7m955,Uid:11ec87fb-2946-4b3a-9964-c58b0a4e068a,Namespace:calico-system,Attempt:0,}" Apr 12 18:48:05.075026 env[1055]: time="2024-04-12T18:48:05.074940268Z" level=info msg="shim disconnected" id=37c7f44d93fcc9507121cd415ab87b8be69b5a3c89df44db267ee0fd0f238b57 Apr 12 18:48:05.075362 env[1055]: time="2024-04-12T18:48:05.075314768Z" level=warning msg="cleaning up after shim disconnected" id=37c7f44d93fcc9507121cd415ab87b8be69b5a3c89df44db267ee0fd0f238b57 namespace=k8s.io Apr 12 18:48:05.075556 env[1055]: time="2024-04-12T18:48:05.075490637Z" level=info msg="cleaning up dead shim" Apr 12 18:48:05.115066 env[1055]: time="2024-04-12T18:48:05.114883509Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:48:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1797 runtime=io.containerd.runc.v2\n" Apr 12 18:48:05.206721 env[1055]: time="2024-04-12T18:48:05.206577836Z" level=error msg="Failed to destroy network for sandbox \"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:48:05.209858 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886-shm.mount: Deactivated successfully. Apr 12 18:48:05.211679 env[1055]: time="2024-04-12T18:48:05.211507030Z" level=error msg="encountered an error cleaning up failed sandbox \"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:48:05.211851 env[1055]: time="2024-04-12T18:48:05.211772697Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7m955,Uid:11ec87fb-2946-4b3a-9964-c58b0a4e068a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:48:05.212535 kubelet[1378]: E0412 18:48:05.212155 1378 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:48:05.212535 kubelet[1378]: E0412 18:48:05.212217 1378 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7m955" Apr 12 18:48:05.212535 kubelet[1378]: E0412 18:48:05.212243 1378 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7m955" Apr 12 18:48:05.212679 kubelet[1378]: E0412 18:48:05.212304 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-7m955_calico-system(11ec87fb-2946-4b3a-9964-c58b0a4e068a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-7m955_calico-system(11ec87fb-2946-4b3a-9964-c58b0a4e068a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7m955" podUID="11ec87fb-2946-4b3a-9964-c58b0a4e068a" Apr 12 18:48:05.668945 kubelet[1378]: I0412 18:48:05.668900 1378 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Apr 12 18:48:05.670455 env[1055]: time="2024-04-12T18:48:05.670366062Z" level=info msg="StopPodSandbox for \"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\"" Apr 12 18:48:05.677692 env[1055]: time="2024-04-12T18:48:05.677634980Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:48:05.742478 env[1055]: time="2024-04-12T18:48:05.742371510Z" level=error msg="StopPodSandbox for \"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\" failed" error="failed to destroy network for sandbox \"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:48:05.743047 kubelet[1378]: E0412 18:48:05.742941 1378 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Apr 12 18:48:05.743177 kubelet[1378]: E0412 18:48:05.743130 1378 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886"} Apr 12 18:48:05.743251 kubelet[1378]: E0412 18:48:05.743233 1378 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"11ec87fb-2946-4b3a-9964-c58b0a4e068a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:48:05.743397 kubelet[1378]: E0412 18:48:05.743314 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"11ec87fb-2946-4b3a-9964-c58b0a4e068a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7m955" podUID="11ec87fb-2946-4b3a-9964-c58b0a4e068a" Apr 12 18:48:05.772275 kubelet[1378]: E0412 18:48:05.772200 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:06.742079 kubelet[1378]: E0412 18:48:06.741983 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:06.773434 kubelet[1378]: E0412 18:48:06.773352 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:07.773873 kubelet[1378]: E0412 18:48:07.773785 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:08.656280 kubelet[1378]: I0412 18:48:08.656216 1378 topology_manager.go:215] "Topology Admit Handler" podUID="c12468c8-15ca-4c5f-970c-115acc5f7541" podNamespace="default" podName="nginx-deployment-6d5f899847-cj5xd" Apr 12 18:48:08.666502 systemd[1]: Created slice kubepods-besteffort-podc12468c8_15ca_4c5f_970c_115acc5f7541.slice. Apr 12 18:48:08.774190 kubelet[1378]: E0412 18:48:08.774100 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:08.806047 kubelet[1378]: I0412 18:48:08.805954 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xx295\" (UniqueName: \"kubernetes.io/projected/c12468c8-15ca-4c5f-970c-115acc5f7541-kube-api-access-xx295\") pod \"nginx-deployment-6d5f899847-cj5xd\" (UID: \"c12468c8-15ca-4c5f-970c-115acc5f7541\") " pod="default/nginx-deployment-6d5f899847-cj5xd" Apr 12 18:48:08.977541 env[1055]: time="2024-04-12T18:48:08.975993436Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-cj5xd,Uid:c12468c8-15ca-4c5f-970c-115acc5f7541,Namespace:default,Attempt:0,}" Apr 12 18:48:09.207830 env[1055]: time="2024-04-12T18:48:09.207749962Z" level=error msg="Failed to destroy network for sandbox \"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:48:09.209738 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba-shm.mount: Deactivated successfully. Apr 12 18:48:09.210836 env[1055]: time="2024-04-12T18:48:09.210778561Z" level=error msg="encountered an error cleaning up failed sandbox \"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:48:09.210910 env[1055]: time="2024-04-12T18:48:09.210863101Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-cj5xd,Uid:c12468c8-15ca-4c5f-970c-115acc5f7541,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:48:09.211576 kubelet[1378]: E0412 18:48:09.211168 1378 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:48:09.211576 kubelet[1378]: E0412 18:48:09.211230 1378 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-cj5xd" Apr 12 18:48:09.211576 kubelet[1378]: E0412 18:48:09.211259 1378 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-cj5xd" Apr 12 18:48:09.211798 kubelet[1378]: E0412 18:48:09.211346 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-cj5xd_default(c12468c8-15ca-4c5f-970c-115acc5f7541)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-cj5xd_default(c12468c8-15ca-4c5f-970c-115acc5f7541)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-cj5xd" podUID="c12468c8-15ca-4c5f-970c-115acc5f7541" Apr 12 18:48:09.687404 kubelet[1378]: I0412 18:48:09.687303 1378 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Apr 12 18:48:09.689101 env[1055]: time="2024-04-12T18:48:09.689038993Z" level=info msg="StopPodSandbox for \"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\"" Apr 12 18:48:09.746045 env[1055]: time="2024-04-12T18:48:09.745940822Z" level=error msg="StopPodSandbox for \"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\" failed" error="failed to destroy network for sandbox \"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:48:09.746783 kubelet[1378]: E0412 18:48:09.746646 1378 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Apr 12 18:48:09.747236 kubelet[1378]: E0412 18:48:09.746981 1378 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba"} Apr 12 18:48:09.747236 kubelet[1378]: E0412 18:48:09.747096 1378 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c12468c8-15ca-4c5f-970c-115acc5f7541\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:48:09.747236 kubelet[1378]: E0412 18:48:09.747180 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c12468c8-15ca-4c5f-970c-115acc5f7541\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-cj5xd" podUID="c12468c8-15ca-4c5f-970c-115acc5f7541" Apr 12 18:48:09.774748 kubelet[1378]: E0412 18:48:09.774630 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:10.775382 kubelet[1378]: E0412 18:48:10.775228 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:10.806140 update_engine[1049]: I0412 18:48:10.804296 1049 update_attempter.cc:509] Updating boot flags... Apr 12 18:48:11.777448 kubelet[1378]: E0412 18:48:11.777366 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:12.779554 kubelet[1378]: E0412 18:48:12.779488 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:13.780557 kubelet[1378]: E0412 18:48:13.780494 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:14.781410 kubelet[1378]: E0412 18:48:14.781359 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:15.407000 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2928533107.mount: Deactivated successfully. Apr 12 18:48:15.752289 env[1055]: time="2024-04-12T18:48:15.752082766Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:15.758177 env[1055]: time="2024-04-12T18:48:15.758123426Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:15.763659 env[1055]: time="2024-04-12T18:48:15.763596960Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:15.768161 env[1055]: time="2024-04-12T18:48:15.768069005Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:15.771795 env[1055]: time="2024-04-12T18:48:15.770461087Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\"" Apr 12 18:48:15.781865 kubelet[1378]: E0412 18:48:15.781814 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:15.815789 env[1055]: time="2024-04-12T18:48:15.813594271Z" level=info msg="CreateContainer within sandbox \"8b48ce92a4c749d3d4f0afd1d7aa54570b14efedc54893877977b2536bd527ea\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:48:15.842623 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount51475079.mount: Deactivated successfully. Apr 12 18:48:15.860896 env[1055]: time="2024-04-12T18:48:15.860798288Z" level=info msg="CreateContainer within sandbox \"8b48ce92a4c749d3d4f0afd1d7aa54570b14efedc54893877977b2536bd527ea\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"a8b44934da11f5d8b31b40d89c060ca1fe15668940f9e5deda4028c06384467c\"" Apr 12 18:48:15.862377 env[1055]: time="2024-04-12T18:48:15.862314170Z" level=info msg="StartContainer for \"a8b44934da11f5d8b31b40d89c060ca1fe15668940f9e5deda4028c06384467c\"" Apr 12 18:48:15.893276 systemd[1]: Started cri-containerd-a8b44934da11f5d8b31b40d89c060ca1fe15668940f9e5deda4028c06384467c.scope. Apr 12 18:48:15.911000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.914583 kernel: kauditd_printk_skb: 34 callbacks suppressed Apr 12 18:48:15.914660 kernel: audit: type=1400 audit(1712947695.911:619): avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.911000 audit[1937]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f85a954c808 items=0 ppid=1457 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:15.923115 kernel: audit: type=1300 audit(1712947695.911:619): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f85a954c808 items=0 ppid=1457 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:15.923165 kernel: audit: type=1327 audit(1712947695.911:619): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138623434393334646131316635643862333162343064383963303630 Apr 12 18:48:15.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138623434393334646131316635643862333162343064383963303630 Apr 12 18:48:15.911000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.930946 kernel: audit: type=1400 audit(1712947695.911:620): avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.930995 kernel: audit: type=1400 audit(1712947695.911:620): avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.911000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.911000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.937602 kernel: audit: type=1400 audit(1712947695.911:620): avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.941185 kernel: audit: type=1400 audit(1712947695.911:620): avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.941268 kernel: audit: type=1400 audit(1712947695.911:620): avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.911000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.911000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.911000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.948831 kernel: audit: type=1400 audit(1712947695.911:620): avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.948965 kernel: audit: type=1400 audit(1712947695.911:620): avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.911000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.911000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.911000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.911000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.911000 audit: BPF prog-id=78 op=LOAD Apr 12 18:48:15.911000 audit[1937]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003a81f8 items=0 ppid=1457 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:15.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138623434393334646131316635643862333162343064383963303630 Apr 12 18:48:15.916000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.916000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.916000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.916000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.916000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.916000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.916000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.916000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.916000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.916000 audit: BPF prog-id=79 op=LOAD Apr 12 18:48:15.916000 audit[1937]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0003a8248 items=0 ppid=1457 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:15.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138623434393334646131316635643862333162343064383963303630 Apr 12 18:48:15.926000 audit: BPF prog-id=79 op=UNLOAD Apr 12 18:48:15.926000 audit: BPF prog-id=78 op=UNLOAD Apr 12 18:48:15.926000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.926000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.926000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.926000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.926000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.926000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.926000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.926000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.926000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.926000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:15.926000 audit: BPF prog-id=80 op=LOAD Apr 12 18:48:15.926000 audit[1937]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003a82d8 items=0 ppid=1457 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:15.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138623434393334646131316635643862333162343064383963303630 Apr 12 18:48:15.973653 env[1055]: time="2024-04-12T18:48:15.973606990Z" level=info msg="StartContainer for \"a8b44934da11f5d8b31b40d89c060ca1fe15668940f9e5deda4028c06384467c\" returns successfully" Apr 12 18:48:16.064966 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:48:16.065177 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:48:16.740096 systemd[1]: run-containerd-runc-k8s.io-a8b44934da11f5d8b31b40d89c060ca1fe15668940f9e5deda4028c06384467c-runc.CiedHa.mount: Deactivated successfully. Apr 12 18:48:16.782523 kubelet[1378]: E0412 18:48:16.782422 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:17.581000 audit[2059]: AVC avc: denied { write } for pid=2059 comm="tee" name="fd" dev="proc" ino=18859 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:48:17.585000 audit[2065]: AVC avc: denied { write } for pid=2065 comm="tee" name="fd" dev="proc" ino=18865 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:48:17.586000 audit[2070]: AVC avc: denied { write } for pid=2070 comm="tee" name="fd" dev="proc" ino=18868 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:48:17.581000 audit[2059]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9d732979 a2=241 a3=1b6 items=1 ppid=2034 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:17.581000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:48:17.581000 audit: PATH item=0 name="/dev/fd/63" inode=18279 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:17.581000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:48:17.585000 audit[2065]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc6d0fe978 a2=241 a3=1b6 items=1 ppid=2030 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:17.585000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:48:17.585000 audit: PATH item=0 name="/dev/fd/63" inode=18850 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:17.585000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:48:17.595000 audit[2072]: AVC avc: denied { write } for pid=2072 comm="tee" name="fd" dev="proc" ino=18879 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:48:17.596000 audit[2084]: AVC avc: denied { write } for pid=2084 comm="tee" name="fd" dev="proc" ino=18882 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:48:17.586000 audit[2070]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffefd80e977 a2=241 a3=1b6 items=1 ppid=2036 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:17.586000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:48:17.586000 audit: PATH item=0 name="/dev/fd/63" inode=18285 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:17.586000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:48:17.597000 audit[2078]: AVC avc: denied { write } for pid=2078 comm="tee" name="fd" dev="proc" ino=18295 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:48:17.595000 audit[2072]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcccb4e977 a2=241 a3=1b6 items=1 ppid=2027 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:17.595000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:48:17.595000 audit: PATH item=0 name="/dev/fd/63" inode=18851 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:17.595000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:48:17.597000 audit[2078]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe53135967 a2=241 a3=1b6 items=1 ppid=2024 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:17.597000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:48:17.597000 audit: PATH item=0 name="/dev/fd/63" inode=18854 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:17.597000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:48:17.599000 audit[2089]: AVC avc: denied { write } for pid=2089 comm="tee" name="fd" dev="proc" ino=18299 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:48:17.599000 audit[2089]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef976e977 a2=241 a3=1b6 items=1 ppid=2028 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:17.599000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:48:17.599000 audit: PATH item=0 name="/dev/fd/63" inode=18862 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:17.599000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:48:17.596000 audit[2084]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee3e2f968 a2=241 a3=1b6 items=1 ppid=2025 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:17.596000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:48:17.596000 audit: PATH item=0 name="/dev/fd/63" inode=18289 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:17.596000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:48:17.738279 systemd[1]: run-containerd-runc-k8s.io-a8b44934da11f5d8b31b40d89c060ca1fe15668940f9e5deda4028c06384467c-runc.Q1aZIQ.mount: Deactivated successfully. Apr 12 18:48:17.783819 kubelet[1378]: E0412 18:48:17.783730 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:17.863097 kernel: Initializing XFRM netlink socket Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit: BPF prog-id=81 op=LOAD Apr 12 18:48:18.045000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6c6dea30 a2=70 a3=7f0e56379000 items=0 ppid=2033 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:18.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:48:18.045000 audit: BPF prog-id=81 op=UNLOAD Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit: BPF prog-id=82 op=LOAD Apr 12 18:48:18.045000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6c6dea30 a2=70 a3=6f items=0 ppid=2033 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:18.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:48:18.045000 audit: BPF prog-id=82 op=UNLOAD Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff6c6de9e0 a2=70 a3=470860 items=0 ppid=2033 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:18.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit: BPF prog-id=83 op=LOAD Apr 12 18:48:18.045000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff6c6de9c0 a2=70 a3=7fff6c6dea30 items=0 ppid=2033 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:18.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:48:18.045000 audit: BPF prog-id=83 op=UNLOAD Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6c6deaa0 a2=70 a3=0 items=0 ppid=2033 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:18.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:48:18.045000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.045000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6c6dea90 a2=70 a3=0 items=0 ppid=2033 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:18.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:48:18.046000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.046000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6c6dea00 a2=70 a3=0 items=0 ppid=2033 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:18.