Apr 12 21:16:24.708428 kernel: Booting Linux on physical CPU 0x0000120000 [0x413fd0c1] Apr 12 21:16:24.708448 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Apr 12 17:21:24 -00 2024 Apr 12 21:16:24.708456 kernel: efi: EFI v2.70 by American Megatrends Apr 12 21:16:24.708462 kernel: efi: ACPI 2.0=0xeea40000 SMBIOS 3.0=0xf1b2ff98 ESRT=0xecd1f018 RNG=0xee8d0018 MEMRESERVE=0xe6dacf98 Apr 12 21:16:24.708467 kernel: random: crng init done Apr 12 21:16:24.708473 kernel: esrt: Reserving ESRT space from 0x00000000ecd1f018 to 0x00000000ecd1f078. Apr 12 21:16:24.708479 kernel: ACPI: Early table checksum verification disabled Apr 12 21:16:24.708484 kernel: ACPI: RSDP 0x00000000EEA40000 000024 (v02 Ampere) Apr 12 21:16:24.708491 kernel: ACPI: XSDT 0x00000000EEA30000 0000A4 (v01 Ampere Altra 00000000 AMI 01000013) Apr 12 21:16:24.708497 kernel: ACPI: FACP 0x00000000EEA10000 000114 (v06 Ampere Altra 00000000 INTL 20190509) Apr 12 21:16:24.708502 kernel: ACPI: DSDT 0x00000000EE9B0000 019B3A (v02 Ampere Jade 00000001 INTL 20200717) Apr 12 21:16:24.708507 kernel: ACPI: DBG2 0x00000000EEA20000 00005C (v00 Ampere Altra 00000000 INTL 20190509) Apr 12 21:16:24.708513 kernel: ACPI: GTDT 0x00000000EEA00000 000110 (v03 Ampere Altra 00000000 INTL 20190509) Apr 12 21:16:24.708518 kernel: ACPI: SSDT 0x00000000EE9F0000 00002D (v02 Ampere Altra 00000001 INTL 20190509) Apr 12 21:16:24.708526 kernel: ACPI: FIDT 0x00000000EE9A0000 00009C (v01 ALASKA A M I 01072009 AMI 00010013) Apr 12 21:16:24.708532 kernel: ACPI: SPCR 0x00000000EE990000 000050 (v02 ALASKA A M I 01072009 AMI 0005000F) Apr 12 21:16:24.708538 kernel: ACPI: BGRT 0x00000000EE980000 000038 (v01 ALASKA A M I 01072009 AMI 00010013) Apr 12 21:16:24.708544 kernel: ACPI: MCFG 0x00000000EE970000 0000AC (v01 Ampere Altra 00000001 AMP. 01000013) Apr 12 21:16:24.708550 kernel: ACPI: IORT 0x00000000EE960000 000610 (v00 Ampere Altra 00000000 AMP. 01000013) Apr 12 21:16:24.708555 kernel: ACPI: PPTT 0x00000000EE940000 006E60 (v02 Ampere Altra 00000000 AMP. 01000013) Apr 12 21:16:24.708561 kernel: ACPI: SLIT 0x00000000EE930000 00002D (v01 Ampere Altra 00000000 AMP. 01000013) Apr 12 21:16:24.708567 kernel: ACPI: SRAT 0x00000000EE920000 0006D0 (v03 Ampere Altra 00000000 AMP. 01000013) Apr 12 21:16:24.708573 kernel: ACPI: APIC 0x00000000EE950000 0019F4 (v05 Ampere Altra 00000003 AMI 01000013) Apr 12 21:16:24.708580 kernel: ACPI: PCCT 0x00000000EE900000 000576 (v02 Ampere Altra 00000003 AMP. 01000013) Apr 12 21:16:24.708586 kernel: ACPI: WSMT 0x00000000EE8F0000 000028 (v01 ALASKA A M I 01072009 AMI 00010013) Apr 12 21:16:24.708591 kernel: ACPI: FPDT 0x00000000EE8E0000 000044 (v01 ALASKA A M I 01072009 AMI 01000013) Apr 12 21:16:24.708597 kernel: ACPI: SPCR: console: pl011,mmio32,0x100002600000,115200 Apr 12 21:16:24.708603 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x88300000-0x883fffff] Apr 12 21:16:24.708609 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x90000000-0xffffffff] Apr 12 21:16:24.708615 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0x8007fffffff] Apr 12 21:16:24.708621 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80100000000-0x83fffffffff] Apr 12 21:16:24.708626 kernel: NUMA: NODE_DATA [mem 0x83fdffbe900-0x83fdffc3fff] Apr 12 21:16:24.708632 kernel: Zone ranges: Apr 12 21:16:24.708638 kernel: DMA [mem 0x0000000088300000-0x00000000ffffffff] Apr 12 21:16:24.708643 kernel: DMA32 empty Apr 12 21:16:24.708650 kernel: Normal [mem 0x0000000100000000-0x0000083fffffffff] Apr 12 21:16:24.708656 kernel: Movable zone start for each node Apr 12 21:16:24.708662 kernel: Early memory node ranges Apr 12 21:16:24.708668 kernel: node 0: [mem 0x0000000088300000-0x00000000883fffff] Apr 12 21:16:24.708674 kernel: node 0: [mem 0x0000000090000000-0x0000000091ffffff] Apr 12 21:16:24.708682 kernel: node 0: [mem 0x0000000092000000-0x0000000093ffffff] Apr 12 21:16:24.708688 kernel: node 0: [mem 0x0000000094000000-0x00000000ee70efff] Apr 12 21:16:24.708695 kernel: node 0: [mem 0x00000000ee70f000-0x00000000ee88cfff] Apr 12 21:16:24.708701 kernel: node 0: [mem 0x00000000ee88d000-0x00000000ee88dfff] Apr 12 21:16:24.708707 kernel: node 0: [mem 0x00000000ee88e000-0x00000000ee88ffff] Apr 12 21:16:24.708713 kernel: node 0: [mem 0x00000000ee890000-0x00000000eeaaffff] Apr 12 21:16:24.708719 kernel: node 0: [mem 0x00000000eeab0000-0x00000000eeabffff] Apr 12 21:16:24.708725 kernel: node 0: [mem 0x00000000eeac0000-0x00000000f00d2fff] Apr 12 21:16:24.708731 kernel: node 0: [mem 0x00000000f00d3000-0x00000000f0423fff] Apr 12 21:16:24.708738 kernel: node 0: [mem 0x00000000f0424000-0x00000000f06bffff] Apr 12 21:16:24.708744 kernel: node 0: [mem 0x00000000f06c0000-0x00000000f766ffff] Apr 12 21:16:24.708751 kernel: node 0: [mem 0x00000000f7670000-0x00000000f784ffff] Apr 12 21:16:24.708757 kernel: node 0: [mem 0x00000000f7850000-0x00000000f7fdffff] Apr 12 21:16:24.708763 kernel: node 0: [mem 0x00000000f7fe0000-0x00000000ffc8efff] Apr 12 21:16:24.708769 kernel: node 0: [mem 0x00000000ffc8f000-0x00000000ffc8ffff] Apr 12 21:16:24.708775 kernel: node 0: [mem 0x00000000ffc90000-0x00000000ffffffff] Apr 12 21:16:24.708781 kernel: node 0: [mem 0x0000080000000000-0x000008007fffffff] Apr 12 21:16:24.708788 kernel: node 0: [mem 0x0000080100000000-0x0000083fffffffff] Apr 12 21:16:24.708794 kernel: Initmem setup node 0 [mem 0x0000000088300000-0x0000083fffffffff] Apr 12 21:16:24.708800 kernel: On node 0, zone DMA: 768 pages in unavailable ranges Apr 12 21:16:24.708806 kernel: On node 0, zone DMA: 31744 pages in unavailable ranges Apr 12 21:16:24.708812 kernel: psci: probing for conduit method from ACPI. Apr 12 21:16:24.708818 kernel: psci: PSCIv1.1 detected in firmware. Apr 12 21:16:24.708825 kernel: psci: Using standard PSCI v0.2 function IDs Apr 12 21:16:24.708832 kernel: psci: MIGRATE_INFO_TYPE not supported. Apr 12 21:16:24.708838 kernel: psci: SMC Calling Convention v1.2 Apr 12 21:16:24.708844 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node 0 Apr 12 21:16:24.708850 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x100 -> Node 0 Apr 12 21:16:24.708856 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x10000 -> Node 0 Apr 12 21:16:24.708862 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x10100 -> Node 0 Apr 12 21:16:24.708868 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x20000 -> Node 0 Apr 12 21:16:24.708874 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x20100 -> Node 0 Apr 12 21:16:24.708880 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x30000 -> Node 0 Apr 12 21:16:24.708886 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x30100 -> Node 0 Apr 12 21:16:24.708892 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x40000 -> Node 0 Apr 12 21:16:24.708900 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x40100 -> Node 0 Apr 12 21:16:24.708906 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x50000 -> Node 0 Apr 12 21:16:24.708912 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x50100 -> Node 0 Apr 12 21:16:24.708918 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x60000 -> Node 0 Apr 12 21:16:24.708924 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x60100 -> Node 0 Apr 12 21:16:24.708930 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x70000 -> Node 0 Apr 12 21:16:24.708936 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x70100 -> Node 0 Apr 12 21:16:24.708942 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x80000 -> Node 0 Apr 12 21:16:24.708948 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x80100 -> Node 0 Apr 12 21:16:24.708955 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x90000 -> Node 0 Apr 12 21:16:24.708961 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x90100 -> Node 0 Apr 12 21:16:24.708967 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xa0000 -> Node 0 Apr 12 21:16:24.708974 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xa0100 -> Node 0 Apr 12 21:16:24.708980 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xb0000 -> Node 0 Apr 12 21:16:24.708986 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xb0100 -> Node 0 Apr 12 21:16:24.708993 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xc0000 -> Node 0 Apr 12 21:16:24.708999 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xc0100 -> Node 0 Apr 12 21:16:24.709005 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xd0000 -> Node 0 Apr 12 21:16:24.709011 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xd0100 -> Node 0 Apr 12 21:16:24.709017 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xe0000 -> Node 0 Apr 12 21:16:24.709023 