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:48:18.046000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.046000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff6c6dead0 a2=70 a3=fe00 items=0 ppid=2033 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:18.046000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:48:18.047000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.047000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff6c6dead0 a2=70 a3=fe00 items=0 ppid=2033 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:18.047000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:48:18.047000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.047000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.047000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.047000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.047000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.047000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.047000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.047000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.047000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.047000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.047000 audit: BPF prog-id=84 op=LOAD Apr 12 18:48:18.047000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff6c6de9f0 a2=70 a3=0 items=0 ppid=2033 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:18.047000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:48:18.053000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.053000 audit[2187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdfb13a090 a2=70 a3=ffff items=0 ppid=2033 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:18.053000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:48:18.055000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:18.055000 audit[2187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdfb139f60 a2=70 a3=3 items=0 ppid=2033 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:18.055000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:48:18.065000 audit: BPF prog-id=84 op=UNLOAD Apr 12 18:48:18.145000 audit[2205]: NETFILTER_CFG table=raw:65 family=2 entries=19 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:48:18.145000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7fffaf2592f0 a2=0 a3=7fffaf2592dc items=0 ppid=2033 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:18.145000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:48:18.156000 audit[2213]: NETFILTER_CFG table=mangle:66 family=2 entries=16 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:48:18.156000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe5d801c90 a2=0 a3=7ffe5d801c7c items=0 ppid=2033 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:18.156000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:48:18.165000 audit[2212]: NETFILTER_CFG table=nat:67 family=2 entries=15 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:48:18.165000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd4ac01cd0 a2=0 a3=7ffd4ac01cbc items=0 ppid=2033 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:18.165000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:48:18.173000 audit[2215]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:48:18.173000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe70edbca0 a2=0 a3=7ffe70edbc8c items=0 ppid=2033 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:18.173000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:48:18.784362 kubelet[1378]: E0412 18:48:18.784262 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:18.923320 systemd-networkd[972]: vxlan.calico: Link UP Apr 12 18:48:18.923341 systemd-networkd[972]: vxlan.calico: Gained carrier Apr 12 18:48:19.786413 kubelet[1378]: E0412 18:48:19.786312 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:20.287038 systemd-networkd[972]: vxlan.calico: Gained IPv6LL Apr 12 18:48:20.591092 env[1055]: time="2024-04-12T18:48:20.590332499Z" level=info msg="StopPodSandbox for \"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\"" Apr 12 18:48:20.592030 env[1055]: time="2024-04-12T18:48:20.590412245Z" level=info msg="StopPodSandbox for \"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\"" Apr 12 18:48:20.786859 kubelet[1378]: E0412 18:48:20.786784 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:20.793175 kubelet[1378]: I0412 18:48:20.792322 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-2pns4" podStartSLOduration=7.189485306 podCreationTimestamp="2024-04-12 18:47:48 +0000 UTC" firstStartedPulling="2024-04-12 18:47:50.169796546 +0000 UTC m=+3.989634492" lastFinishedPulling="2024-04-12 18:48:15.772482945 +0000 UTC m=+29.592320931" observedRunningTime="2024-04-12 18:48:16.736765255 +0000 UTC m=+30.556603221" watchObservedRunningTime="2024-04-12 18:48:20.792171745 +0000 UTC m=+34.612009731" Apr 12 18:48:20.923181 env[1055]: 2024-04-12 18:48:20.796 [INFO][2258] k8s.go 585: Cleaning up netns ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Apr 12 18:48:20.923181 env[1055]: 2024-04-12 18:48:20.796 [INFO][2258] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" iface="eth0" netns="/var/run/netns/cni-bf2206e6-8da1-b43b-b688-d96e93fd2158" Apr 12 18:48:20.923181 env[1055]: 2024-04-12 18:48:20.797 [INFO][2258] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" iface="eth0" netns="/var/run/netns/cni-bf2206e6-8da1-b43b-b688-d96e93fd2158" Apr 12 18:48:20.923181 env[1055]: 2024-04-12 18:48:20.798 [INFO][2258] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" iface="eth0" netns="/var/run/netns/cni-bf2206e6-8da1-b43b-b688-d96e93fd2158" Apr 12 18:48:20.923181 env[1055]: 2024-04-12 18:48:20.798 [INFO][2258] k8s.go 592: Releasing IP address(es) ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Apr 12 18:48:20.923181 env[1055]: 2024-04-12 18:48:20.798 [INFO][2258] utils.go 188: Calico CNI releasing IP address ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Apr 12 18:48:20.923181 env[1055]: 2024-04-12 18:48:20.853 [INFO][2271] ipam_plugin.go 415: Releasing address using handleID ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" HandleID="k8s-pod-network.3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Workload="172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0" Apr 12 18:48:20.923181 env[1055]: 2024-04-12 18:48:20.853 [INFO][2271] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:48:20.923181 env[1055]: 2024-04-12 18:48:20.853 [INFO][2271] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:48:20.923181 env[1055]: 2024-04-12 18:48:20.912 [WARNING][2271] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" HandleID="k8s-pod-network.3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Workload="172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0" Apr 12 18:48:20.923181 env[1055]: 2024-04-12 18:48:20.913 [INFO][2271] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" HandleID="k8s-pod-network.3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Workload="172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0" Apr 12 18:48:20.923181 env[1055]: 2024-04-12 18:48:20.916 [INFO][2271] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:48:20.923181 env[1055]: 2024-04-12 18:48:20.919 [INFO][2258] k8s.go 598: Teardown processing complete. ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Apr 12 18:48:20.926301 env[1055]: time="2024-04-12T18:48:20.926108633Z" level=info msg="TearDown network for sandbox \"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\" successfully" Apr 12 18:48:20.926567 env[1055]: time="2024-04-12T18:48:20.926489520Z" level=info msg="StopPodSandbox for \"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\" returns successfully" Apr 12 18:48:20.928319 systemd[1]: run-netns-cni\x2dbf2206e6\x2d8da1\x2db43b\x2db688\x2dd96e93fd2158.mount: Deactivated successfully. Apr 12 18:48:20.931267 env[1055]: time="2024-04-12T18:48:20.931187324Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-cj5xd,Uid:c12468c8-15ca-4c5f-970c-115acc5f7541,Namespace:default,Attempt:1,}" Apr 12 18:48:21.023899 env[1055]: 2024-04-12 18:48:20.804 [INFO][2259] k8s.go 585: Cleaning up netns ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Apr 12 18:48:21.023899 env[1055]: 2024-04-12 18:48:20.805 [INFO][2259] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" iface="eth0" netns="/var/run/netns/cni-c0f007fe-db47-e019-e867-aeccd85ac6d6" Apr 12 18:48:21.023899 env[1055]: 2024-04-12 18:48:20.808 [INFO][2259] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" iface="eth0" netns="/var/run/netns/cni-c0f007fe-db47-e019-e867-aeccd85ac6d6" Apr 12 18:48:21.023899 env[1055]: 2024-04-12 18:48:20.809 [INFO][2259] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" iface="eth0" netns="/var/run/netns/cni-c0f007fe-db47-e019-e867-aeccd85ac6d6" Apr 12 18:48:21.023899 env[1055]: 2024-04-12 18:48:20.809 [INFO][2259] k8s.go 592: Releasing IP address(es) ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Apr 12 18:48:21.023899 env[1055]: 2024-04-12 18:48:20.809 [INFO][2259] utils.go 188: Calico CNI releasing IP address ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Apr 12 18:48:21.023899 env[1055]: 2024-04-12 18:48:20.867 [INFO][2275] ipam_plugin.go 415: Releasing address using handleID ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" HandleID="k8s-pod-network.63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Workload="172.24.4.121-k8s-csi--node--driver--7m955-eth0" Apr 12 18:48:21.023899 env[1055]: 2024-04-12 18:48:20.867 [INFO][2275] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:48:21.023899 env[1055]: 2024-04-12 18:48:20.916 [INFO][2275] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:48:21.023899 env[1055]: 2024-04-12 18:48:20.973 [WARNING][2275] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" HandleID="k8s-pod-network.63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Workload="172.24.4.121-k8s-csi--node--driver--7m955-eth0" Apr 12 18:48:21.023899 env[1055]: 2024-04-12 18:48:21.009 [INFO][2275] ipam_plugin.go 443: Releasing address using workloadID ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" HandleID="k8s-pod-network.63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Workload="172.24.4.121-k8s-csi--node--driver--7m955-eth0" Apr 12 18:48:21.023899 env[1055]: 2024-04-12 18:48:21.014 [INFO][2275] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:48:21.023899 env[1055]: 2024-04-12 18:48:21.020 [INFO][2259] k8s.go 598: Teardown processing complete. ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Apr 12 18:48:21.023899 env[1055]: time="2024-04-12T18:48:21.023493648Z" level=info msg="TearDown network for sandbox \"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\" successfully" Apr 12 18:48:21.023899 env[1055]: time="2024-04-12T18:48:21.023560547Z" level=info msg="StopPodSandbox for \"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\" returns successfully" Apr 12 18:48:21.027260 env[1055]: time="2024-04-12T18:48:21.027162799Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7m955,Uid:11ec87fb-2946-4b3a-9964-c58b0a4e068a,Namespace:calico-system,Attempt:1,}" Apr 12 18:48:21.028770 systemd[1]: run-netns-cni\x2dc0f007fe\x2ddb47\x2de019\x2de867\x2daeccd85ac6d6.mount: Deactivated successfully. Apr 12 18:48:21.691218 systemd-networkd[972]: cali2bf92ca3627: Link UP Apr 12 18:48:21.697608 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:48:21.698273 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2bf92ca3627: link becomes ready Apr 12 18:48:21.698409 systemd-networkd[972]: cali2bf92ca3627: Gained carrier Apr 12 18:48:21.787762 kubelet[1378]: E0412 18:48:21.787518 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:21.808046 env[1055]: 2024-04-12 18:48:21.507 [INFO][2291] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.121-k8s-csi--node--driver--7m955-eth0 csi-node-driver- calico-system 11ec87fb-2946-4b3a-9964-c58b0a4e068a 973 0 2024-04-12 18:47:48 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.121 csi-node-driver-7m955 eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali2bf92ca3627 [] []}} ContainerID="b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be" Namespace="calico-system" Pod="csi-node-driver-7m955" WorkloadEndpoint="172.24.4.121-k8s-csi--node--driver--7m955-" Apr 12 18:48:21.808046 env[1055]: 2024-04-12 18:48:21.507 [INFO][2291] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be" Namespace="calico-system" Pod="csi-node-driver-7m955" WorkloadEndpoint="172.24.4.121-k8s-csi--node--driver--7m955-eth0" Apr 12 18:48:21.808046 env[1055]: 2024-04-12 18:48:21.588 [INFO][2310] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be" HandleID="k8s-pod-network.b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be" Workload="172.24.4.121-k8s-csi--node--driver--7m955-eth0" Apr 12 18:48:21.808046 env[1055]: 2024-04-12 18:48:21.617 [INFO][2310] ipam_plugin.go 268: Auto assigning IP ContainerID="b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be" HandleID="k8s-pod-network.b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be" Workload="172.24.4.121-k8s-csi--node--driver--7m955-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000264d70), Attrs:map[string]string{"namespace":"calico-system", "node":"172.24.4.121", "pod":"csi-node-driver-7m955", "timestamp":"2024-04-12 18:48:21.588561096 +0000 UTC"}, Hostname:"172.24.4.121", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:48:21.808046 env[1055]: 2024-04-12 18:48:21.617 [INFO][2310] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:48:21.808046 env[1055]: 2024-04-12 18:48:21.617 [INFO][2310] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:48:21.808046 env[1055]: 2024-04-12 18:48:21.618 [INFO][2310] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.121' Apr 12 18:48:21.808046 env[1055]: 2024-04-12 18:48:21.621 [INFO][2310] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be" host="172.24.4.121" Apr 12 18:48:21.808046 env[1055]: 2024-04-12 18:48:21.633 [INFO][2310] ipam.go 372: Looking up existing affinities for host host="172.24.4.121" Apr 12 18:48:21.808046 env[1055]: 2024-04-12 18:48:21.646 [INFO][2310] ipam.go 489: Trying affinity for 192.168.13.192/26 host="172.24.4.121" Apr 12 18:48:21.808046 env[1055]: 2024-04-12 18:48:21.649 [INFO][2310] ipam.go 155: Attempting to load block cidr=192.168.13.192/26 host="172.24.4.121" Apr 12 18:48:21.808046 env[1055]: 2024-04-12 18:48:21.652 [INFO][2310] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.192/26 host="172.24.4.121" Apr 12 18:48:21.808046 env[1055]: 2024-04-12 18:48:21.652 [INFO][2310] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.192/26 handle="k8s-pod-network.b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be" host="172.24.4.121" Apr 12 18:48:21.808046 env[1055]: 2024-04-12 18:48:21.654 [INFO][2310] ipam.go 1682: Creating new handle: k8s-pod-network.b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be Apr 12 18:48:21.808046 env[1055]: 2024-04-12 18:48:21.659 [INFO][2310] ipam.go 1203: Writing block in order to claim IPs block=192.168.13.192/26 handle="k8s-pod-network.b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be" host="172.24.4.121" Apr 12 18:48:21.808046 env[1055]: 2024-04-12 18:48:21.677 [INFO][2310] ipam.go 1216: Successfully claimed IPs: [192.168.13.193/26] block=192.168.13.192/26 handle="k8s-pod-network.b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be" host="172.24.4.121" Apr 12 18:48:21.808046 env[1055]: 2024-04-12 18:48:21.678 [INFO][2310] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.193/26] handle="k8s-pod-network.b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be" host="172.24.4.121" Apr 12 18:48:21.808046 env[1055]: 2024-04-12 18:48:21.678 [INFO][2310] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:48:21.808046 env[1055]: 2024-04-12 18:48:21.679 [INFO][2310] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.13.193/26] IPv6=[] ContainerID="b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be" HandleID="k8s-pod-network.b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be" Workload="172.24.4.121-k8s-csi--node--driver--7m955-eth0" Apr 12 18:48:21.811345 env[1055]: 2024-04-12 18:48:21.683 [INFO][2291] k8s.go 385: Populated endpoint ContainerID="b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be" Namespace="calico-system" Pod="csi-node-driver-7m955" WorkloadEndpoint="172.24.4.121-k8s-csi--node--driver--7m955-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121-k8s-csi--node--driver--7m955-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"11ec87fb-2946-4b3a-9964-c58b0a4e068a", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 47, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.121", ContainerID:"", Pod:"csi-node-driver-7m955", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.13.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali2bf92ca3627", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:48:21.811345 env[1055]: 2024-04-12 18:48:21.683 [INFO][2291] k8s.go 386: Calico CNI using IPs: [192.168.13.193/32] ContainerID="b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be" Namespace="calico-system" Pod="csi-node-driver-7m955" WorkloadEndpoint="172.24.4.121-k8s-csi--node--driver--7m955-eth0" Apr 12 18:48:21.811345 env[1055]: 2024-04-12 18:48:21.684 [INFO][2291] dataplane_linux.go 68: Setting the host side veth name to cali2bf92ca3627 ContainerID="b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be" Namespace="calico-system" Pod="csi-node-driver-7m955" WorkloadEndpoint="172.24.4.121-k8s-csi--node--driver--7m955-eth0" Apr 12 18:48:21.811345 env[1055]: 2024-04-12 18:48:21.725 [INFO][2291] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be" Namespace="calico-system" Pod="csi-node-driver-7m955" WorkloadEndpoint="172.24.4.121-k8s-csi--node--driver--7m955-eth0" Apr 12 18:48:21.811345 env[1055]: 2024-04-12 18:48:21.726 [INFO][2291] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be" Namespace="calico-system" Pod="csi-node-driver-7m955" WorkloadEndpoint="172.24.4.121-k8s-csi--node--driver--7m955-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121-k8s-csi--node--driver--7m955-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"11ec87fb-2946-4b3a-9964-c58b0a4e068a", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 47, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.121", ContainerID:"b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be", Pod:"csi-node-driver-7m955", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.13.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali2bf92ca3627", MAC:"d6:72:55:91:b7:61", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:48:21.811345 env[1055]: 2024-04-12 18:48:21.805 [INFO][2291] k8s.go 498: Wrote updated endpoint to datastore ContainerID="b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be" Namespace="calico-system" Pod="csi-node-driver-7m955" WorkloadEndpoint="172.24.4.121-k8s-csi--node--driver--7m955-eth0" Apr 12 18:48:21.830591 systemd-networkd[972]: cali82c9c42f114: Link UP Apr 12 18:48:21.835913 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali82c9c42f114: link becomes ready Apr 12 18:48:21.838125 systemd-networkd[972]: cali82c9c42f114: Gained carrier Apr 12 18:48:21.880000 audit[2339]: NETFILTER_CFG table=filter:69 family=2 entries=36 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:48:21.881975 kernel: kauditd_printk_skb: 157 callbacks suppressed Apr 12 18:48:21.882042 kernel: audit: type=1325 audit(1712947701.880:652): table=filter:69 family=2 entries=36 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:48:21.880000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7ffe15c4ca40 a2=0 a3=7ffe15c4ca2c items=0 ppid=2033 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:21.889900 kernel: audit: type=1300 audit(1712947701.880:652): arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7ffe15c4ca40 a2=0 a3=7ffe15c4ca2c items=0 ppid=2033 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:21.891750 kernel: audit: type=1327 audit(1712947701.880:652): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:48:21.880000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:48:21.923903 env[1055]: time="2024-04-12T18:48:21.923817885Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:48:21.924218 env[1055]: time="2024-04-12T18:48:21.924161139Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:48:21.924343 env[1055]: time="2024-04-12T18:48:21.924317595Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:48:21.924748 env[1055]: time="2024-04-12T18:48:21.924640046Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be pid=2348 runtime=io.containerd.runc.v2 Apr 12 18:48:21.963909 systemd[1]: Started cri-containerd-b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be.scope. Apr 12 18:48:21.980392 env[1055]: 2024-04-12 18:48:21.470 [INFO][2284] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0 nginx-deployment-6d5f899847- default c12468c8-15ca-4c5f-970c-115acc5f7541 972 0 2024-04-12 18:48:08 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.121 nginx-deployment-6d5f899847-cj5xd eth0 default [] [] [kns.default ksa.default.default] cali82c9c42f114 [] []}} ContainerID="15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3" Namespace="default" Pod="nginx-deployment-6d5f899847-cj5xd" WorkloadEndpoint="172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-" Apr 12 18:48:21.980392 env[1055]: 2024-04-12 18:48:21.470 [INFO][2284] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3" Namespace="default" Pod="nginx-deployment-6d5f899847-cj5xd" WorkloadEndpoint="172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0" Apr 12 18:48:21.980392 env[1055]: 2024-04-12 18:48:21.604 [INFO][2314] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3" HandleID="k8s-pod-network.15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3" Workload="172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0" Apr 12 18:48:21.980392 env[1055]: 2024-04-12 18:48:21.627 [INFO][2314] ipam_plugin.go 268: Auto assigning IP ContainerID="15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3" HandleID="k8s-pod-network.15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3" Workload="172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ed220), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.121", "pod":"nginx-deployment-6d5f899847-cj5xd", "timestamp":"2024-04-12 18:48:21.604695836 +0000 UTC"}, Hostname:"172.24.4.121", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:48:21.980392 env[1055]: 2024-04-12 18:48:21.627 [INFO][2314] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:48:21.980392 env[1055]: 2024-04-12 18:48:21.678 [INFO][2314] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:48:21.980392 env[1055]: 2024-04-12 18:48:21.678 [INFO][2314] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.121' Apr 12 18:48:21.980392 env[1055]: 2024-04-12 18:48:21.729 [INFO][2314] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3" host="172.24.4.121" Apr 12 18:48:21.980392 env[1055]: 2024-04-12 18:48:21.739 [INFO][2314] ipam.go 372: Looking up existing affinities for host host="172.24.4.121" Apr 12 18:48:21.980392 env[1055]: 2024-04-12 18:48:21.748 [INFO][2314] ipam.go 489: Trying affinity for 192.168.13.192/26 host="172.24.4.121" Apr 12 18:48:21.980392 env[1055]: 2024-04-12 18:48:21.751 [INFO][2314] ipam.go 155: Attempting to load block cidr=192.168.13.192/26 host="172.24.4.121" Apr 12 18:48:21.980392 env[1055]: 2024-04-12 18:48:21.757 [INFO][2314] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.192/26 host="172.24.4.121" Apr 12 18:48:21.980392 env[1055]: 2024-04-12 18:48:21.757 [INFO][2314] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.192/26 handle="k8s-pod-network.15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3" host="172.24.4.121" Apr 12 18:48:21.980392 env[1055]: 2024-04-12 18:48:21.762 [INFO][2314] ipam.go 1682: Creating new handle: k8s-pod-network.15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3 Apr 12 18:48:21.980392 env[1055]: 2024-04-12 18:48:21.774 [INFO][2314] ipam.go 1203: Writing block in order to claim IPs block=192.168.13.192/26 handle="k8s-pod-network.15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3" host="172.24.4.121" Apr 12 18:48:21.980392 env[1055]: 2024-04-12 18:48:21.817 [INFO][2314] ipam.go 1216: Successfully claimed IPs: [192.168.13.194/26] block=192.168.13.192/26 handle="k8s-pod-network.15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3" host="172.24.4.121" Apr 12 18:48:21.980392 env[1055]: 2024-04-12 18:48:21.817 [INFO][2314] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.194/26] handle="k8s-pod-network.15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3" host="172.24.4.121" Apr 12 18:48:21.980392 env[1055]: 2024-04-12 18:48:21.817 [INFO][2314] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:48:21.980392 env[1055]: 2024-04-12 18:48:21.817 [INFO][2314] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.13.194/26] IPv6=[] ContainerID="15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3" HandleID="k8s-pod-network.15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3" Workload="172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0" Apr 12 18:48:21.981225 env[1055]: 2024-04-12 18:48:21.821 [INFO][2284] k8s.go 385: Populated endpoint ContainerID="15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3" Namespace="default" Pod="nginx-deployment-6d5f899847-cj5xd" WorkloadEndpoint="172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"c12468c8-15ca-4c5f-970c-115acc5f7541", ResourceVersion:"972", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 48, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.121", ContainerID:"", Pod:"nginx-deployment-6d5f899847-cj5xd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.13.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali82c9c42f114", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:48:21.981225 env[1055]: 2024-04-12 18:48:21.822 [INFO][2284] k8s.go 386: Calico CNI using IPs: [192.168.13.194/32] ContainerID="15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3" Namespace="default" Pod="nginx-deployment-6d5f899847-cj5xd" WorkloadEndpoint="172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0" Apr 12 18:48:21.981225 env[1055]: 2024-04-12 18:48:21.824 [INFO][2284] dataplane_linux.go 68: Setting the host side veth name to cali82c9c42f114 ContainerID="15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3" Namespace="default" Pod="nginx-deployment-6d5f899847-cj5xd" WorkloadEndpoint="172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0" Apr 12 18:48:21.981225 env[1055]: 2024-04-12 18:48:21.890 [INFO][2284] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3" Namespace="default" Pod="nginx-deployment-6d5f899847-cj5xd" WorkloadEndpoint="172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0" Apr 12 18:48:21.981225 env[1055]: 2024-04-12 18:48:21.890 [INFO][2284] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3" Namespace="default" Pod="nginx-deployment-6d5f899847-cj5xd" WorkloadEndpoint="172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"c12468c8-15ca-4c5f-970c-115acc5f7541", ResourceVersion:"972", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 48, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.121", ContainerID:"15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3", Pod:"nginx-deployment-6d5f899847-cj5xd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.13.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali82c9c42f114", MAC:"56:6e:40:6d:fa:43", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:48:21.981225 env[1055]: 2024-04-12 18:48:21.973 [INFO][2284] k8s.go 498: Wrote updated endpoint to datastore ContainerID="15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3" Namespace="default" Pod="nginx-deployment-6d5f899847-cj5xd" WorkloadEndpoint="172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0" Apr 12 18:48:21.990000 audit[2385]: NETFILTER_CFG table=filter:70 family=2 entries=40 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:48:21.999505 kernel: audit: type=1325 audit(1712947701.990:653): table=filter:70 family=2 entries=40 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:48:21.999556 kernel: audit: type=1300 audit(1712947701.990:653): arch=c000003e syscall=46 success=yes exit=21560 a0=3 a1=7ffd0555b5b0 a2=0 a3=7ffd0555b59c items=0 ppid=2033 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:21.999584 kernel: audit: type=1327 audit(1712947701.990:653): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:48:21.990000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=21560 a0=3 a1=7ffd0555b5b0 a2=0 a3=7ffd0555b59c items=0 ppid=2033 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:21.990000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:48:22.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.020823 kernel: audit: type=1400 audit(1712947702.009:654): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.020883 kernel: audit: type=1400 audit(1712947702.009:655): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.027858 kernel: audit: type=1400 audit(1712947702.009:656): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.032786 kernel: audit: type=1400 audit(1712947702.009:657): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.020000 audit: BPF prog-id=85 op=LOAD Apr 12 18:48:22.020000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.020000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2348 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:22.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237306161393032386439316437396263396137613439333232616263 Apr 12 18:48:22.020000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.020000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2348 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:22.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237306161393032386439316437396263396137613439333232616263 Apr 12 18:48:22.020000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.020000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.020000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.020000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.020000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.020000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.020000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.020000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.020000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.020000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.020000 audit: BPF prog-id=86 op=LOAD Apr 12 18:48:22.020000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000340270 items=0 ppid=2348 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:22.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237306161393032386439316437396263396137613439333232616263 Apr 12 18:48:22.022000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.022000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.022000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.022000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.022000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.022000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.022000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.022000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.022000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.022000 audit: BPF prog-id=87 op=LOAD Apr 12 18:48:22.022000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003402b8 items=0 ppid=2348 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:22.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237306161393032386439316437396263396137613439333232616263 Apr 12 18:48:22.022000 audit: BPF prog-id=87 op=UNLOAD Apr 12 18:48:22.022000 audit: BPF prog-id=86 op=UNLOAD Apr 12 18:48:22.022000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.022000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.022000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.022000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.022000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.022000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.022000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.022000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.022000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.022000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.022000 audit: BPF prog-id=88 op=LOAD Apr 12 18:48:22.022000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003406c8 items=0 ppid=2348 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:22.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237306161393032386439316437396263396137613439333232616263 Apr 12 18:48:22.038318 env[1055]: time="2024-04-12T18:48:22.033336189Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:48:22.038318 env[1055]: time="2024-04-12T18:48:22.033438832Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:48:22.038318 env[1055]: time="2024-04-12T18:48:22.033469636Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:48:22.038318 env[1055]: time="2024-04-12T18:48:22.033882342Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3 pid=2394 runtime=io.containerd.runc.v2 Apr 12 18:48:22.055673 env[1055]: time="2024-04-12T18:48:22.055483044Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7m955,Uid:11ec87fb-2946-4b3a-9964-c58b0a4e068a,Namespace:calico-system,Attempt:1,} returns sandbox id \"b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be\"" Apr 12 18:48:22.060475 systemd[1]: Started cri-containerd-15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3.scope. Apr 12 18:48:22.065332 env[1055]: time="2024-04-12T18:48:22.065310277Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:48:22.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.085000 audit: BPF prog-id=89 op=LOAD Apr 12 18:48:22.086000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.086000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2394 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:22.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135623430303131646631393338643963333938656265316238623731 Apr 12 18:48:22.086000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.086000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2394 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:22.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135623430303131646631393338643963333938656265316238623731 Apr 12 18:48:22.087000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.087000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.087000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.087000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.087000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.087000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.087000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.087000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.087000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.087000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.087000 audit: BPF prog-id=90 op=LOAD Apr 12 18:48:22.087000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000246d90 items=0 ppid=2394 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:22.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135623430303131646631393338643963333938656265316238623731 Apr 12 18:48:22.088000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.088000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.088000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.088000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.088000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.088000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.088000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.088000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.088000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.088000 audit: BPF prog-id=91 op=LOAD Apr 12 18:48:22.088000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000246dd8 items=0 ppid=2394 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:22.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135623430303131646631393338643963333938656265316238623731 Apr 12 18:48:22.089000 audit: BPF prog-id=91 op=UNLOAD Apr 12 18:48:22.089000 audit: BPF prog-id=90 op=UNLOAD Apr 12 18:48:22.089000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.089000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.089000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.089000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.089000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.089000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.089000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.089000 audit[2406]: AVC avc: denied { perfmon } for pid=2406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.089000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.089000 audit[2406]: AVC avc: denied { bpf } for pid=2406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:22.089000 audit: BPF prog-id=92 op=LOAD Apr 12 18:48:22.089000 audit[2406]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002471e8 items=0 ppid=2394 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:22.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135623430303131646631393338643963333938656265316238623731 Apr 12 18:48:22.123639 env[1055]: time="2024-04-12T18:48:22.123592031Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-cj5xd,Uid:c12468c8-15ca-4c5f-970c-115acc5f7541,Namespace:default,Attempt:1,} returns sandbox id \"15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3\"" Apr 12 18:48:22.788268 kubelet[1378]: E0412 18:48:22.788017 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:23.363561 systemd-networkd[972]: cali82c9c42f114: Gained IPv6LL Apr 12 18:48:23.455936 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2072446122.mount: Deactivated successfully. Apr 12 18:48:23.487787 systemd-networkd[972]: cali2bf92ca3627: Gained IPv6LL Apr 12 18:48:23.788611 kubelet[1378]: E0412 18:48:23.788547 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:24.249450 env[1055]: time="2024-04-12T18:48:24.249184523Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:24.253391 env[1055]: time="2024-04-12T18:48:24.253319046Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:24.257136 env[1055]: time="2024-04-12T18:48:24.257067564Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:24.260629 env[1055]: time="2024-04-12T18:48:24.260555917Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:24.262289 env[1055]: time="2024-04-12T18:48:24.262200543Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\"" Apr 12 18:48:24.264402 env[1055]: time="2024-04-12T18:48:24.264350419Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 18:48:24.269052 env[1055]: time="2024-04-12T18:48:24.268924948Z" level=info msg="CreateContainer within sandbox \"b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:48:24.302935 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4280540614.mount: Deactivated successfully. Apr 12 18:48:24.390006 env[1055]: time="2024-04-12T18:48:24.389874381Z" level=info msg="CreateContainer within sandbox \"b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"72e02e63e55907f9b3bf1230630562a92b7d95b37b33bed9c651b556a897e748\"" Apr 12 18:48:24.391476 env[1055]: time="2024-04-12T18:48:24.391404511Z" level=info msg="StartContainer for \"72e02e63e55907f9b3bf1230630562a92b7d95b37b33bed9c651b556a897e748\"" Apr 12 18:48:24.446463 systemd[1]: Started cri-containerd-72e02e63e55907f9b3bf1230630562a92b7d95b37b33bed9c651b556a897e748.scope. Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7ff578f0d718 items=0 ppid=2348 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:24.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732653032653633653535393037663962336266313233303633303536 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit: BPF prog-id=93 op=LOAD Apr 12 18:48:24.481000 audit[2447]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000290218 items=0 ppid=2348 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:24.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732653032653633653535393037663962336266313233303633303536 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit: BPF prog-id=94 op=LOAD Apr 12 18:48:24.481000 audit[2447]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000290268 items=0 ppid=2348 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:24.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732653032653633653535393037663962336266313233303633303536 Apr 12 18:48:24.481000 audit: BPF prog-id=94 op=UNLOAD Apr 12 18:48:24.481000 audit: BPF prog-id=93 op=UNLOAD Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:24.481000 audit: BPF prog-id=95 op=LOAD Apr 12 18:48:24.481000 audit[2447]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002902f8 items=0 ppid=2348 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:24.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732653032653633653535393037663962336266313233303633303536 Apr 12 18:48:24.526757 env[1055]: time="2024-04-12T18:48:24.526658386Z" level=info msg="StartContainer for \"72e02e63e55907f9b3bf1230630562a92b7d95b37b33bed9c651b556a897e748\" returns successfully" Apr 12 18:48:24.789575 kubelet[1378]: E0412 18:48:24.789294 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:25.790068 kubelet[1378]: E0412 18:48:25.790017 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:26.742249 kubelet[1378]: E0412 18:48:26.742148 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:26.790362 kubelet[1378]: E0412 18:48:26.790296 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:27.790644 kubelet[1378]: E0412 18:48:27.790521 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:28.774422 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3449896861.mount: Deactivated successfully. Apr 12 18:48:28.791561 kubelet[1378]: E0412 18:48:28.791499 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:29.791848 kubelet[1378]: E0412 18:48:29.791794 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:30.103082 env[1055]: time="2024-04-12T18:48:30.102848677Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:30.107098 env[1055]: time="2024-04-12T18:48:30.107021753Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:30.111524 env[1055]: time="2024-04-12T18:48:30.111452700Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:30.115789 env[1055]: time="2024-04-12T18:48:30.115676798Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:30.117990 env[1055]: time="2024-04-12T18:48:30.117921069Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83\"" Apr 12 18:48:30.121190 env[1055]: time="2024-04-12T18:48:30.121135325Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:48:30.123354 env[1055]: time="2024-04-12T18:48:30.123244553Z" level=info msg="CreateContainer within sandbox \"15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Apr 12 18:48:30.161947 env[1055]: time="2024-04-12T18:48:30.161867493Z" level=info msg="CreateContainer within sandbox \"15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"77acc5712593242e10744c07181cb197bdb370fc6ae4d015fcfda58f60e678c6\"" Apr 12 18:48:30.163533 env[1055]: time="2024-04-12T18:48:30.163481821Z" level=info msg="StartContainer for \"77acc5712593242e10744c07181cb197bdb370fc6ae4d015fcfda58f60e678c6\"" Apr 12 18:48:30.219985 systemd[1]: run-containerd-runc-k8s.io-77acc5712593242e10744c07181cb197bdb370fc6ae4d015fcfda58f60e678c6-runc.1ghNpu.mount: Deactivated successfully. Apr 12 18:48:30.222132 systemd[1]: Started cri-containerd-77acc5712593242e10744c07181cb197bdb370fc6ae4d015fcfda58f60e678c6.scope. Apr 12 18:48:30.243862 kernel: kauditd_printk_skb: 153 callbacks suppressed Apr 12 18:48:30.243966 kernel: audit: type=1400 audit(1712947710.237:696): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.247641 kernel: audit: type=1400 audit(1712947710.237:697): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.247723 kernel: audit: type=1400 audit(1712947710.237:698): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.250877 kernel: audit: type=1400 audit(1712947710.237:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.258160 kernel: audit: type=1400 audit(1712947710.237:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.258206 kernel: audit: type=1400 audit(1712947710.237:701): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.269384 kernel: audit: type=1400 audit(1712947710.237:702): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.269438 kernel: audit: type=1400 audit(1712947710.237:703): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.269463 kernel: audit: type=1400 audit(1712947710.237:704): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.272862 kernel: audit: type=1400 audit(1712947710.237:705): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.237000 audit: BPF prog-id=96 op=LOAD Apr 12 18:48:30.243000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.243000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2394 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:30.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737616363353731323539333234326531303734346330373138316362 Apr 12 18:48:30.243000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.243000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=2394 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:30.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737616363353731323539333234326531303734346330373138316362 Apr 12 18:48:30.243000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.243000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.243000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.243000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.243000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.243000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.243000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.243000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.243000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.243000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.243000 audit: BPF prog-id=97 op=LOAD Apr 12 18:48:30.243000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c00030c910 items=0 ppid=2394 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:30.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737616363353731323539333234326531303734346330373138316362 Apr 12 18:48:30.252000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.252000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.252000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.252000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.252000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.252000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.252000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.252000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.252000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.252000 audit: BPF prog-id=98 op=LOAD Apr 12 18:48:30.252000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c00030c958 items=0 ppid=2394 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:30.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737616363353731323539333234326531303734346330373138316362 Apr 12 18:48:30.252000 audit: BPF prog-id=98 op=UNLOAD Apr 12 18:48:30.252000 audit: BPF prog-id=97 op=UNLOAD Apr 12 18:48:30.252000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.252000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.252000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.252000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.252000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.252000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.252000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.252000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.252000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.252000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:30.252000 audit: BPF prog-id=99 op=LOAD Apr 12 18:48:30.252000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c00030cd68 items=0 ppid=2394 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:30.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737616363353731323539333234326531303734346330373138316362 Apr 12 18:48:30.302618 env[1055]: time="2024-04-12T18:48:30.302565885Z" level=info msg="StartContainer for \"77acc5712593242e10744c07181cb197bdb370fc6ae4d015fcfda58f60e678c6\" returns successfully" Apr 12 18:48:30.792825 kubelet[1378]: E0412 18:48:30.792687 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:31.793241 kubelet[1378]: E0412 18:48:31.793163 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:32.736209 env[1055]: time="2024-04-12T18:48:32.736016907Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:32.793769 kubelet[1378]: E0412 18:48:32.793577 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:32.975672 env[1055]: time="2024-04-12T18:48:32.975402750Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:33.180636 env[1055]: time="2024-04-12T18:48:33.180555958Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:33.185346 env[1055]: time="2024-04-12T18:48:33.185253013Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:33.187208 env[1055]: time="2024-04-12T18:48:33.187147641Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\"" Apr 12 18:48:33.191061 env[1055]: time="2024-04-12T18:48:33.190995568Z" level=info msg="CreateContainer within sandbox \"b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:48:33.222506 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4015934413.mount: Deactivated successfully. Apr 12 18:48:33.229009 env[1055]: time="2024-04-12T18:48:33.228939466Z" level=info msg="CreateContainer within sandbox \"b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"bc4e5c66cb5f9d26265b19397c20b00e9fd23d0409c95674965141c94430edb9\"" Apr 12 18:48:33.230500 env[1055]: time="2024-04-12T18:48:33.230380383Z" level=info msg="StartContainer for \"bc4e5c66cb5f9d26265b19397c20b00e9fd23d0409c95674965141c94430edb9\"" Apr 12 18:48:33.270900 systemd[1]: Started cri-containerd-bc4e5c66cb5f9d26265b19397c20b00e9fd23d0409c95674965141c94430edb9.scope. Apr 12 18:48:33.301000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.301000 audit[2552]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f80e814f278 items=0 ppid=2348 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:33.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263346535633636636235663964323632363562313933393763323062 Apr 12 18:48:33.301000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.301000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.301000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.301000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.301000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.301000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.301000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.301000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.301000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.301000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.301000 audit: BPF prog-id=100 op=LOAD Apr 12 18:48:33.301000 audit[2552]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000357b98 items=0 ppid=2348 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:33.