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xe0100 -> Node 0 Apr 12 21:16:24.709029 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xf0000 -> Node 0 Apr 12 21:16:24.709045 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xf0100 -> Node 0 Apr 12 21:16:24.709053 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x100000 -> Node 0 Apr 12 21:16:24.709059 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x100100 -> Node 0 Apr 12 21:16:24.709066 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x110000 -> Node 0 Apr 12 21:16:24.709072 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x110100 -> Node 0 Apr 12 21:16:24.709078 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x120000 -> Node 0 Apr 12 21:16:24.709084 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x120100 -> Node 0 Apr 12 21:16:24.709090 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x130000 -> Node 0 Apr 12 21:16:24.709096 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x130100 -> Node 0 Apr 12 21:16:24.709102 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x140000 -> Node 0 Apr 12 21:16:24.709108 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x140100 -> Node 0 Apr 12 21:16:24.709114 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x150000 -> Node 0 Apr 12 21:16:24.709120 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x150100 -> Node 0 Apr 12 21:16:24.709128 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x160000 -> Node 0 Apr 12 21:16:24.709134 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x160100 -> Node 0 Apr 12 21:16:24.709140 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x170000 -> Node 0 Apr 12 21:16:24.709146 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x170100 -> Node 0 Apr 12 21:16:24.709152 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x180000 -> Node 0 Apr 12 21:16:24.709158 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x180100 -> Node 0 Apr 12 21:16:24.709164 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x190000 -> Node 0 Apr 12 21:16:24.709171 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x190100 -> Node 0 Apr 12 21:16:24.709182 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1a0000 -> Node 0 Apr 12 21:16:24.709188 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1a0100 -> Node 0 Apr 12 21:16:24.709196 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1b0000 -> Node 0 Apr 12 21:16:24.709203 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1b0100 -> Node 0 Apr 12 21:16:24.709209 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1c0000 -> Node 0 Apr 12 21:16:24.709215 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1c0100 -> Node 0 Apr 12 21:16:24.709222 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1d0000 -> Node 0 Apr 12 21:16:24.709228 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1d0100 -> Node 0 Apr 12 21:16:24.709236 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1e0000 -> Node 0 Apr 12 21:16:24.709243 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1e0100 -> Node 0 Apr 12 21:16:24.709249 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1f0000 -> Node 0 Apr 12 21:16:24.709256 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1f0100 -> Node 0 Apr 12 21:16:24.709262 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x200000 -> Node 0 Apr 12 21:16:24.709268 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x200100 -> Node 0 Apr 12 21:16:24.709275 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x210000 -> Node 0 Apr 12 21:16:24.709281 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x210100 -> Node 0 Apr 12 21:16:24.709288 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x220000 -> Node 0 Apr 12 21:16:24.709294 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x220100 -> Node 0 Apr 12 21:16:24.709301 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x230000 -> Node 0 Apr 12 21:16:24.709308 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x230100 -> Node 0 Apr 12 21:16:24.709315 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x240000 -> Node 0 Apr 12 21:16:24.709321 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x240100 -> Node 0 Apr 12 21:16:24.709328 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x250000 -> Node 0 Apr 12 21:16:24.709334 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x250100 -> Node 0 Apr 12 21:16:24.709340 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x260000 -> Node 0 Apr 12 21:16:24.709347 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x260100 -> Node 0 Apr 12 21:16:24.709353 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x270000 -> Node 0 Apr 12 21:16:24.709360 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x270100 -> Node 0 Apr 12 21:16:24.709366 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Apr 12 21:16:24.709373 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Apr 12 21:16:24.709380 kernel: pcpu-alloc: [0] 00 [0] 01 [0] 02 [0] 03 [0] 04 [0] 05 [0] 06 [0] 07 Apr 12 21:16:24.709387 kernel: pcpu-alloc: [0] 08 [0] 09 [0] 10 [0] 11 [0] 12 [0] 13 [0] 14 [0] 15 Apr 12 21:16:24.709394 kernel: pcpu-alloc: [0] 16 [0] 17 [0] 18 [0] 19 [0] 20 [0] 21 [0] 22 [0] 23 Apr 12 21:16:24.709400 kernel: pcpu-alloc: [0] 24 [0] 25 [0] 26 [0] 27 [0] 28 [0] 29 [0] 30 [0] 31 Apr 12 21:16:24.709407 kernel: pcpu-alloc: [0] 32 [0] 33 [0] 34 [0] 35 [0] 36 [0] 37 [0] 38 [0] 39 Apr 12 21:16:24.709413 kernel: pcpu-alloc: [0] 40 [0] 41 [0] 42 [0] 43 [0] 44 [0] 45 [0] 46 [0] 47 Apr 12 21:16:24.709420 kernel: pcpu-alloc: [0] 48 [0] 49 [0] 50 [0] 51 [0] 52 [0] 53 [0] 54 [0] 55 Apr 12 21:16:24.709426 kernel: pcpu-alloc: [0] 56 [0] 57 [0] 58 [0] 59 [0] 60 [0] 61 [0] 62 [0] 63 Apr 12 21:16:24.709433 kernel: pcpu-alloc: [0] 64 [0] 65 [0] 66 [0] 67 [0] 68 [0] 69 [0] 70 [0] 71 Apr 12 21:16:24.709439 kernel: pcpu-alloc: [0] 72 [0] 73 [0] 74 [0] 75 [0] 76 [0] 77 [0] 78 [0] 79 Apr 12 21:16:24.709445 kernel: Detected PIPT I-cache on CPU0 Apr 12 21:16:24.709452 kernel: CPU features: detected: GIC system register CPU interface Apr 12 21:16:24.709460 kernel: CPU features: detected: Virtualization Host Extensions Apr 12 21:16:24.709466 kernel: CPU features: detected: Hardware dirty bit management Apr 12 21:16:24.709473 kernel: CPU features: detected: Spectre-v4 Apr 12 21:16:24.709479 kernel: CPU features: detected: Spectre-BHB Apr 12 21:16:24.709486 kernel: CPU features: kernel page table isolation forced ON by KASLR Apr 12 21:16:24.709492 kernel: CPU features: detected: Kernel page table isolation (KPTI) Apr 12 21:16:24.709498 kernel: CPU features: detected: ARM erratum 1418040 Apr 12 21:16:24.709505 kernel: alternatives: patching kernel code Apr 12 21:16:24.709511 kernel: Built 1 zonelists, mobility grouping on. Total pages: 65996028 Apr 12 21:16:24.709518 kernel: Policy zone: Normal Apr 12 21:16:24.709526 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected acpi=force flatcar.oem.id=packet flatcar.autologin verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 21:16:24.709534 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 21:16:24.709540 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Apr 12 21:16:24.709547 kernel: printk: log_buf_len total cpu_extra contributions: 323584 bytes Apr 12 21:16:24.709553 kernel: printk: log_buf_len min size: 262144 bytes Apr 12 21:16:24.709560 kernel: printk: log_buf_len: 1048576 bytes Apr 12 21:16:24.709566 kernel: printk: early log buf free: 249888(95%) Apr 12 21:16:24.709573 kernel: Dentry cache hash table entries: 16777216 (order: 15, 134217728 bytes, linear) Apr 12 21:16:24.709579 kernel: Inode-cache hash table entries: 8388608 (order: 14, 67108864 bytes, linear) Apr 12 21:16:24.709586 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 21:16:24.709592 kernel: software IO TLB: mapped [mem 0x00000000fbc8f000-0x00000000ffc8f000] (64MB) Apr 12 21:16:24.709599 kernel: Memory: 262961008K/268174336K available (9792K kernel code, 2092K rwdata, 7568K rodata, 36352K init, 777K bss, 5213328K reserved, 0K cma-reserved) Apr 12 21:16:24.709607 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=80, Nodes=1 Apr 12 21:16:24.709613 kernel: trace event string verifier disabled Apr 12 21:16:24.709620 kernel: rcu: Preemptible hierarchical RCU implementation. Apr 12 21:16:24.709627 kernel: rcu: RCU event tracing is enabled. Apr 12 21:16:24.709633 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=80. Apr 12 21:16:24.709640 kernel: Trampoline variant of Tasks RCU enabled. Apr 12 21:16:24.709647 kernel: Tracing variant of Tasks RCU enabled. Apr 12 21:16:24.709653 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 21:16:24.709660 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=80 Apr 12 21:16:24.709666 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Apr 12 21:16:24.709673 kernel: GICv3: GIC: Using split EOI/Deactivate mode Apr 12 21:16:24.709680 kernel: GICv3: 672 SPIs implemented Apr 12 21:16:24.709687 kernel: GICv3: 0 Extended SPIs implemented Apr 12 21:16:24.709693 kernel: GICv3: Distributor has no Range Selector support Apr 12 21:16:24.709700 kernel: Root IRQ handler: gic_handle_irq Apr 12 21:16:24.709707 kernel: GICv3: 16 PPIs implemented Apr 12 21:16:24.709713 kernel: GICv3: CPU0: found redistributor 120000 region 0:0x00001001005c0000 Apr 12 21:16:24.709720 kernel: SRAT: PXM 0 -> ITS 0 -> Node 0 Apr 12 21:16:24.709726 kernel: SRAT: PXM 0 -> ITS 1 -> Node 0 Apr 12 21:16:24.709732 kernel: SRAT: PXM 0 -> ITS 2 -> Node 0 Apr 12 21:16:24.709739 kernel: SRAT: PXM 0 -> ITS 3 -> Node 0 Apr 12 21:16:24.709745 kernel: SRAT: PXM 0 -> ITS 4 -> Node 0 Apr 12 21:16:24.709751 kernel: SRAT: PXM 0 -> ITS 5 -> Node 0 Apr 12 21:16:24.709758 kernel: SRAT: PXM 0 -> ITS 6 -> Node 0 Apr 12 21:16:24.709765 kernel: SRAT: PXM 0 -> ITS 7 -> Node 0 Apr 12 21:16:24.709772 kernel: ITS [mem 0x100100040000-0x10010005ffff] Apr 12 21:16:24.709778 kernel: ITS@0x0000100100040000: allocated 8192 Devices @80000200000 (indirect, esz 8, psz 64K, shr 1) Apr 12 21:16:24.709785 kernel: ITS@0x0000100100040000: allocated 32768 Interrupt Collections @80000210000 (flat, esz 2, psz 64K, shr 1) Apr 12 21:16:24.709792 kernel: ITS [mem 0x100100060000-0x10010007ffff] Apr 12 21:16:24.709798 kernel: ITS@0x0000100100060000: allocated 8192 Devices @80000230000 (indirect, esz 8, psz 64K, shr 1) Apr 12 21:16:24.709805 kernel: ITS@0x0000100100060000: allocated 32768 Interrupt Collections @80000240000 (flat, esz 2, psz 64K, shr 1) Apr 12 21:16:24.709812 kernel: ITS [mem 0x100100080000-0x10010009ffff] Apr 12 21:16:24.709819 kernel: ITS@0x0000100100080000: allocated 8192 Devices @80000260000 (indirect, esz 8, psz 64K, shr 1) Apr 12 21:16:24.709825 kernel: ITS@0x0000100100080000: allocated 32768 Interrupt Collections @80000270000 (flat, esz 2, psz 64K, shr 1) Apr 12 21:16:24.709832 kernel: ITS [mem 0x1001000a0000-0x1001000bffff] Apr 12 21:16:24.709840 kernel: ITS@0x00001001000a0000: allocated 8192 Devices @80000290000 (indirect, esz 8, psz 64K, shr 1) Apr 12 21:16:24.709847 kernel: ITS@0x00001001000a0000: allocated 32768 Interrupt Collections @800002a0000 (flat, esz 2, psz 64K, shr 1) Apr 12 21:16:24.709853 kernel: ITS [mem 0x1001000c0000-0x1001000dffff] Apr 12 21:16:24.709860 kernel: ITS@0x00001001000c0000: allocated 8192 Devices @800002c0000 (indirect, esz 8, psz 64K, shr 1) Apr 12 21:16:24.709867 kernel: ITS@0x00001001000c0000: allocated 32768 Interrupt Collections @800002d0000 (flat, esz 2, psz 64K, shr 1) Apr 12 21:16:24.709873 kernel: ITS [mem 0x1001000e0000-0x1001000fffff] Apr 12 21:16:24.709880 kernel: ITS@0x00001001000e0000: allocated 8192 Devices @80000300000 (indirect, esz 8, psz 64K, shr 1) Apr 12 21:16:24.709886 kernel: ITS@0x00001001000e0000: allocated 32768 Interrupt Collections @80000310000 (flat, esz 2, psz 64K, shr 1) Apr 12 21:16:24.709893 kernel: ITS [mem 0x100100100000-0x10010011ffff] Apr 12 21:16:24.709900 kernel: ITS@0x0000100100100000: allocated 8192 Devices @80000330000 (indirect, esz 8, psz 64K, shr 1) Apr 12 21:16:24.709906 kernel: ITS@0x0000100100100000: allocated 32768 Interrupt Collections @80000340000 (flat, esz 2, psz 64K, shr 1) Apr 12 21:16:24.709914 kernel: ITS [mem 0x100100120000-0x10010013ffff] Apr 12 21:16:24.709921 kernel: ITS@0x0000100100120000: allocated 8192 Devices @80000360000 (indirect, esz 8, psz 64K, shr 1) Apr 12 21:16:24.709927 kernel: ITS@0x0000100100120000: allocated 32768 Interrupt Collections @80000370000 (flat, esz 2, psz 64K, shr 1) Apr 12 21:16:24.709934 kernel: GICv3: using LPI property table @0x0000080000380000 Apr 12 21:16:24.709941 kernel: GICv3: CPU0: using allocated LPI pending table @0x0000080000390000 Apr 12 21:16:24.709947 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.709954 kernel: ACPI GTDT: found 1 memory-mapped timer block(s). Apr 12 21:16:24.709960 kernel: arch_timer: cp15 and mmio timer(s) running at 25.00MHz (phys/phys). Apr 12 21:16:24.709967 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Apr 12 21:16:24.709974 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Apr 12 21:16:24.709981 kernel: Console: colour dummy device 80x25 Apr 12 21:16:24.709989 kernel: printk: console [tty0] enabled Apr 12 21:16:24.709995 kernel: ACPI: Core revision 20210730 Apr 12 21:16:24.710002 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Apr 12 21:16:24.710009 kernel: pid_max: default: 81920 minimum: 640 Apr 12 21:16:24.710016 kernel: LSM: Security Framework initializing Apr 12 21:16:24.710022 kernel: SELinux: Initializing. Apr 12 21:16:24.710029 kernel: Mount-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 21:16:24.710039 kernel: Mountpoint-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 21:16:24.710046 kernel: rcu: Hierarchical SRCU implementation. Apr 12 21:16:24.710054 kernel: Platform MSI: ITS@0x100100040000 domain created Apr 12 21:16:24.710060 kernel: Platform MSI: ITS@0x100100060000 domain created Apr 12 21:16:24.710067 kernel: Platform MSI: ITS@0x100100080000 domain created Apr 12 21:16:24.710074 kernel: Platform MSI: ITS@0x1001000a0000 domain created Apr 12 21:16:24.710080 kernel: Platform MSI: ITS@0x1001000c0000 domain created Apr 12 21:16:24.710087 kernel: Platform MSI: ITS@0x1001000e0000 domain created Apr 12 21:16:24.710093 kernel: Platform MSI: ITS@0x100100100000 domain created Apr 12 21:16:24.710100 kernel: Platform MSI: ITS@0x100100120000 domain created Apr 12 21:16:24.710106 kernel: PCI/MSI: ITS@0x100100040000 domain created Apr 12 21:16:24.710114 kernel: PCI/MSI: ITS@0x100100060000 domain created Apr 12 21:16:24.710121 kernel: PCI/MSI: ITS@0x100100080000 domain created Apr 12 21:16:24.710127 kernel: PCI/MSI: ITS@0x1001000a0000 domain created Apr 12 21:16:24.710134 kernel: PCI/MSI: ITS@0x1001000c0000 domain created Apr 12 21:16:24.710141 kernel: PCI/MSI: ITS@0x1001000e0000 domain created Apr 12 21:16:24.710147 kernel: PCI/MSI: ITS@0x100100100000 domain created Apr 12 21:16:24.710154 kernel: PCI/MSI: ITS@0x100100120000 domain created Apr 12 21:16:24.710161 kernel: Remapping and enabling EFI services. Apr 12 21:16:24.710167 kernel: smp: Bringing up secondary CPUs ... Apr 12 21:16:24.710174 kernel: Detected PIPT I-cache on CPU1 Apr 12 21:16:24.710182 kernel: GICv3: CPU1: found redistributor 1a0000 region 0:0x00001001007c0000 Apr 12 21:16:24.710189 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000800003a0000 Apr 12 21:16:24.710195 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710202 kernel: CPU1: Booted secondary processor 0x00001a0000 [0x413fd0c1] Apr 12 21:16:24.710209 kernel: Detected PIPT I-cache on CPU2 Apr 12 21:16:24.710215 kernel: GICv3: CPU2: found redistributor 140000 region 0:0x0000100100640000 Apr 12 21:16:24.710222 kernel: GICv3: CPU2: using allocated LPI pending table @0x00000800003b0000 Apr 12 21:16:24.710229 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710235 kernel: CPU2: Booted secondary processor 0x0000140000 [0x413fd0c1] Apr 12 21:16:24.710243 kernel: Detected PIPT I-cache on CPU3 Apr 12 21:16:24.710250 kernel: GICv3: CPU3: found redistributor 1c0000 region 0:0x0000100100840000 Apr 12 21:16:24.710257 kernel: GICv3: CPU3: using allocated LPI pending table @0x00000800003c0000 Apr 12 21:16:24.710263 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710270 kernel: CPU3: Booted secondary processor 0x00001c0000 [0x413fd0c1] Apr 12 21:16:24.710276 kernel: Detected PIPT I-cache on CPU4 Apr 12 21:16:24.710283 kernel: GICv3: CPU4: found redistributor 100000 region 0:0x0000100100540000 Apr 12 21:16:24.710290 kernel: GICv3: CPU4: using allocated LPI pending table @0x00000800003d0000 Apr 12 21:16:24.710296 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710303 kernel: CPU4: Booted secondary processor 0x0000100000 [0x413fd0c1] Apr 12 21:16:24.710311 kernel: Detected PIPT I-cache on CPU5 Apr 12 21:16:24.710317 kernel: GICv3: CPU5: found redistributor 180000 region 0:0x0000100100740000 Apr 12 21:16:24.710324 kernel: GICv3: CPU5: using allocated LPI pending table @0x00000800003e0000 Apr 12 21:16:24.710331 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710337 kernel: CPU5: Booted secondary processor 0x0000180000 [0x413fd0c1] Apr 12 21:16:24.710344 kernel: Detected PIPT I-cache on CPU6 Apr 12 21:16:24.710351 kernel: GICv3: CPU6: found redistributor 160000 