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263346535633636636235663964323632363562313933393763323062 Apr 12 18:48:33.302000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.302000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.302000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.302000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.302000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.302000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.302000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.302000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.302000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.302000 audit: BPF prog-id=101 op=LOAD Apr 12 18:48:33.302000 audit[2552]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000357be8 items=0 ppid=2348 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:33.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263346535633636636235663964323632363562313933393763323062 Apr 12 18:48:33.302000 audit: BPF prog-id=101 op=UNLOAD Apr 12 18:48:33.303000 audit: BPF prog-id=100 op=UNLOAD Apr 12 18:48:33.303000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.303000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.303000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.303000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.303000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.303000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.303000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.303000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.303000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.303000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:33.303000 audit: BPF prog-id=102 op=LOAD Apr 12 18:48:33.303000 audit[2552]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000357c78 items=0 ppid=2348 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:33.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263346535633636636235663964323632363562313933393763323062 Apr 12 18:48:33.327402 env[1055]: time="2024-04-12T18:48:33.327329035Z" level=info msg="StartContainer for \"bc4e5c66cb5f9d26265b19397c20b00e9fd23d0409c95674965141c94430edb9\" returns successfully" Apr 12 18:48:33.794964 kubelet[1378]: E0412 18:48:33.794817 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:33.854677 kubelet[1378]: I0412 18:48:33.854504 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-7m955" podStartSLOduration=34.723743613 podCreationTimestamp="2024-04-12 18:47:48 +0000 UTC" firstStartedPulling="2024-04-12 18:48:22.057198242 +0000 UTC m=+35.877036188" lastFinishedPulling="2024-04-12 18:48:33.187839403 +0000 UTC m=+47.007677339" observedRunningTime="2024-04-12 18:48:33.853197598 +0000 UTC m=+47.673035614" watchObservedRunningTime="2024-04-12 18:48:33.854384764 +0000 UTC m=+47.674222750" Apr 12 18:48:33.855113 kubelet[1378]: I0412 18:48:33.855040 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-cj5xd" podStartSLOduration=17.861028551 podCreationTimestamp="2024-04-12 18:48:08 +0000 UTC" firstStartedPulling="2024-04-12 18:48:22.125058212 +0000 UTC m=+35.944896148" lastFinishedPulling="2024-04-12 18:48:30.118976115 +0000 UTC m=+43.938814101" observedRunningTime="2024-04-12 18:48:30.834153076 +0000 UTC m=+44.653991062" watchObservedRunningTime="2024-04-12 18:48:33.854946504 +0000 UTC m=+47.674784490" Apr 12 18:48:33.885619 kubelet[1378]: I0412 18:48:33.885570 1378 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:48:33.887141 kubelet[1378]: I0412 18:48:33.887111 1378 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:48:34.795241 kubelet[1378]: E0412 18:48:34.795154 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:35.795587 kubelet[1378]: E0412 18:48:35.795510 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:36.796159 kubelet[1378]: E0412 18:48:36.796100 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:37.797397 kubelet[1378]: E0412 18:48:37.797334 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:38.799216 kubelet[1378]: E0412 18:48:38.799031 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:39.621000 audit[2618]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=2618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:48:39.625213 kernel: kauditd_printk_skb: 90 callbacks suppressed Apr 12 18:48:39.625342 kernel: audit: type=1325 audit(1712947719.621:720): table=filter:71 family=2 entries=20 op=nft_register_rule pid=2618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:48:39.621000 audit[2618]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe4504baf0 a2=0 a3=7ffe4504badc items=0 ppid=1607 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:39.642778 kernel: audit: type=1300 audit(1712947719.621:720): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe4504baf0 a2=0 a3=7ffe4504badc items=0 ppid=1607 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:39.621000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:48:39.650760 kernel: audit: type=1327 audit(1712947719.621:720): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:48:39.622000 audit[2618]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=2618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:48:39.622000 audit[2618]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe4504baf0 a2=0 a3=0 items=0 ppid=1607 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:39.670178 kernel: audit: type=1325 audit(1712947719.622:721): table=nat:72 family=2 entries=20 op=nft_register_rule pid=2618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:48:39.670419 kernel: audit: type=1300 audit(1712947719.622:721): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe4504baf0 a2=0 a3=0 items=0 ppid=1607 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:39.622000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:48:39.667000 audit[2622]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=2622 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:48:39.683925 kernel: audit: type=1327 audit(1712947719.622:721): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:48:39.684064 kernel: audit: type=1325 audit(1712947719.667:722): table=filter:73 family=2 entries=32 op=nft_register_rule pid=2622 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:48:39.667000 audit[2622]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd5364d0b0 a2=0 a3=7ffd5364d09c items=0 ppid=1607 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:39.690044 kernel: audit: type=1300 audit(1712947719.667:722): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd5364d0b0 a2=0 a3=7ffd5364d09c items=0 ppid=1607 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:39.690149 kernel: audit: type=1327 audit(1712947719.667:722): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:48:39.667000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:48:39.692789 kernel: audit: type=1325 audit(1712947719.671:723): table=nat:74 family=2 entries=20 op=nft_register_rule pid=2622 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:48:39.671000 audit[2622]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=2622 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:48:39.671000 audit[2622]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd5364d0b0 a2=0 a3=0 items=0 ppid=1607 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:39.671000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:48:39.707623 kubelet[1378]: I0412 18:48:39.707539 1378 topology_manager.go:215] "Topology Admit Handler" podUID="a52bd1d5-0322-42f2-8637-ecaffb20cf37" podNamespace="calico-apiserver" podName="calico-apiserver-5c78b5f789-xzc8p" Apr 12 18:48:39.719153 systemd[1]: Created slice kubepods-besteffort-poda52bd1d5_0322_42f2_8637_ecaffb20cf37.slice. Apr 12 18:48:39.759070 kubelet[1378]: I0412 18:48:39.758990 1378 topology_manager.go:215] "Topology Admit Handler" podUID="f6ae8505-6478-465d-a656-5e46a27ee72f" podNamespace="default" podName="nfs-server-provisioner-0" Apr 12 18:48:39.771524 systemd[1]: Created slice kubepods-besteffort-podf6ae8505_6478_465d_a656_5e46a27ee72f.slice. Apr 12 18:48:39.799312 kubelet[1378]: E0412 18:48:39.799235 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:39.821051 kubelet[1378]: I0412 18:48:39.820685 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a52bd1d5-0322-42f2-8637-ecaffb20cf37-calico-apiserver-certs\") pod \"calico-apiserver-5c78b5f789-xzc8p\" (UID: \"a52bd1d5-0322-42f2-8637-ecaffb20cf37\") " pod="calico-apiserver/calico-apiserver-5c78b5f789-xzc8p" Apr 12 18:48:39.821336 kubelet[1378]: I0412 18:48:39.821228 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-44cpj\" (UniqueName: \"kubernetes.io/projected/a52bd1d5-0322-42f2-8637-ecaffb20cf37-kube-api-access-44cpj\") pod \"calico-apiserver-5c78b5f789-xzc8p\" (UID: \"a52bd1d5-0322-42f2-8637-ecaffb20cf37\") " pod="calico-apiserver/calico-apiserver-5c78b5f789-xzc8p" Apr 12 18:48:39.924393 kubelet[1378]: I0412 18:48:39.922410 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jcsx2\" (UniqueName: \"kubernetes.io/projected/f6ae8505-6478-465d-a656-5e46a27ee72f-kube-api-access-jcsx2\") pod \"nfs-server-provisioner-0\" (UID: \"f6ae8505-6478-465d-a656-5e46a27ee72f\") " pod="default/nfs-server-provisioner-0" Apr 12 18:48:39.924622 kubelet[1378]: I0412 18:48:39.924435 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/f6ae8505-6478-465d-a656-5e46a27ee72f-data\") pod \"nfs-server-provisioner-0\" (UID: \"f6ae8505-6478-465d-a656-5e46a27ee72f\") " pod="default/nfs-server-provisioner-0" Apr 12 18:48:40.026572 env[1055]: time="2024-04-12T18:48:40.026436830Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c78b5f789-xzc8p,Uid:a52bd1d5-0322-42f2-8637-ecaffb20cf37,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:48:40.077442 env[1055]: time="2024-04-12T18:48:40.076750413Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:f6ae8505-6478-465d-a656-5e46a27ee72f,Namespace:default,Attempt:0,}" Apr 12 18:48:40.285433 systemd-networkd[972]: calidd624747e4e: Link UP Apr 12 18:48:40.292022 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:48:40.292230 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidd624747e4e: link becomes ready Apr 12 18:48:40.292397 systemd-networkd[972]: calidd624747e4e: Gained carrier Apr 12 18:48:40.315692 env[1055]: 2024-04-12 18:48:40.158 [INFO][2626] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.121-k8s-calico--apiserver--5c78b5f789--xzc8p-eth0 calico-apiserver-5c78b5f789- calico-apiserver a52bd1d5-0322-42f2-8637-ecaffb20cf37 1093 0 2024-04-12 18:48:39 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5c78b5f789 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 172.24.4.121 calico-apiserver-5c78b5f789-xzc8p eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calidd624747e4e [] []}} ContainerID="0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d" Namespace="calico-apiserver" Pod="calico-apiserver-5c78b5f789-xzc8p" WorkloadEndpoint="172.24.4.121-k8s-calico--apiserver--5c78b5f789--xzc8p-" Apr 12 18:48:40.315692 env[1055]: 2024-04-12 18:48:40.159 [INFO][2626] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d" Namespace="calico-apiserver" Pod="calico-apiserver-5c78b5f789-xzc8p" WorkloadEndpoint="172.24.4.121-k8s-calico--apiserver--5c78b5f789--xzc8p-eth0" Apr 12 18:48:40.315692 env[1055]: 2024-04-12 18:48:40.199 [INFO][2649] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d" HandleID="k8s-pod-network.0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d" Workload="172.24.4.121-k8s-calico--apiserver--5c78b5f789--xzc8p-eth0" Apr 12 18:48:40.315692 env[1055]: 2024-04-12 18:48:40.220 [INFO][2649] ipam_plugin.go 268: Auto assigning IP ContainerID="0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d" HandleID="k8s-pod-network.0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d" Workload="172.24.4.121-k8s-calico--apiserver--5c78b5f789--xzc8p-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000275860), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"172.24.4.121", "pod":"calico-apiserver-5c78b5f789-xzc8p", "timestamp":"2024-04-12 18:48:40.199727759 +0000 UTC"}, Hostname:"172.24.4.121", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:48:40.315692 env[1055]: 2024-04-12 18:48:40.221 [INFO][2649] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:48:40.315692 env[1055]: 2024-04-12 18:48:40.221 [INFO][2649] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:48:40.315692 env[1055]: 2024-04-12 18:48:40.221 [INFO][2649] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.121' Apr 12 18:48:40.315692 env[1055]: 2024-04-12 18:48:40.227 [INFO][2649] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d" host="172.24.4.121" Apr 12 18:48:40.315692 env[1055]: 2024-04-12 18:48:40.238 [INFO][2649] ipam.go 372: Looking up existing affinities for host host="172.24.4.121" Apr 12 18:48:40.315692 env[1055]: 2024-04-12 18:48:40.248 [INFO][2649] ipam.go 489: Trying affinity for 192.168.13.192/26 host="172.24.4.121" Apr 12 18:48:40.315692 env[1055]: 2024-04-12 18:48:40.252 [INFO][2649] ipam.go 155: Attempting to load block cidr=192.168.13.192/26 host="172.24.4.121" Apr 12 18:48:40.315692 env[1055]: 2024-04-12 18:48:40.258 [INFO][2649] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.192/26 host="172.24.4.121" Apr 12 18:48:40.315692 env[1055]: 2024-04-12 18:48:40.258 [INFO][2649] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.192/26 handle="k8s-pod-network.0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d" host="172.24.4.121" Apr 12 18:48:40.315692 env[1055]: 2024-04-12 18:48:40.260 [INFO][2649] ipam.go 1682: Creating new handle: k8s-pod-network.0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d Apr 12 18:48:40.315692 env[1055]: 2024-04-12 18:48:40.267 [INFO][2649] ipam.go 1203: Writing block in order to claim IPs block=192.168.13.192/26 handle="k8s-pod-network.0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d" host="172.24.4.121" Apr 12 18:48:40.315692 env[1055]: 2024-04-12 18:48:40.280 [INFO][2649] ipam.go 1216: Successfully claimed IPs: [192.168.13.195/26] block=192.168.13.192/26 handle="k8s-pod-network.0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d" host="172.24.4.121" Apr 12 18:48:40.315692 env[1055]: 2024-04-12 18:48:40.280 [INFO][2649] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.195/26] handle="k8s-pod-network.0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d" host="172.24.4.121" Apr 12 18:48:40.315692 env[1055]: 2024-04-12 18:48:40.280 [INFO][2649] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:48:40.315692 env[1055]: 2024-04-12 18:48:40.281 [INFO][2649] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.13.195/26] IPv6=[] ContainerID="0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d" HandleID="k8s-pod-network.0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d" Workload="172.24.4.121-k8s-calico--apiserver--5c78b5f789--xzc8p-eth0" Apr 12 18:48:40.316565 env[1055]: 2024-04-12 18:48:40.282 [INFO][2626] k8s.go 385: Populated endpoint ContainerID="0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d" Namespace="calico-apiserver" Pod="calico-apiserver-5c78b5f789-xzc8p" WorkloadEndpoint="172.24.4.121-k8s-calico--apiserver--5c78b5f789--xzc8p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121-k8s-calico--apiserver--5c78b5f789--xzc8p-eth0", GenerateName:"calico-apiserver-5c78b5f789-", Namespace:"calico-apiserver", SelfLink:"", UID:"a52bd1d5-0322-42f2-8637-ecaffb20cf37", ResourceVersion:"1093", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 48, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c78b5f789", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.121", ContainerID:"", Pod:"calico-apiserver-5c78b5f789-xzc8p", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.13.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidd624747e4e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:48:40.316565 env[1055]: 2024-04-12 18:48:40.282 [INFO][2626] k8s.go 386: Calico CNI using IPs: [192.168.13.195/32] ContainerID="0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d" Namespace="calico-apiserver" Pod="calico-apiserver-5c78b5f789-xzc8p" WorkloadEndpoint="172.24.4.121-k8s-calico--apiserver--5c78b5f789--xzc8p-eth0" Apr 12 18:48:40.316565 env[1055]: 2024-04-12 18:48:40.282 [INFO][2626] dataplane_linux.go 68: Setting the host side veth name to calidd624747e4e ContainerID="0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d" Namespace="calico-apiserver" Pod="calico-apiserver-5c78b5f789-xzc8p" WorkloadEndpoint="172.24.4.121-k8s-calico--apiserver--5c78b5f789--xzc8p-eth0" Apr 12 18:48:40.316565 env[1055]: 2024-04-12 18:48:40.285 [INFO][2626] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d" Namespace="calico-apiserver" Pod="calico-apiserver-5c78b5f789-xzc8p" WorkloadEndpoint="172.24.4.121-k8s-calico--apiserver--5c78b5f789--xzc8p-eth0" Apr 12 18:48:40.316565 env[1055]: 2024-04-12 18:48:40.286 [INFO][2626] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d" Namespace="calico-apiserver" Pod="calico-apiserver-5c78b5f789-xzc8p" WorkloadEndpoint="172.24.4.121-k8s-calico--apiserver--5c78b5f789--xzc8p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121-k8s-calico--apiserver--5c78b5f789--xzc8p-eth0", GenerateName:"calico-apiserver-5c78b5f789-", Namespace:"calico-apiserver", SelfLink:"", UID:"a52bd1d5-0322-42f2-8637-ecaffb20cf37", ResourceVersion:"1093", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 48, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c78b5f789", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.121", ContainerID:"0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d", Pod:"calico-apiserver-5c78b5f789-xzc8p", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.13.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidd624747e4e", MAC:"a6:15:69:22:b8:bb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:48:40.316565 env[1055]: 2024-04-12 18:48:40.305 [INFO][2626] k8s.go 498: Wrote updated endpoint to datastore ContainerID="0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d" Namespace="calico-apiserver" Pod="calico-apiserver-5c78b5f789-xzc8p" WorkloadEndpoint="172.24.4.121-k8s-calico--apiserver--5c78b5f789--xzc8p-eth0" Apr 12 18:48:40.339784 env[1055]: time="2024-04-12T18:48:40.338994281Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:48:40.339784 env[1055]: time="2024-04-12T18:48:40.339039761Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:48:40.339784 env[1055]: time="2024-04-12T18:48:40.339053328Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:48:40.339784 env[1055]: time="2024-04-12T18:48:40.339199268Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d pid=2689 runtime=io.containerd.runc.v2 Apr 12 18:48:40.351234 systemd-networkd[972]: cali60e51b789ff: Link UP Apr 12 18:48:40.354006 systemd-networkd[972]: cali60e51b789ff: Gained carrier Apr 12 18:48:40.354775 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Apr 12 18:48:40.357000 audit[2705]: NETFILTER_CFG table=filter:75 family=2 entries=51 op=nft_register_chain pid=2705 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:48:40.357000 audit[2705]: SYSCALL arch=c000003e syscall=46 success=yes exit=27764 a0=3 a1=7fffa5a8cb90 a2=0 a3=7fffa5a8cb7c items=0 ppid=2033 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:40.357000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:48:40.374755 env[1055]: 2024-04-12 18:48:40.203 [INFO][2637] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.121-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default f6ae8505-6478-465d-a656-5e46a27ee72f 1098 0 2024-04-12 18:48:39 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.24.4.121 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.121-k8s-nfs--server--provisioner--0-" Apr 12 18:48:40.374755 env[1055]: 2024-04-12 18:48:40.203 [INFO][2637] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.121-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:48:40.374755 env[1055]: 2024-04-12 18:48:40.252 [INFO][2657] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730" HandleID="k8s-pod-network.9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730" Workload="172.24.4.121-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:48:40.374755 env[1055]: 2024-04-12 18:48:40.282 [INFO][2657] ipam_plugin.go 268: Auto assigning IP ContainerID="9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730" HandleID="k8s-pod-network.9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730" Workload="172.24.4.121-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002756e0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.121", "pod":"nfs-server-provisioner-0", "timestamp":"2024-04-12 18:48:40.252753255 +0000 UTC"}, Hostname:"172.24.4.121", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:48:40.374755 env[1055]: 2024-04-12 18:48:40.282 [INFO][2657] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:48:40.374755 env[1055]: 2024-04-12 18:48:40.283 [INFO][2657] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:48:40.374755 env[1055]: 2024-04-12 18:48:40.283 [INFO][2657] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.121' Apr 12 18:48:40.374755 env[1055]: 2024-04-12 18:48:40.288 [INFO][2657] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730" host="172.24.4.121" Apr 12 18:48:40.374755 env[1055]: 2024-04-12 18:48:40.299 [INFO][2657] ipam.go 372: Looking up existing affinities for host host="172.24.4.121" Apr 12 18:48:40.374755 env[1055]: 2024-04-12 18:48:40.317 [INFO][2657] ipam.go 489: Trying affinity for 192.168.13.192/26 host="172.24.4.121" Apr 12 18:48:40.374755 env[1055]: 2024-04-12 18:48:40.320 [INFO][2657] ipam.go 155: Attempting to load block cidr=192.168.13.192/26 host="172.24.4.121" Apr 12 18:48:40.374755 env[1055]: 2024-04-12 18:48:40.323 [INFO][2657] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.192/26 host="172.24.4.121" Apr 12 18:48:40.374755 env[1055]: 2024-04-12 18:48:40.323 [INFO][2657] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.192/26 handle="k8s-pod-network.9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730" host="172.24.4.121" Apr 12 18:48:40.374755 env[1055]: 2024-04-12 18:48:40.327 [INFO][2657] ipam.go 1682: Creating new handle: k8s-pod-network.9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730 Apr 12 18:48:40.374755 env[1055]: 2024-04-12 18:48:40.335 [INFO][2657] ipam.go 1203: Writing block in order to claim IPs block=192.168.13.192/26 handle="k8s-pod-network.9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730" host="172.24.4.121" Apr 12 18:48:40.374755 env[1055]: 2024-04-12 18:48:40.346 [INFO][2657] ipam.go 1216: Successfully claimed IPs: [192.168.13.196/26] block=192.168.13.192/26 handle="k8s-pod-network.9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730" host="172.24.4.121" Apr 12 18:48:40.374755 env[1055]: 2024-04-12 18:48:40.346 [INFO][2657] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.196/26] handle="k8s-pod-network.9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730" host="172.24.4.121" Apr 12 18:48:40.374755 env[1055]: 2024-04-12 18:48:40.346 [INFO][2657] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:48:40.374755 env[1055]: 2024-04-12 18:48:40.346 [INFO][2657] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.13.196/26] IPv6=[] ContainerID="9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730" HandleID="k8s-pod-network.9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730" Workload="172.24.4.121-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:48:40.375452 env[1055]: 2024-04-12 18:48:40.347 [INFO][2637] k8s.go 385: Populated endpoint ContainerID="9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.121-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"f6ae8505-6478-465d-a656-5e46a27ee72f", ResourceVersion:"1098", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 48, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.121", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.13.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:48:40.375452 env[1055]: 2024-04-12 18:48:40.348 [INFO][2637] k8s.go 386: Calico CNI using IPs: [192.168.13.196/32] ContainerID="9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.121-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:48:40.375452 env[1055]: 2024-04-12 18:48:40.348 [INFO][2637] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.121-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:48:40.375452 env[1055]: 2024-04-12 18:48:40.354 [INFO][2637] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.121-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:48:40.375641 env[1055]: 2024-04-12 18:48:40.355 [INFO][2637] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.121-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"f6ae8505-6478-465d-a656-5e46a27ee72f", ResourceVersion:"1098", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 48, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.121", ContainerID:"9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.13.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"8a:e3:f5:e9:9a:0c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:48:40.375641 env[1055]: 2024-04-12 18:48:40.367 [INFO][2637] k8s.go 498: Wrote updated endpoint to datastore ContainerID="9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.121-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:48:40.380629 systemd[1]: Started cri-containerd-0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d.scope. Apr 12 18:48:40.403000 audit[2729]: NETFILTER_CFG table=filter:76 family=2 entries=42 op=nft_register_chain pid=2729 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:48:40.403000 audit[2729]: SYSCALL arch=c000003e syscall=46 success=yes exit=21008 a0=3 a1=7fff97624280 a2=0 a3=7fff9762426c items=0 ppid=2033 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:40.403000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:48:40.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.404000 audit: BPF prog-id=103 op=LOAD Apr 12 18:48:40.405000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.405000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2689 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:40.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032373261663233343433333731306232303061336230353165313835 Apr 12 18:48:40.405000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.405000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2689 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:40.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032373261663233343433333731306232303061336230353165313835 Apr 12 18:48:40.405000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.405000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.405000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.405000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.405000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.405000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.405000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.405000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.405000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.405000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.405000 audit: BPF prog-id=104 op=LOAD Apr 12 18:48:40.405000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001c85b0 items=0 ppid=2689 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:40.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032373261663233343433333731306232303061336230353165313835 Apr 12 18:48:40.406000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.406000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.406000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.406000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.406000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.406000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.406000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.406000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.406000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.406000 audit: BPF prog-id=105 op=LOAD Apr 12 18:48:40.406000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001c85f8 items=0 ppid=2689 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:40.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032373261663233343433333731306232303061336230353165313835 Apr 12 18:48:40.406000 audit: BPF prog-id=105 op=UNLOAD Apr 12 18:48:40.406000 audit: BPF prog-id=104 op=UNLOAD Apr 12 18:48:40.406000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.406000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.406000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.406000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.406000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.406000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.406000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.406000 audit[2698]: AVC avc: denied { perfmon } for pid=2698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.406000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.406000 audit[2698]: AVC avc: denied { bpf } for pid=2698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.406000 audit: BPF prog-id=106 op=LOAD Apr 12 18:48:40.406000 audit[2698]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001c8a08 items=0 ppid=2689 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:40.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032373261663233343433333731306232303061336230353165313835 Apr 12 18:48:40.416400 env[1055]: time="2024-04-12T18:48:40.416336814Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:48:40.416513 env[1055]: time="2024-04-12T18:48:40.416376773Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:48:40.416513 env[1055]: time="2024-04-12T18:48:40.416390741Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:48:40.416601 env[1055]: time="2024-04-12T18:48:40.416496331Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730 pid=2736 runtime=io.containerd.runc.v2 Apr 12 18:48:40.431511 systemd[1]: Started cri-containerd-9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730.scope. Apr 12 18:48:40.451410 env[1055]: time="2024-04-12T18:48:40.451365618Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c78b5f789-xzc8p,Uid:a52bd1d5-0322-42f2-8637-ecaffb20cf37,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d\"" Apr 12 18:48:40.455087 env[1055]: time="2024-04-12T18:48:40.455060925Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:48:40.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.459000 audit: BPF prog-id=107 op=LOAD Apr 12 18:48:40.460000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.460000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=2736 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:40.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965313464313039333865626633643162366566656165323664346639 Apr 12 18:48:40.460000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.460000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=c items=0 ppid=2736 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:40.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965313464313039333865626633643162366566656165323664346639 Apr 12 18:48:40.460000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.460000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.460000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.460000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.460000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.460000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.460000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.460000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.460000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.460000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.460000 audit: BPF prog-id=108 op=LOAD Apr 12 18:48:40.460000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c0003a4350 items=0 ppid=2736 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:40.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965313464313039333865626633643162366566656165323664346639 Apr 12 18:48:40.461000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.461000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.461000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.461000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.461000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.461000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.461000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.461000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.461000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.461000 audit: BPF prog-id=109 op=LOAD Apr 12 18:48:40.461000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c0003a4398 items=0 ppid=2736 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:40.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965313464313039333865626633643162366566656165323664346639 Apr 12 18:48:40.461000 audit: BPF prog-id=109 op=UNLOAD Apr 12 18:48:40.461000 audit: BPF prog-id=108 op=UNLOAD Apr 12 18:48:40.461000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.461000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.461000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.461000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.461000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.461000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.461000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.461000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.461000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.461000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:40.461000 audit: BPF prog-id=110 op=LOAD Apr 12 18:48:40.461000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c0003a47a8 items=0 ppid=2736 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:40.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965313464313039333865626633643162366566656165323664346639 Apr 12 18:48:40.492364 env[1055]: time="2024-04-12T18:48:40.492311037Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:f6ae8505-6478-465d-a656-5e46a27ee72f,Namespace:default,Attempt:0,} returns sandbox id \"9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730\"" Apr 12 18:48:40.708000 audit[2780]: NETFILTER_CFG table=filter:77 family=2 entries=33 op=nft_register_rule pid=2780 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:48:40.708000 audit[2780]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffc72ea7dd0 a2=0 a3=7ffc72ea7dbc items=0 ppid=1607 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:40.708000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:48:40.718000 audit[2780]: NETFILTER_CFG table=nat:78 family=2 entries=20 op=nft_register_rule pid=2780 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:48:40.718000 audit[2780]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc72ea7dd0 a2=0 a3=0 items=0 ppid=1607 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:40.718000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:48:40.799657 kubelet[1378]: E0412 18:48:40.799560 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:41.800132 kubelet[1378]: E0412 18:48:41.800022 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:42.104292 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2359510673.mount: Deactivated successfully. Apr 12 18:48:42.112766 systemd-networkd[972]: calidd624747e4e: Gained IPv6LL Apr 12 18:48:42.366979 systemd-networkd[972]: cali60e51b789ff: Gained IPv6LL Apr 12 18:48:42.800994 kubelet[1378]: E0412 18:48:42.800942 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:43.802161 kubelet[1378]: E0412 18:48:43.802093 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:44.594071 env[1055]: time="2024-04-12T18:48:44.593922176Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:44.602923 env[1055]: time="2024-04-12T18:48:44.602838324Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:44.609681 env[1055]: time="2024-04-12T18:48:44.609607712Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:44.612865 env[1055]: time="2024-04-12T18:48:44.612765253Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:44.614309 env[1055]: time="2024-04-12T18:48:44.614244630Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2\"" Apr 12 18:48:44.617442 env[1055]: time="2024-04-12T18:48:44.617388332Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Apr 12 18:48:44.623325 env[1055]: time="2024-04-12T18:48:44.623261307Z" level=info msg="CreateContainer within sandbox \"0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:48:44.658532 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4265456576.mount: Deactivated successfully. Apr 12 18:48:44.674501 env[1055]: time="2024-04-12T18:48:44.674368064Z" level=info msg="CreateContainer within sandbox \"0272af234433710b200a3b051e1850ffb6bbdaa8a1caf5988d0129458c57ac0d\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"690a5cf3c9d1a5e61595db0ac357dee9422765a0c4d9022dd7f5ed13c1ac82f8\"" Apr 12 18:48:44.677897 env[1055]: time="2024-04-12T18:48:44.677815286Z" level=info msg="StartContainer for \"690a5cf3c9d1a5e61595db0ac357dee9422765a0c4d9022dd7f5ed13c1ac82f8\"" Apr 12 18:48:44.730136 systemd[1]: Started cri-containerd-690a5cf3c9d1a5e61595db0ac357dee9422765a0c4d9022dd7f5ed13c1ac82f8.scope. Apr 12 18:48:44.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.779962 kernel: kauditd_printk_skb: 128 callbacks suppressed Apr 12 18:48:44.780113 kernel: audit: type=1400 audit(1712947724.777:764): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.786187 kernel: audit: type=1400 audit(1712947724.777:765): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.786257 kernel: audit: type=1400 audit(1712947724.777:766): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.794259 kernel: audit: type=1400 audit(1712947724.777:767): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.802503 kernel: audit: type=1400 audit(1712947724.777:768): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.802610 kernel: audit: type=1400 audit(1712947724.777:769): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.802647 kubelet[1378]: E0412 18:48:44.802386 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:44.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.807758 kernel: audit: type=1400 audit(1712947724.777:770): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.816755 kernel: audit: type=1400 audit(1712947724.777:771): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.826391 kernel: audit: type=1400 audit(1712947724.777:772): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.826470 kernel: audit: type=1400 audit(1712947724.778:773): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.778000 audit: BPF prog-id=111 op=LOAD Apr 12 18:48:44.778000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.778000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2689 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:44.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639306135636633633964316135653631353935646230616333353764 Apr 12 18:48:44.778000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.778000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2689 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:44.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639306135636633633964316135653631353935646230616333353764 Apr 12 18:48:44.778000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.778000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.778000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.778000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.778000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.778000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.778000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.778000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.778000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.778000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.778000 audit: BPF prog-id=112 op=LOAD Apr 12 18:48:44.778000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002fc8f0 items=0 ppid=2689 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:44.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639306135636633633964316135653631353935646230616333353764 Apr 12 18:48:44.785000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.785000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.785000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.785000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.785000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.785000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.785000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.785000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.785000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.785000 audit: BPF prog-id=113 op=LOAD Apr 12 18:48:44.785000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002fc938 items=0 ppid=2689 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:44.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639306135636633633964316135653631353935646230616333353764 Apr 12 18:48:44.788000 audit: BPF prog-id=113 op=UNLOAD Apr 12 18:48:44.789000 audit: BPF prog-id=112 op=UNLOAD Apr 12 18:48:44.789000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.789000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.789000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.789000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.789000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.789000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.789000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.789000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.789000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.789000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:44.789000 audit: BPF prog-id=114 op=LOAD Apr 12 18:48:44.789000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002fcd48 items=0 ppid=2689 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:44.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639306135636633633964316135653631353935646230616333353764 Apr 12 18:48:44.947235 env[1055]: time="2024-04-12T18:48:44.947072349Z" level=info msg="StartContainer for \"690a5cf3c9d1a5e61595db0ac357dee9422765a0c4d9022dd7f5ed13c1ac82f8\" returns successfully" Apr 12 18:48:45.430000 audit[2798]: AVC avc: denied { watch } for pid=2798 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_48_39.954089127/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c475,c987 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c475,c987 tclass=file permissive=0 Apr 12 18:48:45.430000 audit[2798]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000eeba00 a2=fc6 a3=0 items=0 ppid=2689 pid=2798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c475,c987 key=(null) Apr 12 18:48:45.430000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:48:45.802762 kubelet[1378]: E0412 18:48:45.802607 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:46.004889 kubelet[1378]: I0412 18:48:46.004683 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5c78b5f789-xzc8p" podStartSLOduration=2.843111666 podCreationTimestamp="2024-04-12 18:48:39 +0000 UTC" firstStartedPulling="2024-04-12 18:48:40.453833906 +0000 UTC m=+54.273671842" lastFinishedPulling="2024-04-12 18:48:44.615339387 +0000 UTC m=+58.435177373" observedRunningTime="2024-04-12 18:48:46.004109454 +0000 UTC m=+59.823947400" watchObservedRunningTime="2024-04-12 18:48:46.004617197 +0000 UTC m=+59.824455133" Apr 12 18:48:46.021000 audit[2820]: NETFILTER_CFG table=filter:79 family=2 entries=34 op=nft_register_rule pid=2820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:48:46.021000 audit[2820]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffc15d722a0 a2=0 a3=7ffc15d7228c items=0 ppid=1607 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:46.021000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:48:46.024000 audit[2820]: NETFILTER_CFG table=nat:80 family=2 entries=20 op=nft_register_rule pid=2820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:48:46.024000 audit[2820]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc15d722a0 a2=0 a3=0 items=0 ppid=1607 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:46.024000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:48:46.743011 kubelet[1378]: E0412 18:48:46.742926 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:46.793923 env[1055]: time="2024-04-12T18:48:46.767485216Z" level=info msg="StopPodSandbox for \"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\"" Apr 12 18:48:46.803202 kubelet[1378]: E0412 18:48:46.803128 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:47.119349 env[1055]: 2024-04-12 18:48:46.870 [WARNING][2833] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"c12468c8-15ca-4c5f-970c-115acc5f7541", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 48, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.121", ContainerID:"15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3", Pod:"nginx-deployment-6d5f899847-cj5xd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.13.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali82c9c42f114", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:48:47.119349 env[1055]: 2024-04-12 18:48:46.872 [INFO][2833] k8s.go 585: Cleaning up netns ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Apr 12 18:48:47.119349 env[1055]: 2024-04-12 18:48:46.873 [INFO][2833] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" iface="eth0" netns="" Apr 12 18:48:47.119349 env[1055]: 2024-04-12 18:48:46.873 [INFO][2833] k8s.go 592: Releasing IP address(es) ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Apr 12 18:48:47.119349 env[1055]: 2024-04-12 18:48:46.873 [INFO][2833] utils.go 188: Calico CNI releasing IP address ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Apr 12 18:48:47.119349 env[1055]: 2024-04-12 18:48:47.072 [INFO][2839] ipam_plugin.go 415: Releasing address using handleID ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" HandleID="k8s-pod-network.3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Workload="172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0" Apr 12 18:48:47.119349 env[1055]: 2024-04-12 18:48:47.072 [INFO][2839] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:48:47.119349 env[1055]: 2024-04-12 18:48:47.072 [INFO][2839] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:48:47.119349 env[1055]: 2024-04-12 18:48:47.098 [WARNING][2839] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" HandleID="k8s-pod-network.3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Workload="172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0" Apr 12 18:48:47.119349 env[1055]: 2024-04-12 18:48:47.098 [INFO][2839] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" HandleID="k8s-pod-network.3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Workload="172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0" Apr 12 18:48:47.119349 env[1055]: 2024-04-12 18:48:47.113 [INFO][2839] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:48:47.119349 env[1055]: 2024-04-12 18:48:47.116 [INFO][2833] k8s.go 598: Teardown processing complete. ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Apr 12 18:48:47.121614 env[1055]: time="2024-04-12T18:48:47.121526249Z" level=info msg="TearDown network for sandbox \"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\" successfully" Apr 12 18:48:47.121908 env[1055]: time="2024-04-12T18:48:47.121858334Z" level=info msg="StopPodSandbox for \"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\" returns successfully" Apr 12 18:48:47.124086 env[1055]: time="2024-04-12T18:48:47.123990914Z" level=info msg="RemovePodSandbox for \"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\"" Apr 12 18:48:47.124280 env[1055]: time="2024-04-12T18:48:47.124084358Z" level=info msg="Forcibly stopping sandbox \"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\"" Apr 12 18:48:47.319270 env[1055]: 2024-04-12 18:48:47.247 [WARNING][2859] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"c12468c8-15ca-4c5f-970c-115acc5f7541", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 48, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.121", ContainerID:"15b40011df1938d9c398ebe1b8b715a8a12317e57cc5709cb5466871615b61f3", Pod:"nginx-deployment-6d5f899847-cj5xd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.13.