region 0:0x00001001006c0000 Apr 12 21:16:24.710357 kernel: GICv3: CPU6: using allocated LPI pending table @0x00000800003f0000 Apr 12 21:16:24.710364 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710371 kernel: CPU6: Booted secondary processor 0x0000160000 [0x413fd0c1] Apr 12 21:16:24.710378 kernel: Detected PIPT I-cache on CPU7 Apr 12 21:16:24.710385 kernel: GICv3: CPU7: found redistributor 1e0000 region 0:0x00001001008c0000 Apr 12 21:16:24.710392 kernel: GICv3: CPU7: using allocated LPI pending table @0x0000080000800000 Apr 12 21:16:24.710398 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710405 kernel: CPU7: Booted secondary processor 0x00001e0000 [0x413fd0c1] Apr 12 21:16:24.710411 kernel: Detected PIPT I-cache on CPU8 Apr 12 21:16:24.710418 kernel: GICv3: CPU8: found redistributor a0000 region 0:0x00001001003c0000 Apr 12 21:16:24.710425 kernel: GICv3: CPU8: using allocated LPI pending table @0x0000080000810000 Apr 12 21:16:24.710431 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710439 kernel: CPU8: Booted secondary processor 0x00000a0000 [0x413fd0c1] Apr 12 21:16:24.710446 kernel: Detected PIPT I-cache on CPU9 Apr 12 21:16:24.710453 kernel: GICv3: CPU9: found redistributor 220000 region 0:0x00001001009c0000 Apr 12 21:16:24.710459 kernel: GICv3: CPU9: using allocated LPI pending table @0x0000080000820000 Apr 12 21:16:24.710466 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710473 kernel: CPU9: Booted secondary processor 0x0000220000 [0x413fd0c1] Apr 12 21:16:24.710479 kernel: Detected PIPT I-cache on CPU10 Apr 12 21:16:24.710486 kernel: GICv3: CPU10: found redistributor c0000 region 0:0x0000100100440000 Apr 12 21:16:24.710492 kernel: GICv3: CPU10: using allocated LPI pending table @0x0000080000830000 Apr 12 21:16:24.710500 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710507 kernel: CPU10: Booted secondary processor 0x00000c0000 [0x413fd0c1] Apr 12 21:16:24.710514 kernel: Detected PIPT I-cache on CPU11 Apr 12 21:16:24.710520 kernel: GICv3: CPU11: found redistributor 240000 region 0:0x0000100100a40000 Apr 12 21:16:24.710527 kernel: GICv3: CPU11: using allocated LPI pending table @0x0000080000840000 Apr 12 21:16:24.710534 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710540 kernel: CPU11: Booted secondary processor 0x0000240000 [0x413fd0c1] Apr 12 21:16:24.710547 kernel: Detected PIPT I-cache on CPU12 Apr 12 21:16:24.710553 kernel: GICv3: CPU12: found redistributor 80000 region 0:0x0000100100340000 Apr 12 21:16:24.710560 kernel: GICv3: CPU12: using allocated LPI pending table @0x0000080000850000 Apr 12 21:16:24.710568 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710574 kernel: CPU12: Booted secondary processor 0x0000080000 [0x413fd0c1] Apr 12 21:16:24.710581 kernel: Detected PIPT I-cache on CPU13 Apr 12 21:16:24.710587 kernel: GICv3: CPU13: found redistributor 200000 region 0:0x0000100100940000 Apr 12 21:16:24.710594 kernel: GICv3: CPU13: using allocated LPI pending table @0x0000080000860000 Apr 12 21:16:24.710601 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710608 kernel: CPU13: Booted secondary processor 0x0000200000 [0x413fd0c1] Apr 12 21:16:24.710614 kernel: Detected PIPT I-cache on CPU14 Apr 12 21:16:24.710621 kernel: GICv3: CPU14: found redistributor e0000 region 0:0x00001001004c0000 Apr 12 21:16:24.710629 kernel: GICv3: CPU14: using allocated LPI pending table @0x0000080000870000 Apr 12 21:16:24.710636 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710642 kernel: CPU14: Booted secondary processor 0x00000e0000 [0x413fd0c1] Apr 12 21:16:24.710649 kernel: Detected PIPT I-cache on CPU15 Apr 12 21:16:24.710656 kernel: GICv3: CPU15: found redistributor 260000 region 0:0x0000100100ac0000 Apr 12 21:16:24.710662 kernel: GICv3: CPU15: using allocated LPI pending table @0x0000080000880000 Apr 12 21:16:24.710669 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710676 kernel: CPU15: Booted secondary processor 0x0000260000 [0x413fd0c1] Apr 12 21:16:24.710682 kernel: Detected PIPT I-cache on CPU16 Apr 12 21:16:24.710690 kernel: GICv3: CPU16: found redistributor 20000 region 0:0x00001001001c0000 Apr 12 21:16:24.710697 kernel: GICv3: CPU16: using allocated LPI pending table @0x0000080000890000 Apr 12 21:16:24.710703 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710710 kernel: CPU16: Booted secondary processor 0x0000020000 [0x413fd0c1] Apr 12 21:16:24.710716 kernel: Detected PIPT I-cache on CPU17 Apr 12 21:16:24.710723 kernel: GICv3: CPU17: found redistributor 40000 region 0:0x0000100100240000 Apr 12 21:16:24.710730 kernel: GICv3: CPU17: using allocated LPI pending table @0x00000800008a0000 Apr 12 21:16:24.710737 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710743 kernel: CPU17: Booted secondary processor 0x0000040000 [0x413fd0c1] Apr 12 21:16:24.710750 kernel: Detected PIPT I-cache on CPU18 Apr 12 21:16:24.710765 kernel: GICv3: CPU18: found redistributor 0 region 0:0x0000100100140000 Apr 12 21:16:24.710773 kernel: GICv3: CPU18: using allocated LPI pending table @0x00000800008b0000 Apr 12 21:16:24.710780 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710787 kernel: CPU18: Booted secondary processor 0x0000000000 [0x413fd0c1] Apr 12 21:16:24.710794 kernel: Detected PIPT I-cache on CPU19 Apr 12 21:16:24.710801 kernel: GICv3: CPU19: found redistributor 60000 region 0:0x00001001002c0000 Apr 12 21:16:24.710808 kernel: GICv3: CPU19: using allocated LPI pending table @0x00000800008c0000 Apr 12 21:16:24.710815 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710822 kernel: CPU19: Booted secondary processor 0x0000060000 [0x413fd0c1] Apr 12 21:16:24.710829 kernel: Detected PIPT I-cache on CPU20 Apr 12 21:16:24.710837 kernel: GICv3: CPU20: found redistributor 130000 region 0:0x0000100100600000 Apr 12 21:16:24.710843 kernel: GICv3: CPU20: using allocated LPI pending table @0x00000800008d0000 Apr 12 21:16:24.710850 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710857 kernel: CPU20: Booted secondary processor 0x0000130000 [0x413fd0c1] Apr 12 21:16:24.710864 kernel: Detected PIPT I-cache on CPU21 Apr 12 21:16:24.710871 kernel: GICv3: CPU21: found redistributor 1b0000 region 0:0x0000100100800000 Apr 12 21:16:24.710880 kernel: GICv3: CPU21: using allocated LPI pending table @0x00000800008e0000 Apr 12 21:16:24.710887 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710894 kernel: CPU21: Booted secondary processor 0x00001b0000 [0x413fd0c1] Apr 12 21:16:24.710901 kernel: Detected PIPT I-cache on CPU22 Apr 12 21:16:24.710908 kernel: GICv3: CPU22: found redistributor 150000 region 0:0x0000100100680000 Apr 12 21:16:24.710915 kernel: GICv3: CPU22: using allocated LPI pending table @0x00000800008f0000 Apr 12 21:16:24.710923 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710930 kernel: CPU22: Booted secondary processor 0x0000150000 [0x413fd0c1] Apr 12 21:16:24.710937 kernel: Detected PIPT I-cache on CPU23 Apr 12 21:16:24.710945 kernel: GICv3: CPU23: found redistributor 1d0000 region 0:0x0000100100880000 Apr 12 21:16:24.710952 kernel: GICv3: CPU23: using allocated LPI pending table @0x0000080000900000 Apr 12 21:16:24.710959 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.710966 kernel: CPU23: Booted secondary processor 0x00001d0000 [0x413fd0c1] Apr 12 21:16:24.710973 kernel: Detected PIPT I-cache on CPU24 Apr 12 21:16:24.710980 kernel: GICv3: CPU24: found redistributor 110000 region 0:0x0000100100580000 Apr 12 21:16:24.710987 kernel: GICv3: CPU24: using allocated LPI pending table @0x0000080000910000 Apr 12 21:16:24.710994 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711001 kernel: CPU24: Booted secondary processor 0x0000110000 [0x413fd0c1] Apr 12 21:16:24.711009 kernel: Detected PIPT I-cache on CPU25 Apr 12 21:16:24.711016 kernel: GICv3: CPU25: found redistributor 190000 region 0:0x0000100100780000 Apr 12 21:16:24.711023 kernel: GICv3: CPU25: using allocated LPI pending table @0x0000080000920000 Apr 12 21:16:24.711030 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711038 kernel: CPU25: Booted secondary processor 0x0000190000 [0x413fd0c1] Apr 12 21:16:24.711045 kernel: Detected PIPT I-cache on CPU26 Apr 12 21:16:24.711052 kernel: GICv3: CPU26: found redistributor 170000 region 0:0x0000100100700000 Apr 12 21:16:24.711059 kernel: GICv3: CPU26: using allocated LPI pending table @0x0000080000930000 Apr 12 21:16:24.711066 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711075 kernel: CPU26: Booted secondary processor 0x0000170000 [0x413fd0c1] Apr 12 21:16:24.711082 kernel: Detected PIPT I-cache on CPU27 Apr 12 21:16:24.711089 kernel: GICv3: CPU27: found