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali82c9c42f114", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:48:47.319270 env[1055]: 2024-04-12 18:48:47.248 [INFO][2859] k8s.go 585: Cleaning up netns ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Apr 12 18:48:47.319270 env[1055]: 2024-04-12 18:48:47.248 [INFO][2859] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" iface="eth0" netns="" Apr 12 18:48:47.319270 env[1055]: 2024-04-12 18:48:47.248 [INFO][2859] k8s.go 592: Releasing IP address(es) ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Apr 12 18:48:47.319270 env[1055]: 2024-04-12 18:48:47.248 [INFO][2859] utils.go 188: Calico CNI releasing IP address ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Apr 12 18:48:47.319270 env[1055]: 2024-04-12 18:48:47.299 [INFO][2865] ipam_plugin.go 415: Releasing address using handleID ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" HandleID="k8s-pod-network.3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Workload="172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0" Apr 12 18:48:47.319270 env[1055]: 2024-04-12 18:48:47.299 [INFO][2865] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:48:47.319270 env[1055]: 2024-04-12 18:48:47.299 [INFO][2865] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:48:47.319270 env[1055]: 2024-04-12 18:48:47.310 [WARNING][2865] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" HandleID="k8s-pod-network.3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Workload="172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0" Apr 12 18:48:47.319270 env[1055]: 2024-04-12 18:48:47.310 [INFO][2865] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" HandleID="k8s-pod-network.3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Workload="172.24.4.121-k8s-nginx--deployment--6d5f899847--cj5xd-eth0" Apr 12 18:48:47.319270 env[1055]: 2024-04-12 18:48:47.312 [INFO][2865] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:48:47.319270 env[1055]: 2024-04-12 18:48:47.313 [INFO][2859] k8s.go 598: Teardown processing complete. ContainerID="3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba" Apr 12 18:48:47.319953 env[1055]: time="2024-04-12T18:48:47.319287978Z" level=info msg="TearDown network for sandbox \"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\" successfully" Apr 12 18:48:47.325749 env[1055]: time="2024-04-12T18:48:47.325690115Z" level=info msg="RemovePodSandbox \"3acc2393d9d91ee14a6ebfa04fd7939fec304b7ed19a8c8c419a0a3d3caba9ba\" returns successfully" Apr 12 18:48:47.349730 env[1055]: time="2024-04-12T18:48:47.349665142Z" level=info msg="StopPodSandbox for \"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\"" Apr 12 18:48:47.567884 env[1055]: 2024-04-12 18:48:47.494 [WARNING][2886] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121-k8s-csi--node--driver--7m955-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"11ec87fb-2946-4b3a-9964-c58b0a4e068a", ResourceVersion:"1019", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 47, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.121", ContainerID:"b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be", Pod:"csi-node-driver-7m955", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.13.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali2bf92ca3627", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:48:47.567884 env[1055]: 2024-04-12 18:48:47.494 [INFO][2886] k8s.go 585: Cleaning up netns ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Apr 12 18:48:47.567884 env[1055]: 2024-04-12 18:48:47.494 [INFO][2886] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" iface="eth0" netns="" Apr 12 18:48:47.567884 env[1055]: 2024-04-12 18:48:47.494 [INFO][2886] k8s.go 592: Releasing IP address(es) ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Apr 12 18:48:47.567884 env[1055]: 2024-04-12 18:48:47.494 [INFO][2886] utils.go 188: Calico CNI releasing IP address ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Apr 12 18:48:47.567884 env[1055]: 2024-04-12 18:48:47.538 [INFO][2892] ipam_plugin.go 415: Releasing address using handleID ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" HandleID="k8s-pod-network.63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Workload="172.24.4.121-k8s-csi--node--driver--7m955-eth0" Apr 12 18:48:47.567884 env[1055]: 2024-04-12 18:48:47.538 [INFO][2892] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:48:47.567884 env[1055]: 2024-04-12 18:48:47.538 [INFO][2892] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:48:47.567884 env[1055]: 2024-04-12 18:48:47.546 [WARNING][2892] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" HandleID="k8s-pod-network.63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Workload="172.24.4.121-k8s-csi--node--driver--7m955-eth0" Apr 12 18:48:47.567884 env[1055]: 2024-04-12 18:48:47.546 [INFO][2892] ipam_plugin.go 443: Releasing address using workloadID ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" HandleID="k8s-pod-network.63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Workload="172.24.4.121-k8s-csi--node--driver--7m955-eth0" Apr 12 18:48:47.567884 env[1055]: 2024-04-12 18:48:47.548 [INFO][2892] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:48:47.567884 env[1055]: 2024-04-12 18:48:47.551 [INFO][2886] k8s.go 598: Teardown processing complete. ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Apr 12 18:48:47.568453 env[1055]: time="2024-04-12T18:48:47.567895787Z" level=info msg="TearDown network for sandbox \"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\" successfully" Apr 12 18:48:47.568453 env[1055]: time="2024-04-12T18:48:47.567922960Z" level=info msg="StopPodSandbox for \"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\" returns successfully" Apr 12 18:48:47.588764 env[1055]: time="2024-04-12T18:48:47.588176070Z" level=info msg="RemovePodSandbox for \"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\"" Apr 12 18:48:47.588764 env[1055]: time="2024-04-12T18:48:47.588224906Z" level=info msg="Forcibly stopping sandbox \"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\"" Apr 12 18:48:47.802373 env[1055]: 2024-04-12 18:48:47.734 [WARNING][2915] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121-k8s-csi--node--driver--7m955-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"11ec87fb-2946-4b3a-9964-c58b0a4e068a", ResourceVersion:"1019", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 47, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.121", ContainerID:"b70aa9028d91d79bc9a7a49322abc76b94932ee164e4d3c32bdfa21fed1642be", Pod:"csi-node-driver-7m955", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.13.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali2bf92ca3627", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:48:47.802373 env[1055]: 2024-04-12 18:48:47.734 [INFO][2915] k8s.go 585: Cleaning up netns ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Apr 12 18:48:47.802373 env[1055]: 2024-04-12 18:48:47.734 [INFO][2915] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" iface="eth0" netns="" Apr 12 18:48:47.802373 env[1055]: 2024-04-12 18:48:47.734 [INFO][2915] k8s.go 592: Releasing IP address(es) ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Apr 12 18:48:47.802373 env[1055]: 2024-04-12 18:48:47.734 [INFO][2915] utils.go 188: Calico CNI releasing IP address ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Apr 12 18:48:47.802373 env[1055]: 2024-04-12 18:48:47.780 [INFO][2921] ipam_plugin.go 415: Releasing address using handleID ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" HandleID="k8s-pod-network.63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Workload="172.24.4.121-k8s-csi--node--driver--7m955-eth0" Apr 12 18:48:47.802373 env[1055]: 2024-04-12 18:48:47.786 [INFO][2921] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:48:47.802373 env[1055]: 2024-04-12 18:48:47.786 [INFO][2921] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:48:47.802373 env[1055]: 2024-04-12 18:48:47.795 [WARNING][2921] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" HandleID="k8s-pod-network.63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Workload="172.24.4.121-k8s-csi--node--driver--7m955-eth0" Apr 12 18:48:47.802373 env[1055]: 2024-04-12 18:48:47.795 [INFO][2921] ipam_plugin.go 443: Releasing address using workloadID ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" HandleID="k8s-pod-network.63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Workload="172.24.4.121-k8s-csi--node--driver--7m955-eth0" Apr 12 18:48:47.802373 env[1055]: 2024-04-12 18:48:47.797 [INFO][2921] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:48:47.802373 env[1055]: 2024-04-12 18:48:47.800 [INFO][2915] k8s.go 598: Teardown processing complete. ContainerID="63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886" Apr 12 18:48:47.803328 env[1055]: time="2024-04-12T18:48:47.803285965Z" level=info msg="TearDown network for sandbox \"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\" successfully" Apr 12 18:48:47.803975 kubelet[1378]: E0412 18:48:47.803931 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:47.803000 audit[2928]: NETFILTER_CFG table=filter:81 family=2 entries=34 op=nft_register_rule pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:48:47.803000 audit[2928]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffe2e2d1d90 a2=0 a3=7ffe2e2d1d7c items=0 ppid=1607 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:47.803000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:48:47.807584 env[1055]: time="2024-04-12T18:48:47.807551684Z" level=info msg="RemovePodSandbox \"63fdc01b4afe2c6f97217cf643aee4d09b22b50c6a1d2c91cf696b64cfbcc886\" returns successfully" Apr 12 18:48:47.804000 audit[2928]: NETFILTER_CFG table=nat:82 family=2 entries=20 op=nft_register_rule pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:48:47.804000 audit[2928]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe2e2d1d90 a2=0 a3=0 items=0 ppid=1607 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:47.804000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:48:48.804912 kubelet[1378]: E0412 18:48:48.804811 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:49.225631 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2043637902.mount: Deactivated successfully. Apr 12 18:48:49.805474 kubelet[1378]: E0412 18:48:49.805363 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:50.806634 kubelet[1378]: E0412 18:48:50.806498 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:51.807333 kubelet[1378]: E0412 18:48:51.807231 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:52.807872 kubelet[1378]: E0412 18:48:52.807808 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:53.172931 env[1055]: time="2024-04-12T18:48:53.172616370Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:53.177213 env[1055]: time="2024-04-12T18:48:53.177134342Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:53.181655 env[1055]: time="2024-04-12T18:48:53.181591224Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:53.186111 env[1055]: time="2024-04-12T18:48:53.186049870Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:53.188177 env[1055]: time="2024-04-12T18:48:53.188112064Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Apr 12 18:48:53.195222 env[1055]: time="2024-04-12T18:48:53.195130213Z" level=info msg="CreateContainer within sandbox \"9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Apr 12 18:48:53.238208 env[1055]: time="2024-04-12T18:48:53.238120841Z" level=info msg="CreateContainer within sandbox \"9e14d10938ebf3d1b6efeae26d4f97ac4b2288b67bf3ae57889de319a94e9730\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"6e57c2237b9cba69912bb66c39e398390004fc6d43eeabbe1a532218ec98701e\"" Apr 12 18:48:53.240006 env[1055]: time="2024-04-12T18:48:53.239936080Z" level=info msg="StartContainer for \"6e57c2237b9cba69912bb66c39e398390004fc6d43eeabbe1a532218ec98701e\"" Apr 12 18:48:53.283915 systemd[1]: Started cri-containerd-6e57c2237b9cba69912bb66c39e398390004fc6d43eeabbe1a532218ec98701e.scope. Apr 12 18:48:53.301955 kernel: kauditd_printk_skb: 62 callbacks suppressed Apr 12 18:48:53.302089 kernel: audit: type=1400 audit(1712947733.299:787): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.318208 kernel: audit: type=1400 audit(1712947733.299:788): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.318270 kernel: audit: type=1400 audit(1712947733.299:789): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.326234 kernel: audit: type=1400 audit(1712947733.299:790): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.342884 kernel: audit: type=1400 audit(1712947733.299:791): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.342957 kernel: audit: type=1400 audit(1712947733.299:792): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.346558 kernel: audit: type=1400 audit(1712947733.299:793): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.350811 kernel: audit: type=1400 audit(1712947733.299:794): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.357888 kernel: audit: type=1400 audit(1712947733.299:795): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.357948 kernel: audit: type=1400 audit(1712947733.301:796): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.301000 audit: BPF prog-id=115 op=LOAD Apr 12 18:48:53.309000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.309000 audit[2945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2736 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:53.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665353763323233376239636261363939313262623636633339653339 Apr 12 18:48:53.309000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.309000 audit[2945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2736 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:53.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665353763323233376239636261363939313262623636633339653339 Apr 12 18:48:53.309000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.309000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.309000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.309000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.309000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.309000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.309000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.309000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.309000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.309000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.309000 audit: BPF prog-id=116 op=LOAD Apr 12 18:48:53.309000 audit[2945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a1050 items=0 ppid=2736 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:53.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665353763323233376239636261363939313262623636633339653339 Apr 12 18:48:53.332000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.332000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.332000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.332000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.332000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.332000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.332000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.332000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.332000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.332000 audit: BPF prog-id=117 op=LOAD Apr 12 18:48:53.332000 audit[2945]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a1098 items=0 ppid=2736 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:53.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665353763323233376239636261363939313262623636633339653339 Apr 12 18:48:53.332000 audit: BPF prog-id=117 op=UNLOAD Apr 12 18:48:53.333000 audit: BPF prog-id=116 op=UNLOAD Apr 12 18:48:53.333000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.333000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.333000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.333000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.333000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.333000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.333000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.333000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.333000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.333000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:53.333000 audit: BPF prog-id=118 op=LOAD Apr 12 18:48:53.333000 audit[2945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a14a8 items=0 ppid=2736 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:53.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665353763323233376239636261363939313262623636633339653339 Apr 12 18:48:53.375503 env[1055]: time="2024-04-12T18:48:53.375420401Z" level=info msg="StartContainer for \"6e57c2237b9cba69912bb66c39e398390004fc6d43eeabbe1a532218ec98701e\" returns successfully" Apr 12 18:48:53.421000 audit[2973]: AVC avc: denied { search } for pid=2973 comm="rpcbind" name="crypto" dev="proc" ino=22655 scontext=system_u:system_r:svirt_lxc_net_t:s0:c233,c709 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 18:48:53.421000 audit[2973]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f519ebd00c0 a2=0 a3=0 items=0 ppid=2956 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c233,c709 key=(null) Apr 12 18:48:53.421000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Apr 12 18:48:53.501000 audit[2978]: AVC avc: denied { search } for pid=2978 comm="dbus-daemon" name="crypto" dev="proc" ino=22655 scontext=system_u:system_r:svirt_lxc_net_t:s0:c233,c709 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 18:48:53.501000 audit[2978]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f50bf4500c0 a2=0 a3=0 items=0 ppid=2956 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c233,c709 key=(null) Apr 12 18:48:53.501000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 18:48:53.504000 audit[2979]: AVC avc: denied { watch } for pid=2979 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538188 scontext=system_u:system_r:svirt_lxc_net_t:s0:c233,c709 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c233,c709 tclass=dir permissive=0 Apr 12 18:48:53.504000 audit[2979]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55aed24570b0 a2=2c8 a3=7fffa3740ecc items=0 ppid=2956 pid=2979 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c233,c709 key=(null) Apr 12 18:48:53.504000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 18:48:53.508000 audit[2980]: AVC avc: denied { read } for pid=2980 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22680 scontext=system_u:system_r:svirt_lxc_net_t:s0:c233,c709 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Apr 12 18:48:53.508000 audit[2980]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f44f534a320 a1=80000 a2=d a3=7fff822a6820 items=0 ppid=2956 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c233,c709 key=(null) Apr 12 18:48:53.508000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 18:48:53.509000 audit[2980]: AVC avc: denied { search } for pid=2980 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22655 scontext=system_u:system_r:svirt_lxc_net_t:s0:c233,c709 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 18:48:53.509000 audit[2980]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f44f489e0c0 a2=0 a3=0 items=0 ppid=2956 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c233,c709 key=(null) Apr 12 18:48:53.509000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 18:48:53.809167 kubelet[1378]: E0412 18:48:53.809054 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:54.047877 kubelet[1378]: I0412 18:48:54.047797 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.352423826 podCreationTimestamp="2024-04-12 18:48:39 +0000 UTC" firstStartedPulling="2024-04-12 18:48:40.493648616 +0000 UTC m=+54.313486552" lastFinishedPulling="2024-04-12 18:48:53.188885715 +0000 UTC m=+67.008723701" observedRunningTime="2024-04-12 18:48:54.047095554 +0000 UTC m=+67.866933540" watchObservedRunningTime="2024-04-12 18:48:54.047660975 +0000 UTC m=+67.867498961" Apr 12 18:48:54.089000 audit[2985]: NETFILTER_CFG table=filter:83 family=2 entries=22 op=nft_register_rule pid=2985 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:48:54.089000 audit[2985]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc9f5a23c0 a2=0 a3=7ffc9f5a23ac items=0 ppid=1607 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:54.089000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:48:54.096000 audit[2985]: NETFILTER_CFG table=nat:84 family=2 entries=104 op=nft_register_chain pid=2985 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:48:54.096000 audit[2985]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffc9f5a23c0 a2=0 a3=7ffc9f5a23ac items=0 ppid=1607 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:54.096000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:48:54.213618 systemd[1]: run-containerd-runc-k8s.io-6e57c2237b9cba69912bb66c39e398390004fc6d43eeabbe1a532218ec98701e-runc.RaoyKZ.mount: Deactivated successfully. Apr 12 18:48:54.810555 kubelet[1378]: E0412 18:48:54.810457 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:55.811051 kubelet[1378]: E0412 18:48:55.810942 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:56.812016 kubelet[1378]: E0412 18:48:56.811953 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:57.813602 kubelet[1378]: E0412 18:48:57.813508 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:58.814317 kubelet[1378]: E0412 18:48:58.814248 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:48:59.816369 kubelet[1378]: E0412 18:48:59.816174 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:00.817051 kubelet[1378]: E0412 18:49:00.816938 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:01.817853 kubelet[1378]: E0412 18:49:01.817781 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:02.819652 kubelet[1378]: E0412 18:49:02.819547 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:03.820885 kubelet[1378]: E0412 18:49:03.820794 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:04.821079 kubelet[1378]: E0412 18:49:04.821010 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:05.822802 kubelet[1378]: E0412 18:49:05.822576 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:06.742190 kubelet[1378]: E0412 18:49:06.742128 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:06.823748 kubelet[1378]: E0412 18:49:06.823640 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:07.824321 kubelet[1378]: E0412 18:49:07.824209 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:08.825629 kubelet[1378]: E0412 18:49:08.825567 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:09.827022 kubelet[1378]: E0412 18:49:09.826925 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:10.178000 audit[3069]: NETFILTER_CFG table=filter:85 family=2 entries=9 op=nft_register_rule pid=3069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:10.182058 kernel: kauditd_printk_skb: 68 callbacks suppressed Apr 12 18:49:10.182116 kernel: audit: type=1325 audit(1712947750.178:812): table=filter:85 family=2 entries=9 op=nft_register_rule pid=3069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:10.178000 audit[3069]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcfb189180 a2=0 a3=7ffcfb18916c items=0 ppid=1607 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:10.178000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:10.207409 kernel: audit: type=1300 audit(1712947750.178:812): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcfb189180 a2=0 a3=7ffcfb18916c items=0 ppid=1607 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:10.207517 kernel: audit: type=1327 audit(1712947750.178:812): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:10.207544 kernel: audit: type=1325 audit(1712947750.180:813): table=nat:86 family=2 entries=51 op=nft_register_chain pid=3069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:10.180000 audit[3069]: NETFILTER_CFG table=nat:86 family=2 entries=51 op=nft_register_chain pid=3069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:10.180000 audit[3069]: SYSCALL arch=c000003e syscall=46 success=yes exit=18564 a0=3 a1=7ffcfb189180 a2=0 a3=7ffcfb18916c items=0 ppid=1607 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:10.226115 kernel: audit: type=1300 audit(1712947750.180:813): arch=c000003e syscall=46 success=yes exit=18564 a0=3 a1=7ffcfb189180 a2=0 a3=7ffcfb18916c items=0 ppid=1607 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:10.226205 kernel: audit: type=1327 audit(1712947750.180:813): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:10.180000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:10.827441 kubelet[1378]: E0412 18:49:10.827339 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:11.690000 audit[3076]: NETFILTER_CFG table=filter:87 family=2 entries=8 op=nft_register_rule pid=3076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:11.690000 audit[3076]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd6046d120 a2=0 a3=7ffd6046d10c items=0 ppid=1607 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:11.713851 kernel: audit: type=1325 audit(1712947751.690:814): table=filter:87 family=2 entries=8 op=nft_register_rule pid=3076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:11.714091 kernel: audit: type=1300 audit(1712947751.690:814): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd6046d120 a2=0 a3=7ffd6046d10c items=0 ppid=1607 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:11.714156 kernel: audit: type=1327 audit(1712947751.690:814): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:11.690000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:11.699000 audit[3076]: NETFILTER_CFG table=nat:88 family=2 entries=58 op=nft_register_chain pid=3076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:11.699000 audit[3076]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7ffd6046d120 a2=0 a3=7ffd6046d10c items=0 ppid=1607 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:11.730934 kernel: audit: type=1325 audit(1712947751.699:815): table=nat:88 family=2 entries=58 op=nft_register_chain pid=3076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:11.699000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:11.828178 kubelet[1378]: E0412 18:49:11.828063 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:12.828607 kubelet[1378]: E0412 18:49:12.828486 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:13.829166 kubelet[1378]: E0412 18:49:13.829061 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:14.830212 kubelet[1378]: E0412 18:49:14.830133 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:15.831957 kubelet[1378]: E0412 18:49:15.831852 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:16.833337 kubelet[1378]: E0412 18:49:16.833041 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:17.834246 kubelet[1378]: E0412 18:49:17.834156 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:18.414451 kubelet[1378]: I0412 18:49:18.414356 1378 topology_manager.go:215] "Topology Admit Handler" podUID="236e9a75-836a-4b0e-aa30-738be6f005e1" podNamespace="default" podName="test-pod-1" Apr 12 18:49:18.427850 systemd[1]: Created slice kubepods-besteffort-pod236e9a75_836a_4b0e_aa30_738be6f005e1.slice. Apr 12 18:49:18.527960 kubelet[1378]: I0412 18:49:18.527895 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-49bb898f-8b85-43c3-8a3e-0c180ec67531\" (UniqueName: \"kubernetes.io/nfs/236e9a75-836a-4b0e-aa30-738be6f005e1-pvc-49bb898f-8b85-43c3-8a3e-0c180ec67531\") pod \"test-pod-1\" (UID: \"236e9a75-836a-4b0e-aa30-738be6f005e1\") " pod="default/test-pod-1" Apr 12 18:49:18.528261 kubelet[1378]: I0412 18:49:18.528002 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6bl62\" (UniqueName: \"kubernetes.io/projected/236e9a75-836a-4b0e-aa30-738be6f005e1-kube-api-access-6bl62\") pod \"test-pod-1\" (UID: \"236e9a75-836a-4b0e-aa30-738be6f005e1\") " pod="default/test-pod-1" Apr 12 18:49:18.704000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.723745 kernel: Failed to create system directory netfs Apr 12 18:49:18.724010 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 18:49:18.724073 kernel: audit: type=1400 audit(1712947758.704:816): avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.724130 kernel: Failed to create system directory netfs Apr 12 18:49:18.724186 kernel: audit: type=1400 audit(1712947758.704:816): avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.704000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.735417 kernel: Failed to create system directory netfs Apr 12 18:49:18.735655 kernel: audit: type=1400 audit(1712947758.704:816): avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.704000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.748313 kernel: Failed to create system directory netfs Apr 12 18:49:18.748519 kernel: audit: type=1400 audit(1712947758.704:816): avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.704000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.704000 audit[3080]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561a1a5995e0 a1=153bc a2=561a195e02b0 a3=5 items=0 ppid=50 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:18.773193 kernel: audit: type=1300 audit(1712947758.704:816): arch=c000003e syscall=175 success=yes exit=0 a0=561a1a5995e0 a1=153bc a2=561a195e02b0 a3=5 items=0 ppid=50 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:18.773302 kernel: audit: type=1327 audit(1712947758.704:816): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:49:18.704000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:49:18.779000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.785899 kernel: Failed to create system directory fscache Apr 12 18:49:18.785941 kernel: audit: type=1400 audit(1712947758.779:817): avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.790189 kernel: Failed to create system directory fscache Apr 12 18:49:18.790228 kernel: audit: type=1400 audit(1712947758.779:817): avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.779000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.793986 kernel: Failed to create system directory fscache Apr 12 18:49:18.798716 kernel: audit: type=1400 audit(1712947758.779:817): avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.798788 kernel: Failed to create system directory fscache Apr 12 18:49:18.779000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.803725 kernel: audit: type=1400 audit(1712947758.779:817): avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.803777 kernel: Failed to create system directory fscache Apr 12 18:49:18.779000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.779000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.804725 kernel: Failed to create system directory fscache Apr 12 18:49:18.779000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.779000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.806564 kernel: Failed to create system directory fscache Apr 12 18:49:18.806594 kernel: Failed to create system directory fscache Apr 12 18:49:18.779000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.779000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.808389 kernel: Failed to create system directory fscache Apr 12 18:49:18.808428 kernel: Failed to create system directory fscache Apr 12 18:49:18.779000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.779000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.810279 kernel: Failed to create system directory fscache Apr 12 18:49:18.810317 kernel: Failed to create system directory fscache Apr 12 18:49:18.779000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.779000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.812084 kernel: Failed to create system directory fscache Apr 12 18:49:18.812120 kernel: Failed to create system directory fscache Apr 12 18:49:18.779000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.815762 kernel: FS-Cache: Loaded Apr 12 18:49:18.779000 audit[3080]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561a1a7ae9c0 a1=4c0fc a2=561a195e02b0 a3=5 items=0 ppid=50 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:18.779000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:49:18.835346 kubelet[1378]: E0412 18:49:18.835292 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.867696 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.867819 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.867871 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.868810 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.869778 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.871688 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.871803 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.874269 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.874373 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.875339 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.876311 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.877406 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.878449 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.879397 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.880343 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.881336 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.882405 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.883497 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.884542 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.885610 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.886670 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.887778 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.889842 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.889974 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.892212 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.892372 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.894557 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.894667 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.895622 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.896737 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.897791 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.898856 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.899962 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.901002 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.902042 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.903055 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.905377 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.905531 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.906302 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.907308 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.908240 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.909272 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.910335 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.911519 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.912596 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.913627 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.914758 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.915802 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.916850 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.919854 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.919972 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.920022 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.920866 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.921894 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.923925 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.924082 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.925135 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.926199 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.927216 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.928198 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.929240 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.930263 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.931261 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.932302 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.934896 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.935053 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.935541 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.936648 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.937682 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.938681 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.939953 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.940764 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.941834 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.942772 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.943693 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.944670 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.945743 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.946762 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.947808 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.948893 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.949900 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.950885 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.951904 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.952992 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.953997 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.955063 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.956108 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.957170 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.958193 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.959197 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.961255 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.961398 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.962345 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.963340 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.964390 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.965386 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.966411 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.967323 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.968197 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.969238 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.970254 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.971251 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.972198 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.973397 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.974400 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.981899 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.982093 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.982143 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.982203 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.982248 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.982291 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.982329 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.984214 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.984370 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.985161 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.986175 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.987142 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.988128 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.989046 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.990007 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.991044 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.992094 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.993063 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.994056 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.995125 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:18.998389 kernel: Failed to create system directory sunrpc Apr 12 18:49:18.847000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.014178 kernel: RPC: Registered named UNIX socket transport module. Apr 12 18:49:19.014375 kernel: RPC: Registered udp transport module. Apr 12 18:49:19.014484 kernel: RPC: Registered tcp transport module. Apr 12 18:49:19.015183 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Apr 12 18:49:18.847000 audit[3080]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561a1a7faad0 a1=1a7e9c a2=561a195e02b0 a3=5 items=6 ppid=50 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:18.847000 audit: CWD cwd="/" Apr 12 18:49:18.847000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:49:18.847000 audit: PATH item=1 name=(null) inode=24011 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:49:18.847000 audit: PATH item=2 name=(null) inode=24011 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:49:18.847000 audit: PATH item=3 name=(null) inode=24012 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:49:18.847000 audit: PATH item=4 name=(null) inode=24011 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:49:18.847000 audit: PATH item=5 name=(null) inode=24013 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:49:18.847000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.077306 kernel: Failed to create system directory nfs Apr 12 18:49:19.077456 kernel: Failed to create system directory nfs Apr 12 18:49:19.077519 kernel: Failed to create system directory nfs Apr 12 18:49:19.077567 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.078346 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.080132 kernel: Failed to create system directory nfs Apr 12 18:49:19.080288 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.082193 kernel: Failed to create system directory nfs Apr 12 18:49:19.082315 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.083253 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.084301 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.085346 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.086384 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.087449 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.088490 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.089532 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.094580 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.095787 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.096820 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.097846 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.099702 kernel: Failed to create system directory nfs Apr 12 18:49:19.099850 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.100875 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.101916 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.104684 kernel: Failed to create system directory nfs Apr 12 18:49:19.104804 kernel: Failed to create system directory nfs Apr 12 18:49:19.104868 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.105796 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.106758 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.107814 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.108823 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.111682 kernel: Failed to create system directory nfs Apr 12 18:49:19.111849 kernel: Failed to create system directory nfs Apr 12 18:49:19.111901 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.112800 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.115643 kernel: Failed to create system directory nfs Apr 12 18:49:19.115807 kernel: Failed to create system directory nfs Apr 12 18:49:19.115972 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.116826 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.117745 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.118907 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.121045 kernel: Failed to create system directory nfs Apr 12 18:49:19.121188 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.122086 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.123039 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.125200 kernel: Failed to create system directory nfs Apr 12 18:49:19.125353 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.128561 kernel: Failed to create system directory nfs Apr 12 18:49:19.128659 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.129260 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.131124 kernel: Failed to create system directory nfs Apr 12 18:49:19.131274 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.133238 kernel: Failed to create system directory nfs Apr 12 18:49:19.133397 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.134217 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.135383 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.137301 kernel: Failed to create system directory nfs Apr 12 18:49:19.137433 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.138294 kernel: Failed to create system directory nfs Apr 12 18:49:19.060000 audit[3080]: AVC avc: denied { confidentiality } for pid=3080 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.168814 kernel: FS-Cache: Netfs 'nfs' registered for caching Apr 12 18:49:19.060000 audit[3080]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561a1aa1b670 a1=16d85c a2=561a195e02b0 a3=5 items=0 ppid=50 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:19.060000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.234629 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.234685 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.234739 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.234772 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.236956 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.236993 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.239111 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.239148 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.241724 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.241761 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.242651 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.243635 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.245648 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.245688 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.247610 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.247647 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.248572 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.249781 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.251790 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.251833 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.254088 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.254129 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.256124 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.256157 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.258201 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.258245 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.259347 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.260495 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.261547 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.263475 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.263510 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.264526 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.265791 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.267877 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.267917 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.269800 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.269833 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.271683 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.271740 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.272673 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.273898 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.276064 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.276104 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.278276 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.278314 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.280337 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.280380 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.281330 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.282388 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.284495 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.284538 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.286860 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.286902 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.289089 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.289138 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.290361 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.293028 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.293065 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.295066 