redistributor 1f0000 region 0:0x0000100100900000 Apr 12 21:16:24.711096 kernel: GICv3: CPU27: using allocated LPI pending table @0x0000080000940000 Apr 12 21:16:24.711103 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711110 kernel: CPU27: Booted secondary processor 0x00001f0000 [0x413fd0c1] Apr 12 21:16:24.711117 kernel: Detected PIPT I-cache on CPU28 Apr 12 21:16:24.711124 kernel: GICv3: CPU28: found redistributor b0000 region 0:0x0000100100400000 Apr 12 21:16:24.711131 kernel: GICv3: CPU28: using allocated LPI pending table @0x0000080000950000 Apr 12 21:16:24.711138 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711146 kernel: CPU28: Booted secondary processor 0x00000b0000 [0x413fd0c1] Apr 12 21:16:24.711153 kernel: Detected PIPT I-cache on CPU29 Apr 12 21:16:24.711160 kernel: GICv3: CPU29: found redistributor 230000 region 0:0x0000100100a00000 Apr 12 21:16:24.711167 kernel: GICv3: CPU29: using allocated LPI pending table @0x0000080000960000 Apr 12 21:16:24.711174 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711181 kernel: CPU29: Booted secondary processor 0x0000230000 [0x413fd0c1] Apr 12 21:16:24.711188 kernel: Detected PIPT I-cache on CPU30 Apr 12 21:16:24.711195 kernel: GICv3: CPU30: found redistributor d0000 region 0:0x0000100100480000 Apr 12 21:16:24.711202 kernel: GICv3: CPU30: using allocated LPI pending table @0x0000080000970000 Apr 12 21:16:24.711211 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711217 kernel: CPU30: Booted secondary processor 0x00000d0000 [0x413fd0c1] Apr 12 21:16:24.711224 kernel: Detected PIPT I-cache on CPU31 Apr 12 21:16:24.711231 kernel: GICv3: CPU31: found redistributor 250000 region 0:0x0000100100a80000 Apr 12 21:16:24.711238 kernel: GICv3: CPU31: using allocated LPI pending table @0x0000080000980000 Apr 12 21:16:24.711245 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711252 kernel: CPU31: Booted secondary processor 0x0000250000 [0x413fd0c1] Apr 12 21:16:24.711259 kernel: Detected PIPT I-cache on CPU32 Apr 12 21:16:24.711266 kernel: GICv3: CPU32: found redistributor 90000 region 0:0x0000100100380000 Apr 12 21:16:24.711273 kernel: GICv3: CPU32: using allocated LPI pending table @0x0000080000990000 Apr 12 21:16:24.711281 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711288 kernel: CPU32: Booted secondary processor 0x0000090000 [0x413fd0c1] Apr 12 21:16:24.711295 kernel: Detected PIPT I-cache on CPU33 Apr 12 21:16:24.711302 kernel: GICv3: CPU33: found redistributor 210000 region 0:0x0000100100980000 Apr 12 21:16:24.711309 kernel: GICv3: CPU33: using allocated LPI pending table @0x00000800009a0000 Apr 12 21:16:24.711316 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711323 kernel: CPU33: Booted secondary processor 0x0000210000 [0x413fd0c1] Apr 12 21:16:24.711329 kernel: Detected PIPT I-cache on CPU34 Apr 12 21:16:24.711336 kernel: GICv3: CPU34: found redistributor f0000 region 0:0x0000100100500000 Apr 12 21:16:24.711344 kernel: GICv3: CPU34: using allocated LPI pending table @0x00000800009b0000 Apr 12 21:16:24.711351 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711358 kernel: CPU34: Booted secondary processor 0x00000f0000 [0x413fd0c1] Apr 12 21:16:24.711365 kernel: Detected PIPT I-cache on CPU35 Apr 12 21:16:24.711372 kernel: GICv3: CPU35: found redistributor 270000 region 0:0x0000100100b00000 Apr 12 21:16:24.711379 kernel: GICv3: CPU35: using allocated LPI pending table @0x00000800009c0000 Apr 12 21:16:24.711386 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711393 kernel: CPU35: Booted secondary processor 0x0000270000 [0x413fd0c1] Apr 12 21:16:24.711401 kernel: Detected PIPT I-cache on CPU36 Apr 12 21:16:24.711408 kernel: GICv3: CPU36: found redistributor 30000 region 0:0x0000100100200000 Apr 12 21:16:24.711417 kernel: GICv3: CPU36: using allocated LPI pending table @0x00000800009d0000 Apr 12 21:16:24.711424 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711431 kernel: CPU36: Booted secondary processor 0x0000030000 [0x413fd0c1] Apr 12 21:16:24.711438 kernel: Detected PIPT I-cache on CPU37 Apr 12 21:16:24.711444 kernel: GICv3: CPU37: found redistributor 50000 region 0:0x0000100100280000 Apr 12 21:16:24.711452 kernel: GICv3: CPU37: using allocated LPI pending table @0x00000800009e0000 Apr 12 21:16:24.711459 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711465 kernel: CPU37: Booted secondary processor 0x0000050000 [0x413fd0c1] Apr 12 21:16:24.711472 kernel: Detected PIPT I-cache on CPU38 Apr 12 21:16:24.711480 kernel: GICv3: CPU38: found redistributor 10000 region 0:0x0000100100180000 Apr 12 21:16:24.711488 kernel: GICv3: CPU38: using allocated LPI pending table @0x00000800009f0000 Apr 12 21:16:24.711495 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711501 kernel: CPU38: Booted secondary processor 0x0000010000 [0x413fd0c1] Apr 12 21:16:24.711508 kernel: Detected PIPT I-cache on CPU39 Apr 12 21:16:24.711515 kernel: GICv3: CPU39: found redistributor 70000 region 0:0x0000100100300000 Apr 12 21:16:24.711523 kernel: GICv3: CPU39: using allocated LPI pending table @0x0000080000a00000 Apr 12 21:16:24.711529 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711536 kernel: CPU39: Booted secondary processor 0x0000070000 [0x413fd0c1] Apr 12 21:16:24.711544 kernel: Detected PIPT I-cache on CPU40 Apr 12 21:16:24.711551 kernel: GICv3: CPU40: found redistributor 120100 region 0:0x00001001005e0000 Apr 12 21:16:24.711558 kernel: GICv3: CPU40: using allocated LPI pending table @0x0000080000a10000 Apr 12 21:16:24.711565 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711572 kernel: CPU40: Booted secondary processor 0x0000120100 [0x413fd0c1] Apr 12 21:16:24.711579 kernel: Detected PIPT I-cache on CPU41 Apr 12 21:16:24.711587 kernel: GICv3: CPU41: found redistributor 1a0100 region 0:0x00001001007e0000 Apr 12 21:16:24.711594 kernel: GICv3: CPU41: using allocated LPI pending table @0x0000080000a20000 Apr 12 21:16:24.711602 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711609 kernel: CPU41: Booted secondary processor 0x00001a0100 [0x413fd0c1] Apr 12 21:16:24.711616 kernel: Detected PIPT I-cache on CPU42 Apr 12 21:16:24.711623 kernel: GICv3: CPU42: found redistributor 140100 region 0:0x0000100100660000 Apr 12 21:16:24.711630 kernel: GICv3: CPU42: using allocated LPI pending table @0x0000080000a30000 Apr 12 21:16:24.711637 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711643 kernel: CPU42: Booted secondary processor 0x0000140100 [0x413fd0c1] Apr 12 21:16:24.711650 kernel: Detected PIPT I-cache on CPU43 Apr 12 21:16:24.711657 kernel: GICv3: CPU43: found redistributor 1c0100 region 0:0x0000100100860000 Apr 12 21:16:24.711664 kernel: GICv3: CPU43: using allocated LPI pending table @0x0000080000a40000 Apr 12 21:16:24.711672 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711680 kernel: CPU43: Booted secondary processor 0x00001c0100 [0x413fd0c1] Apr 12 21:16:24.711686 kernel: Detected PIPT I-cache on CPU44 Apr 12 21:16:24.711693 kernel: GICv3: CPU44: found redistributor 100100 region 0:0x0000100100560000 Apr 12 21:16:24.711700 kernel: GICv3: CPU44: using allocated LPI pending table @0x0000080000a50000 Apr 12 21:16:24.711707 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711714 kernel: CPU44: Booted secondary processor 0x0000100100 [0x413fd0c1] Apr 12 21:16:24.711721 kernel: Detected PIPT I-cache on CPU45 Apr 12 21:16:24.711728 kernel: GICv3: CPU45: found redistributor 180100 region 0:0x0000100100760000 Apr 12 21:16:24.711736 kernel: GICv3: CPU45: using allocated LPI pending table @0x0000080000a60000 Apr 12 21:16:24.711743 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711750 kernel: CPU45: Booted secondary processor 0x0000180100 [0x413fd0c1] Apr 12 21:16:24.711757 kernel: Detected PIPT I-cache on CPU46 Apr 12 21:16:24.711764 kernel: GICv3: CPU46: found redistributor 160100 region 0:0x00001001006e0000 Apr 12 21:16:24.711771 kernel: GICv3: CPU46: using allocated LPI pending table @0x0000080000a70000 Apr 12 21:16:24.711778 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711785 kernel: CPU46: Booted secondary processor 0x0000160100 [0x413fd0c1] Apr 12 21:16:24.711792 kernel: Detected PIPT I-cache on CPU47 Apr 12 21:16:24.711799 kernel: GICv3: CPU47: found redistributor 1e0100 region 0:0x00001001008e0000 Apr 12 21:16:24.711808 kernel: GICv3: CPU47: using allocated LPI pending table @0x0000080000a80000 Apr 12 21:16:24.711815 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711823 kernel: CPU47: Booted secondary processor 0x00001e0100 [0x413fd0c1] Apr 12 21:16:24.711829 kernel: Detected PIPT I-cache on CPU48 Apr 12 21:16:24.711837 kernel: GICv3: CPU48: found redistributor a0100 region 0:0x00001001003e0000 Apr 12 21:16:24.711843 kernel: GICv3: CPU48: using allocated LPI pending table @0x0000080000a90000 Apr 12 21:16:24.711851 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711857 kernel: CPU48: Booted secondary processor 0x00000a0100 [0x413fd0c1] Apr 12 21:16:24.711864 kernel: Detected PIPT I-cache on CPU49 Apr 12 21:16:24.711872 kernel: GICv3: CPU49: found redistributor 220100 region 0:0x00001001009e0000 Apr 12 21:16:24.711879 kernel: GICv3: CPU49: using allocated LPI pending table @0x0000080000aa0000 Apr 12 21:16:24.711887 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711893 kernel: CPU49: Booted secondary processor 0x0000220100 [0x413fd0c1] Apr 12 21:16:24.711900 kernel: Detected PIPT I-cache on CPU50 Apr 12 21:16:24.711907 kernel: GICv3: CPU50: found redistributor c0100 region 0:0x0000100100460000 Apr 12 21:16:24.711914 kernel: GICv3: CPU50: using allocated LPI pending table @0x0000080000ab0000 Apr 12 21:16:24.711921 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711928 kernel: CPU50: Booted secondary processor 0x00000c0100 [0x413fd0c1] Apr 12 21:16:24.711935 kernel: Detected PIPT I-cache on CPU51 Apr 12 21:16:24.711944 kernel: GICv3: CPU51: found redistributor 240100 region 0:0x0000100100a60000 Apr 12 21:16:24.711951 kernel: GICv3: CPU51: using allocated LPI pending table @0x0000080000ac0000 Apr 12 21:16:24.711958 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711964 kernel: CPU51: Booted secondary processor 0x0000240100 [0x413fd0c1] Apr 12 21:16:24.711971 kernel: Detected PIPT I-cache on CPU52 Apr 12 21:16:24.711978 kernel: GICv3: CPU52: found redistributor 80100 region 0:0x0000100100360000 Apr 12 21:16:24.711985 kernel: GICv3: CPU52: using allocated LPI pending table @0x0000080000ad0000 Apr 12 21:16:24.711992 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.711999 kernel: CPU52: Booted secondary processor 0x0000080100 [0x413fd0c1] Apr 12 21:16:24.712007 kernel: Detected PIPT I-cache on CPU53 Apr 12 21:16:24.712015 kernel: GICv3: CPU53: found redistributor 200100 region 0:0x0000100100960000 Apr 12 21:16:24.712022 kernel: GICv3: CPU53: using allocated LPI pending table @0x0000080000ae0000 Apr 12 21:16:24.712029 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712037 kernel: CPU53: Booted secondary processor 0x0000200100 [0x413fd0c1] Apr 12 21:16:24.712044 kernel: Detected PIPT I-cache on CPU54 Apr 12 21:16:24.712051 kernel: GICv3: CPU54: found redistributor e0100 region 0:0x00001001004e0000 Apr 12 21:16:24.712058 kernel: GICv3: CPU54: using allocated LPI pending table @0x0000080000af0000 Apr 12 21:16:24.712067 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712074 kernel: CPU54: Booted secondary processor 0x00000e0100 [0x413fd0c1] Apr 12 21:16:24.712082 kernel: Detected PIPT I-cache on CPU55 Apr 12 21:16:24.712089 kernel: GICv3: CPU55: found redistributor 260100 region 0:0x0000100100ae0000 Apr 12 21:16:24.712096 kernel: GICv3: CPU55: using allocated LPI pending table @0x0000080000b00000 Apr 12 21:16:24.712103 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712110 kernel: CPU55: Booted secondary processor 0x0000260100 [0x413fd0c1] Apr 12 21:16:24.712117 kernel: Detected PIPT I-cache on CPU56 Apr 12 21:16:24.712124 kernel: GICv3: CPU56: found redistributor 20100 region 0:0x00001001001e0000 Apr 12 21:16:24.712131 kernel: GICv3: CPU56: using allocated LPI pending table @0x0000080000b10000 Apr 12 21:16:24.712138 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712146 kernel: CPU56: Booted secondary processor 0x0000020100 [0x413fd0c1] Apr 12 21:16:24.712153 kernel: Detected PIPT I-cache on CPU57 Apr 12 21:16:24.712160 kernel: GICv3: CPU57: found redistributor 40100 region 0:0x0000100100260000 Apr 12 21:16:24.712167 kernel: GICv3: CPU57: using allocated LPI pending table @0x0000080000b20000 Apr 12 21:16:24.712174 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712180 kernel: CPU57: Booted secondary processor 0x0000040100 [0x413fd0c1] Apr 12 21:16:24.712187 kernel: Detected PIPT I-cache on CPU58 Apr 12 21:16:24.712194 kernel: GICv3: CPU58: found redistributor 100 region 0:0x0000100100160000 Apr 12 21:16:24.712201 kernel: GICv3: CPU58: using allocated LPI pending table @0x0000080000b30000 Apr 12 21:16:24.712210 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712217 kernel: CPU58: Booted secondary processor 0x0000000100 [0x413fd0c1] Apr 12 21:16:24.712223 kernel: Detected PIPT I-cache on CPU59 Apr 12 21:16:24.712230 kernel: GICv3: CPU59: found redistributor 60100 region 0:0x00001001002e0000 Apr 12 21:16:24.712237 kernel: GICv3: CPU59: using allocated LPI pending table @0x0000080000b40000 Apr 12 21:16:24.712244 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712251 kernel: CPU59: Booted secondary processor 0x0000060100 [0x413fd0c1] Apr 12 21:16:24.712258 kernel: Detected PIPT I-cache on CPU60 Apr 12 21:16:24.712265 kernel: GICv3: CPU60: found redistributor 130100 region 0:0x0000100100620000 Apr 12 21:16:24.712272 kernel: GICv3: CPU60: using allocated LPI pending table @0x0000080000b50000 Apr 12 21:16:24.712280 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712287 kernel: CPU60: Booted secondary processor 0x0000130100 [0x413fd0c1] Apr 12 21:16:24.712294 kernel: Detected PIPT I-cache on CPU61 Apr 12 21:16:24.712301 kernel: GICv3: CPU61: found redistributor 1b0100 region 0:0x0000100100820000 Apr 12 21:16:24.712308 kernel: GICv3: CPU61: using allocated LPI pending table @0x0000080000b60000 Apr 12 21:16:24.712315 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712322 kernel: CPU61: Booted secondary processor 0x00001b0100 [0x413fd0c1] Apr 12 21:16:24.712329 kernel: Detected PIPT I-cache on CPU62 Apr 12 21:16:24.712336 kernel: GICv3: CPU62: found redistributor 150100 region 0:0x00001001006a0000 Apr 12 21:16:24.712344 kernel: GICv3: CPU62: using allocated LPI pending table @0x0000080000b70000 Apr 12 21:16:24.712351 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712358 kernel: CPU62: Booted secondary processor 0x0000150100 [0x413fd0c1] Apr 12 21:16:24.712365 kernel: Detected PIPT I-cache on CPU63 Apr 12 21:16:24.712372 kernel: GICv3: CPU63: found redistributor 1d0100 region 0:0x00001001008a0000 Apr 12 21:16:24.712379 kernel: GICv3: CPU63: using allocated LPI pending table @0x0000080000b80000 Apr 12 21:16:24.712386 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712393 kernel: CPU63: Booted secondary processor 0x00001d0100 [0x413fd0c1] Apr 12 21:16:24.712400 kernel: Detected PIPT I-cache on CPU64 Apr 12 21:16:24.712407 kernel: GICv3: CPU64: found redistributor 110100 region 0:0x00001001005a0000 Apr 12 21:16:24.712415 kernel: GICv3: CPU64: using allocated LPI pending table @0x0000080000b90000 Apr 12 21:16:24.712422 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712429 kernel: CPU64: Booted secondary processor 0x0000110100 [0x413fd0c1] Apr 12 21:16:24.712436 kernel: Detected PIPT I-cache on CPU65 Apr 12 21:16:24.712443 kernel: GICv3: CPU65: found redistributor 190100 region 0:0x00001001007a0000 Apr 12 21:16:24.712450 kernel: GICv3: CPU65: using allocated LPI pending table @0x0000080000ba0000 Apr 12 21:16:24.712457 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712464 kernel: CPU65: Booted secondary processor 0x0000190100 [0x413fd0c1] Apr 12 21:16:24.712470 kernel: Detected PIPT I-cache on CPU66 Apr 12 21:16:24.712479 kernel: GICv3: CPU66: found redistributor 170100 region 0:0x0000100100720000 Apr 12 21:16:24.712486 kernel: GICv3: CPU66: using allocated LPI pending table @0x0000080000bb0000 Apr 12 21:16:24.712493 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712500 kernel: CPU66: Booted secondary processor 0x0000170100 [0x413fd0c1] Apr 12 21:16:24.712507 kernel: Detected PIPT I-cache on CPU67 Apr 12 21:16:24.712514 kernel: GICv3: CPU67: found redistributor 1f0100 region 0:0x0000100100920000 Apr 12 21:16:24.712521 kernel: GICv3: CPU67: using allocated LPI pending table @0x0000080000bc0000 Apr 12 21:16:24.712528 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712534 kernel: CPU67: Booted secondary processor 0x00001f0100 [0x413fd0c1] Apr 12 21:16:24.712541 kernel: Detected PIPT I-cache on CPU68 Apr 12 21:16:24.712549 kernel: GICv3: CPU68: found redistributor b0100 region 0:0x0000100100420000 Apr 12 21:16:24.712556 kernel: GICv3: CPU68: using allocated LPI pending table @0x0000080000bd0000 Apr 12 21:16:24.712563 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712570 kernel: CPU68: Booted secondary processor 0x00000b0100 [0x413fd0c1] Apr 12 21:16:24.712577 kernel: Detected PIPT