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.295120 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.296087 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.298171 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.298212 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.300159 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.300189 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.302159 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.302206 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.304377 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.304422 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.306395 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.306433 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.307259 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.308121 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.309068 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.310057 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.310975 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.312212 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.313253 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.314127 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.315085 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.316074 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.318701 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.322862 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.322899 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.322940 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.324936 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.326137 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.328175 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.328212 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.329147 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.330066 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.330972 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.331900 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.332855 kernel: Failed to create system directory nfs4 Apr 12 18:49:19.206000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.509555 kernel: NFS: Registering the id_resolver key type Apr 12 18:49:19.509886 kernel: Key type id_resolver registered Apr 12 18:49:19.509948 kernel: Key type id_legacy registered Apr 12 18:49:19.206000 audit[3085]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7ff9bae0b010 a1=208ac4 a2=56106925f2b0 a3=5 items=0 ppid=50 pid=3085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:19.206000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.579057 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.579164 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.579206 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.583517 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.583607 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.588187 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.588292 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.593313 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.597747 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.601864 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.601963 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.603973 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.606007 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.608283 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.610527 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.612524 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.614539 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.615794 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.618591 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.618750 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.622396 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.622532 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.624119 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.625957 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.627667 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.563000 audit[3086]: AVC avc: denied { confidentiality } for pid=3086 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:49:19.631241 kernel: Failed to create system directory rpcgss Apr 12 18:49:19.563000 audit[3086]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f30bd6c6010 a1=70c3c a2=563fa6ada2b0 a3=5 items=0 ppid=50 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:19.563000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Apr 12 18:49:19.694332 nfsidmap[3093]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Apr 12 18:49:19.703753 nfsidmap[3094]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Apr 12 18:49:19.724000 audit[1125]: AVC avc: denied { watch_reads } for pid=1125 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2539 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:49:19.724000 audit[1125]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55ec16894550 a2=10 a3=3cabc6ee1ecbbb5b items=0 ppid=1 pid=1125 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:19.724000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:49:19.724000 audit[1125]: AVC avc: denied { watch_reads } for pid=1125 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2539 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:49:19.724000 audit[1125]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55ec16894550 a2=10 a3=3cabc6ee1ecbbb5b items=0 ppid=1 pid=1125 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:19.724000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:49:19.724000 audit[1125]: AVC avc: denied { watch_reads } for pid=1125 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2539 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:49:19.724000 audit[1125]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55ec16894550 a2=10 a3=3cabc6ee1ecbbb5b items=0 ppid=1 pid=1125 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:19.724000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:49:19.724000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2539 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:49:19.725000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2539 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:49:19.725000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2539 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:49:19.836676 kubelet[1378]: E0412 18:49:19.836609 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:19.938031 env[1055]: time="2024-04-12T18:49:19.937855929Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:236e9a75-836a-4b0e-aa30-738be6f005e1,Namespace:default,Attempt:0,}" Apr 12 18:49:20.212028 systemd-networkd[972]: cali5ec59c6bf6e: Link UP Apr 12 18:49:20.218178 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:49:20.218343 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Apr 12 18:49:20.219236 systemd-networkd[972]: cali5ec59c6bf6e: Gained carrier Apr 12 18:49:20.256835 env[1055]: 2024-04-12 18:49:20.059 [INFO][3096] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.121-k8s-test--pod--1-eth0 default 236e9a75-836a-4b0e-aa30-738be6f005e1 1255 0 2024-04-12 18:48:42 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.121 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.121-k8s-test--pod--1-" Apr 12 18:49:20.256835 env[1055]: 2024-04-12 18:49:20.060 [INFO][3096] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.121-k8s-test--pod--1-eth0" Apr 12 18:49:20.256835 env[1055]: 2024-04-12 18:49:20.123 [INFO][3107] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541" HandleID="k8s-pod-network.ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541" Workload="172.24.4.121-k8s-test--pod--1-eth0" Apr 12 18:49:20.256835 env[1055]: 2024-04-12 18:49:20.145 [INFO][3107] ipam_plugin.go 268: Auto assigning IP ContainerID="ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541" HandleID="k8s-pod-network.ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541" Workload="172.24.4.121-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002af820), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.121", "pod":"test-pod-1", "timestamp":"2024-04-12 18:49:20.123574362 +0000 UTC"}, Hostname:"172.24.4.121", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:49:20.256835 env[1055]: 2024-04-12 18:49:20.145 [INFO][3107] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:49:20.256835 env[1055]: 2024-04-12 18:49:20.145 [INFO][3107] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:49:20.256835 env[1055]: 2024-04-12 18:49:20.145 [INFO][3107] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.121' Apr 12 18:49:20.256835 env[1055]: 2024-04-12 18:49:20.149 [INFO][3107] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541" host="172.24.4.121" Apr 12 18:49:20.256835 env[1055]: 2024-04-12 18:49:20.157 [INFO][3107] ipam.go 372: Looking up existing affinities for host host="172.24.4.121" Apr 12 18:49:20.256835 env[1055]: 2024-04-12 18:49:20.166 [INFO][3107] ipam.go 489: Trying affinity for 192.168.13.192/26 host="172.24.4.121" Apr 12 18:49:20.256835 env[1055]: 2024-04-12 18:49:20.169 [INFO][3107] ipam.go 155: Attempting to load block cidr=192.168.13.192/26 host="172.24.4.121" Apr 12 18:49:20.256835 env[1055]: 2024-04-12 18:49:20.174 [INFO][3107] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.192/26 host="172.24.4.121" Apr 12 18:49:20.256835 env[1055]: 2024-04-12 18:49:20.174 [INFO][3107] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.192/26 handle="k8s-pod-network.ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541" host="172.24.4.121" Apr 12 18:49:20.256835 env[1055]: 2024-04-12 18:49:20.178 [INFO][3107] ipam.go 1682: Creating new handle: k8s-pod-network.ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541 Apr 12 18:49:20.256835 env[1055]: 2024-04-12 18:49:20.186 [INFO][3107] ipam.go 1203: Writing block in order to claim IPs block=192.168.13.192/26 handle="k8s-pod-network.ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541" host="172.24.4.121" Apr 12 18:49:20.256835 env[1055]: 2024-04-12 18:49:20.197 [INFO][3107] ipam.go 1216: Successfully claimed IPs: [192.168.13.197/26] block=192.168.13.192/26 handle="k8s-pod-network.ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541" host="172.24.4.121" Apr 12 18:49:20.256835 env[1055]: 2024-04-12 18:49:20.197 [INFO][3107] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.197/26] handle="k8s-pod-network.ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541" host="172.24.4.121" Apr 12 18:49:20.256835 env[1055]: 2024-04-12 18:49:20.197 [INFO][3107] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:49:20.256835 env[1055]: 2024-04-12 18:49:20.197 [INFO][3107] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.13.197/26] IPv6=[] ContainerID="ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541" HandleID="k8s-pod-network.ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541" Workload="172.24.4.121-k8s-test--pod--1-eth0" Apr 12 18:49:20.258523 env[1055]: 2024-04-12 18:49:20.201 [INFO][3096] k8s.go 385: Populated endpoint ContainerID="ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.121-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"236e9a75-836a-4b0e-aa30-738be6f005e1", ResourceVersion:"1255", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 48, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.121", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.13.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:49:20.258523 env[1055]: 2024-04-12 18:49:20.203 [INFO][3096] k8s.go 386: Calico CNI using IPs: [192.168.13.197/32] ContainerID="ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.121-k8s-test--pod--1-eth0" Apr 12 18:49:20.258523 env[1055]: 2024-04-12 18:49:20.204 [INFO][3096] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.121-k8s-test--pod--1-eth0" Apr 12 18:49:20.258523 env[1055]: 2024-04-12 18:49:20.221 [INFO][3096] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.121-k8s-test--pod--1-eth0" Apr 12 18:49:20.258523 env[1055]: 2024-04-12 18:49:20.222 [INFO][3096] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.121-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.121-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"236e9a75-836a-4b0e-aa30-738be6f005e1", ResourceVersion:"1255", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 48, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.121", ContainerID:"ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.13.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"52:ae:02:c1:66:61", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:49:20.258523 env[1055]: 2024-04-12 18:49:20.242 [INFO][3096] k8s.go 498: Wrote updated endpoint to datastore ContainerID="ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.121-k8s-test--pod--1-eth0" Apr 12 18:49:20.289000 audit[3128]: NETFILTER_CFG table=filter:89 family=2 entries=42 op=nft_register_chain pid=3128 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:49:20.289000 audit[3128]: SYSCALL arch=c000003e syscall=46 success=yes exit=20588 a0=3 a1=7ffcca721990 a2=0 a3=7ffcca72197c items=0 ppid=2033 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:20.289000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:49:20.298387 env[1055]: time="2024-04-12T18:49:20.298314087Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:49:20.298387 env[1055]: time="2024-04-12T18:49:20.298360302Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:49:20.298544 env[1055]: time="2024-04-12T18:49:20.298405214Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:49:20.298615 env[1055]: time="2024-04-12T18:49:20.298581158Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541 pid=3134 runtime=io.containerd.runc.v2 Apr 12 18:49:20.316761 systemd[1]: Started cri-containerd-ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541.scope. Apr 12 18:49:20.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.330000 audit: BPF prog-id=119 op=LOAD Apr 12 18:49:20.331000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.331000 audit[3145]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3134 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:20.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165383764303264653337346433363337383864666430613637386461 Apr 12 18:49:20.331000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.331000 audit[3145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3134 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:20.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165383764303264653337346433363337383864666430613637386461 Apr 12 18:49:20.331000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.331000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.331000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.331000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.331000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.331000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.331000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.331000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.331000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.331000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.331000 audit: BPF prog-id=120 op=LOAD Apr 12 18:49:20.331000 audit[3145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c4710 items=0 ppid=3134 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:20.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165383764303264653337346433363337383864666430613637386461 Apr 12 18:49:20.332000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.332000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.332000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.332000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.332000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.332000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.332000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.332000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.332000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.332000 audit: BPF prog-id=121 op=LOAD Apr 12 18:49:20.332000 audit[3145]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c4758 items=0 ppid=3134 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:20.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165383764303264653337346433363337383864666430613637386461 Apr 12 18:49:20.332000 audit: BPF prog-id=121 op=UNLOAD Apr 12 18:49:20.332000 audit: BPF prog-id=120 op=UNLOAD Apr 12 18:49:20.332000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.332000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.332000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.332000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.332000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.332000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.332000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.332000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.332000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.332000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.332000 audit: BPF prog-id=122 op=LOAD Apr 12 18:49:20.332000 audit[3145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c4b68 items=0 ppid=3134 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:20.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165383764303264653337346433363337383864666430613637386461 Apr 12 18:49:20.369099 env[1055]: time="2024-04-12T18:49:20.369041745Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:236e9a75-836a-4b0e-aa30-738be6f005e1,Namespace:default,Attempt:0,} returns sandbox id \"ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541\"" Apr 12 18:49:20.371731 env[1055]: time="2024-04-12T18:49:20.371671987Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 18:49:20.793619 env[1055]: time="2024-04-12T18:49:20.793446339Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:20.796347 env[1055]: time="2024-04-12T18:49:20.796268536Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:20.800446 env[1055]: time="2024-04-12T18:49:20.800367742Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:20.805375 env[1055]: time="2024-04-12T18:49:20.805316062Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:20.807304 env[1055]: time="2024-04-12T18:49:20.807247507Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83\"" Apr 12 18:49:20.811598 env[1055]: time="2024-04-12T18:49:20.811503052Z" level=info msg="CreateContainer within sandbox \"ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541\" for container &ContainerMetadata{Name:test,Attempt:0,}" Apr 12 18:49:20.840011 kubelet[1378]: E0412 18:49:20.839899 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:20.845105 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2829586844.mount: Deactivated successfully. Apr 12 18:49:20.862533 env[1055]: time="2024-04-12T18:49:20.862269673Z" level=info msg="CreateContainer within sandbox \"ae87d02de374d363788dfd0a678dad158b707fdcf0749dc05e8a0254447c7541\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"99101d3427bbc9164919b69d4b1c362079cd334521cde7563ca9dd2c81e1cd4c\"" Apr 12 18:49:20.864103 env[1055]: time="2024-04-12T18:49:20.864029493Z" level=info msg="StartContainer for \"99101d3427bbc9164919b69d4b1c362079cd334521cde7563ca9dd2c81e1cd4c\"" Apr 12 18:49:20.912300 systemd[1]: Started cri-containerd-99101d3427bbc9164919b69d4b1c362079cd334521cde7563ca9dd2c81e1cd4c.scope. Apr 12 18:49:20.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.924000 audit: BPF prog-id=123 op=LOAD Apr 12 18:49:20.925000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.925000 audit[3175]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3134 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:20.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939313031643334323762626339313634393139623639643462316333 Apr 12 18:49:20.925000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.925000 audit[3175]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3134 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:20.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939313031643334323762626339313634393139623639643462316333 Apr 12 18:49:20.925000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.925000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.925000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.925000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.925000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.925000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.925000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.925000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.925000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.925000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.925000 audit: BPF prog-id=124 op=LOAD Apr 12 18:49:20.925000 audit[3175]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dda10 items=0 ppid=3134 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:20.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939313031643334323762626339313634393139623639643462316333 Apr 12 18:49:20.926000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.926000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.926000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.926000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.926000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.926000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.926000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.926000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.926000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.926000 audit: BPF prog-id=125 op=LOAD Apr 12 18:49:20.926000 audit[3175]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dda58 items=0 ppid=3134 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:20.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939313031643334323762626339313634393139623639643462316333 Apr 12 18:49:20.927000 audit: BPF prog-id=125 op=UNLOAD Apr 12 18:49:20.927000 audit: BPF prog-id=124 op=UNLOAD Apr 12 18:49:20.927000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.927000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.927000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.927000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.927000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.927000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.927000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.927000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.927000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.927000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:20.927000 audit: BPF prog-id=126 op=LOAD Apr 12 18:49:20.927000 audit[3175]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001dde68 items=0 ppid=3134 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:20.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939313031643334323762626339313634393139623639643462316333 Apr 12 18:49:20.956844 env[1055]: time="2024-04-12T18:49:20.956796696Z" level=info msg="StartContainer for \"99101d3427bbc9164919b69d4b1c362079cd334521cde7563ca9dd2c81e1cd4c\" returns successfully" Apr 12 18:49:21.471288 systemd-networkd[972]: cali5ec59c6bf6e: Gained IPv6LL Apr 12 18:49:21.841208 kubelet[1378]: E0412 18:49:21.841076 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:22.842433 kubelet[1378]: E0412 18:49:22.842382 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:23.843476 kubelet[1378]: E0412 18:49:23.843440 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:24.844841 kubelet[1378]: E0412 18:49:24.844757 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:25.845900 kubelet[1378]: E0412 18:49:25.845799 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:26.742063 kubelet[1378]: E0412 18:49:26.741968 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:26.846430 kubelet[1378]: E0412 18:49:26.846295 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:27.847074 kubelet[1378]: E0412 18:49:27.847017 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:49:28.848951 kubelet[1378]: E0412 18:49:28.848864 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"