I-cache on CPU69 Apr 12 21:16:24.712584 kernel: GICv3: CPU69: found redistributor 230100 region 0:0x0000100100a20000 Apr 12 21:16:24.712591 kernel: GICv3: CPU69: using allocated LPI pending table @0x0000080000be0000 Apr 12 21:16:24.712598 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712605 kernel: CPU69: Booted secondary processor 0x0000230100 [0x413fd0c1] Apr 12 21:16:24.712613 kernel: Detected PIPT I-cache on CPU70 Apr 12 21:16:24.712620 kernel: GICv3: CPU70: found redistributor d0100 region 0:0x00001001004a0000 Apr 12 21:16:24.712627 kernel: GICv3: CPU70: using allocated LPI pending table @0x0000080000bf0000 Apr 12 21:16:24.712634 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712641 kernel: CPU70: Booted secondary processor 0x00000d0100 [0x413fd0c1] Apr 12 21:16:24.712648 kernel: Detected PIPT I-cache on CPU71 Apr 12 21:16:24.712655 kernel: GICv3: CPU71: found redistributor 250100 region 0:0x0000100100aa0000 Apr 12 21:16:24.712662 kernel: GICv3: CPU71: using allocated LPI pending table @0x0000080000c00000 Apr 12 21:16:24.712669 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712676 kernel: CPU71: Booted secondary processor 0x0000250100 [0x413fd0c1] Apr 12 21:16:24.712684 kernel: Detected PIPT I-cache on CPU72 Apr 12 21:16:24.712691 kernel: GICv3: CPU72: found redistributor 90100 region 0:0x00001001003a0000 Apr 12 21:16:24.712698 kernel: GICv3: CPU72: using allocated LPI pending table @0x0000080000c10000 Apr 12 21:16:24.712705 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712712 kernel: CPU72: Booted secondary processor 0x0000090100 [0x413fd0c1] Apr 12 21:16:24.712719 kernel: Detected PIPT I-cache on CPU73 Apr 12 21:16:24.712725 kernel: GICv3: CPU73: found redistributor 210100 region 0:0x00001001009a0000 Apr 12 21:16:24.712732 kernel: GICv3: CPU73: using allocated LPI pending table @0x0000080000c20000 Apr 12 21:16:24.712740 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712747 kernel: CPU73: Booted secondary processor 0x0000210100 [0x413fd0c1] Apr 12 21:16:24.712754 kernel: Detected PIPT I-cache on CPU74 Apr 12 21:16:24.712761 kernel: GICv3: CPU74: found redistributor f0100 region 0:0x0000100100520000 Apr 12 21:16:24.712768 kernel: GICv3: CPU74: using allocated LPI pending table @0x0000080000c30000 Apr 12 21:16:24.712775 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712782 kernel: CPU74: Booted secondary processor 0x00000f0100 [0x413fd0c1] Apr 12 21:16:24.712789 kernel: Detected PIPT I-cache on CPU75 Apr 12 21:16:24.712796 kernel: GICv3: CPU75: found redistributor 270100 region 0:0x0000100100b20000 Apr 12 21:16:24.712803 kernel: GICv3: CPU75: using allocated LPI pending table @0x0000080000c40000 Apr 12 21:16:24.712812 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712819 kernel: CPU75: Booted secondary processor 0x0000270100 [0x413fd0c1] Apr 12 21:16:24.712826 kernel: Detected PIPT I-cache on CPU76 Apr 12 21:16:24.712833 kernel: GICv3: CPU76: found redistributor 30100 region 0:0x0000100100220000 Apr 12 21:16:24.712839 kernel: GICv3: CPU76: using allocated LPI pending table @0x0000080000c50000 Apr 12 21:16:24.712847 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712854 kernel: CPU76: Booted secondary processor 0x0000030100 [0x413fd0c1] Apr 12 21:16:24.712860 kernel: Detected PIPT I-cache on CPU77 Apr 12 21:16:24.712867 kernel: GICv3: CPU77: found redistributor 50100 region 0:0x00001001002a0000 Apr 12 21:16:24.712874 kernel: GICv3: CPU77: using allocated LPI pending table @0x0000080000c60000 Apr 12 21:16:24.712882 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712889 kernel: CPU77: Booted secondary processor 0x0000050100 [0x413fd0c1] Apr 12 21:16:24.712896 kernel: Detected PIPT I-cache on CPU78 Apr 12 21:16:24.712903 kernel: GICv3: CPU78: found redistributor 10100 region 0:0x00001001001a0000 Apr 12 21:16:24.712910 kernel: GICv3: CPU78: using allocated LPI pending table @0x0000080000c70000 Apr 12 21:16:24.712917 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712924 kernel: CPU78: Booted secondary processor 0x0000010100 [0x413fd0c1] Apr 12 21:16:24.712931 kernel: Detected PIPT I-cache on CPU79 Apr 12 21:16:24.712938 kernel: GICv3: CPU79: found redistributor 70100 region 0:0x0000100100320000 Apr 12 21:16:24.712946 kernel: GICv3: CPU79: using allocated LPI pending table @0x0000080000c80000 Apr 12 21:16:24.712953 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 21:16:24.712960 kernel: CPU79: Booted secondary processor 0x0000070100 [0x413fd0c1] Apr 12 21:16:24.712967 kernel: smp: Brought up 1 node, 80 CPUs Apr 12 21:16:24.712974 kernel: SMP: Total of 80 processors activated. Apr 12 21:16:24.712981 kernel: CPU features: detected: 32-bit EL0 Support Apr 12 21:16:24.712988 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Apr 12 21:16:24.712995 kernel: CPU features: detected: Common not Private translations Apr 12 21:16:24.713002 kernel: CPU features: detected: CRC32 instructions Apr 12 21:16:24.713009 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Apr 12 21:16:24.713017 kernel: CPU features: detected: LSE atomic instructions Apr 12 21:16:24.713024 kernel: CPU features: detected: Privileged Access Never Apr 12 21:16:24.713030 kernel: CPU features: detected: RAS Extension Support Apr 12 21:16:24.713039 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Apr 12 21:16:24.713046 kernel: CPU: All CPU(s) started at EL2 Apr 12 21:16:24.713053 kernel: devtmpfs: initialized Apr 12 21:16:24.713060 kernel: KASLR enabled Apr 12 21:16:24.713067 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 21:16:24.713074 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Apr 12 21:16:24.713083 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 21:16:24.713090 kernel: SMBIOS 3.4.0 present. Apr 12 21:16:24.713097 kernel: DMI: GIGABYTE R272-P30-JG/MP32-AR0-JG, BIOS F16f (SCP: 1.07.20210713) 07/01/2021 Apr 12 21:16:24.713104 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 21:16:24.713111 kernel: DMA: preallocated 4096 KiB GFP_KERNEL pool for atomic allocations Apr 12 21:16:24.713118 kernel: DMA: preallocated 4096 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Apr 12 21:16:24.713125 kernel: DMA: preallocated 4096 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Apr 12 21:16:24.713132 kernel: audit: initializing netlink subsys (disabled) Apr 12 21:16:24.713139 kernel: audit: type=2000 audit(0.052:1): state=initialized audit_enabled=0 res=1 Apr 12 21:16:24.713147 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 21:16:24.713154 kernel: cpuidle: using governor menu Apr 12 21:16:24.713161 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Apr 12 21:16:24.713168 kernel: ASID allocator initialised with 32768 entries Apr 12 21:16:24.713175 kernel: ACPI: bus type PCI registered Apr 12 21:16:24.713182 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 21:16:24.713189 kernel: Serial: AMBA PL011 UART driver Apr 12 21:16:24.713196 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 21:16:24.713203 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Apr 12 21:16:24.713211 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 21:16:24.713218 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Apr 12 21:16:24.713225 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 21:16:24.713232 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Apr 12 21:16:24.713239 kernel: ACPI: Added _OSI(Module Device) Apr 12 21:16:24.713246 kernel: ACPI: Added _OSI(Processor Device) Apr 12 21:16:24.713253 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 21:16:24.713260 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 21:16:24.713266 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 21:16:24.713275 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 21:16:24.713282 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 21:16:24.713289 kernel: ACPI: 2 ACPI AML tables successfully acquired and loaded Apr 12 21:16:24.713296 kernel: ACPI: Interpreter enabled Apr 12 21:16:24.713303 kernel: ACPI: Using GIC for interrupt routing Apr 12 21:16:24.713310 kernel: ACPI: MCFG table detected, 8 entries Apr 12 21:16:24.713317 kernel: ACPI: IORT: SMMU-v3[33ffe0000000] Mapped to Proximity domain 0 Apr 12 21:16:24.713324 kernel: ACPI: IORT: SMMU-v3[37ffe0000000] Mapped to Proximity domain 0 Apr 12 21:16:24.713331 kernel: ACPI: IORT: SMMU-v3[3bffe0000000] Mapped to Proximity domain 0 Apr 12 21:16:24.713339 kernel: ACPI: IORT: SMMU-v3[3fffe0000000] Mapped to Proximity domain 0 Apr 12 21:16:24.713346 kernel: ACPI: IORT: SMMU-v3[23ffe0000000] Mapped to Proximity domain 0 Apr 12 21:16:24.713353 kernel: ACPI: IORT: SMMU-v3[27ffe0000000] Mapped to Proximity domain 0 Apr 12 21:16:24.713360 kernel: ACPI: IORT: SMMU-v3[2bffe0000000] Mapped to Proximity domain 0 Apr 12 21:16:24.713367 kernel: ACPI: IORT: SMMU-v3[2fffe0000000] Mapped to Proximity domain 0 Apr 12 21:16:24.713374 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x100002600000 (irq = 21, base_baud = 0) is a SBSA Apr 12 21:16:24.713381 kernel: printk: console [ttyAMA0] enabled Apr 12 21:16:24.713389 kernel: ARMH0011:01: ttyAMA1 at MMIO 0x100002620000 (irq = 22, base_baud = 0) is a SBSA Apr 12 21:16:24.713396 kernel: ACPI: PCI Root Bridge [PCI1] (domain 000d [bus 00-ff]) Apr 12 21:16:24.713515 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 21:16:24.713582 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 21:16:24.713641 kernel: acpi PNP0A08:00: _OSC: OS now controls [AER PCIeCapability] Apr 12 21:16:24.713700 kernel: acpi PNP0A08:00: MCFG quirk: ECAM at [mem 0x37fff0000000-0x37ffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 21:16:24.713757 kernel: acpi PNP0A08:00: ECAM area [mem 0x37fff0000000-0x37ffffffffff] reserved by PNP0C02:00 Apr 12 21:16:24.713816 kernel: acpi PNP0A08:00: ECAM at [mem 0x37fff0000000-0x37ffffffffff] for [bus 00-ff] Apr 12 21:16:24.713827 kernel: PCI host bridge to bus 000d:00 Apr 12 21:16:24.713892 kernel: pci_bus 000d:00: root bus resource [mem 0x50000000-0x5fffffff window] Apr 12 21:16:24.713946 kernel: pci_bus 000d:00: root bus resource [mem 0x340000000000-0x37ffdfffffff window] Apr 12 21:16:24.714000 kernel: pci_bus 000d:00: root bus resource [bus 00-ff] Apr 12 21:16:24.714075 kernel: pci 000d:00:00.0: [1def:e100] type 00 class 0x060000 Apr 12 21:16:24.714146 kernel: pci 000d:00:01.0: [1def:e101] type 01 class 0x060400 Apr 12 21:16:24.714209 kernel: pci 000d:00:01.0: enabling Extended Tags Apr 12 21:16:24.714270 kernel: pci 000d:00:01.0: supports D1 D2 Apr 12 21:16:24.714330 kernel: pci 000d:00:01.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.714396 kernel: pci 000d:00:02.0: [1def:e102] type 01 class 0x060400 Apr 12 21:16:24.714458 kernel: pci 000d:00:02.0: supports D1 D2 Apr 12 21:16:24.714518 kernel: pci 000d:00:02.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.714587 kernel: pci 000d:00:03.0: [1def:e103] type 01 class 0x060400 Apr 12 21:16:24.714648 kernel: pci 000d:00:03.0: supports D1 D2 Apr 12 21:16:24.714710 kernel: pci 000d:00:03.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.714778 kernel: pci 000d:00:04.0: [1def:e104] type 01 class 0x060400 Apr 12 21:16:24.714837 kernel: pci 000d:00:04.0: supports D1 D2 Apr 12 21:16:24.714898 kernel: pci 000d:00:04.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.714907 kernel: acpiphp: Slot [1] registered Apr 12 21:16:24.714914 kernel: acpiphp: Slot [2] registered Apr 12 21:16:24.714923 kernel: acpiphp: Slot [3] registered Apr 12 21:16:24.714930 kernel: acpiphp: Slot [4] registered Apr 12 21:16:24.714981 kernel: pci_bus 000d:00: on NUMA node 0 Apr 12 21:16:24.715046 kernel: pci 000d:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 21:16:24.715106 kernel: pci 000d:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 21:16:24.715168 kernel: pci 000d:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 21:16:24.715228 kernel: pci 000d:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 21:16:24.715288 kernel: pci 000d:00:02.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 21:16:24.715354 kernel: pci 000d:00:02.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 21:16:24.715417 kernel: pci 000d:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 21:16:24.715478 kernel: pci 000d:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 21:16:24.715537 kernel: pci 000d:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 03] add_size 200000 add_align 100000 Apr 12 21:16:24.715600 kernel: pci 000d:00:04.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 21:16:24.715659 kernel: pci 000d:00:04.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 21:16:24.715721 kernel: pci 000d:00:04.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 21:16:24.715782 kernel: pci 000d:00:01.0: BAR 14: assigned [mem 0x50000000-0x501fffff] Apr 12 21:16:24.715844 kernel: pci 000d:00:01.0: BAR 15: assigned [mem 0x340000000000-0x3400001fffff 64bit pref] Apr 12 21:16:24.715907 kernel: pci 000d:00:02.0: BAR 14: assigned [mem 0x50200000-0x503fffff] Apr 12 21:16:24.715967 kernel: pci 000d:00:02.0: BAR 15: assigned [mem 0x340000200000-0x3400003fffff 64bit pref] Apr 12 21:16:24.716031 kernel: pci 000d:00:03.0: BAR 14: assigned [mem 0x50400000-0x505fffff] Apr 12 21:16:24.716095 kernel: pci 000d:00:03.0: BAR 15: assigned [mem 0x340000400000-0x3400005fffff 64bit pref] Apr 12 21:16:24.716158 kernel: pci 000d:00:04.0: BAR 14: assigned [mem 0x50600000-0x507fffff] Apr 12 21:16:24.716219 kernel: pci 000d:00:04.0: BAR 15: assigned [mem 0x340000600000-0x3400007fffff 64bit pref] Apr 12 21:16:24.716280 kernel: pci 000d:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.716340 kernel: pci 000d:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.716402 kernel: pci 000d:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.716463 kernel: pci 000d:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.716523 kernel: pci 000d:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.716584 kernel: pci 000d:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.716644 kernel: pci 000d:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.716707 kernel: pci 000d:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.716766 kernel: pci 000d:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.716828 kernel: pci 000d:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.716889 kernel: pci 000d:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.716951 kernel: pci 000d:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.717015 kernel: pci 000d:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.717080 kernel: pci 000d:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.717141 kernel: pci 000d:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.717202 kernel: pci 000d:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.717262 kernel: pci 000d:00:01.0: PCI bridge to [bus 01] Apr 12 21:16:24.717322 kernel: pci 000d:00:01.0: bridge window [mem 0x50000000-0x501fffff] Apr 12 21:16:24.717380 kernel: pci 000d:00:01.0: bridge window [mem 0x340000000000-0x3400001fffff 64bit pref] Apr 12 21:16:24.717441 kernel: pci 000d:00:02.0: PCI bridge to [bus 02] Apr 12 21:16:24.717500 kernel: pci 000d:00:02.0: bridge window [mem 0x50200000-0x503fffff] Apr 12 21:16:24.717560 kernel: pci 000d:00:02.0: bridge window [mem 0x340000200000-0x3400003fffff 64bit pref] Apr 12 21:16:24.717621 kernel: pci 000d:00:03.0: PCI bridge to [bus 03] Apr 12 21:16:24.717681 kernel: pci 000d:00:03.0: bridge window [mem 0x50400000-0x505fffff] Apr 12 21:16:24.717740 kernel: pci 000d:00:03.0: bridge window [mem 0x340000400000-0x3400005fffff 64bit pref] Apr 12 21:16:24.717800 kernel: pci 000d:00:04.0: PCI bridge to [bus 04] Apr 12 21:16:24.717859 kernel: pci 000d:00:04.0: bridge window [mem 0x50600000-0x507fffff] Apr 12 21:16:24.717919 kernel: pci 000d:00:04.0: bridge window [mem 0x340000600000-0x3400007fffff 64bit pref] Apr 12 21:16:24.717976 kernel: pci_bus 000d:00: resource 4 [mem 0x50000000-0x5fffffff window] Apr 12 21:16:24.718029 kernel: pci_bus 000d:00: resource 5 [mem 0x340000000000-0x37ffdfffffff window] Apr 12 21:16:24.718101 kernel: pci_bus 000d:01: resource 1 [mem 0x50000000-0x501fffff] Apr 12 21:16:24.718157 kernel: pci_bus 000d:01: resource 2 [mem 0x340000000000-0x3400001fffff 64bit pref] Apr 12 21:16:24.718222 kernel: pci_bus 000d:02: resource 1 [mem 0x50200000-0x503fffff] Apr 12 21:16:24.718279 kernel: pci_bus 000d:02: resource 2 [mem 0x340000200000-0x3400003fffff 64bit pref] Apr 12 21:16:24.718350 kernel: pci_bus 000d:03: resource 1 [mem 0x50400000-0x505fffff] Apr 12 21:16:24.718408 kernel: pci_bus 000d:03: resource 2 [mem 0x340000400000-0x3400005fffff 64bit pref] Apr 12 21:16:24.718472 kernel: pci_bus 000d:04: resource 1 [mem 0x50600000-0x507fffff] Apr 12 21:16:24.718529 kernel: pci_bus 000d:04: resource 2 [mem 0x340000600000-0x3400007fffff 64bit pref] Apr 12 21:16:24.718538 kernel: ACPI: PCI Root Bridge [PCI3] (domain 0000 [bus 00-ff]) Apr 12 21:16:24.718603 kernel: acpi PNP0A08:01: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 21:16:24.718690 kernel: acpi PNP0A08:01: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 21:16:24.718751 kernel: acpi PNP0A08:01: _OSC: OS now controls [AER PCIeCapability] Apr 12 21:16:24.718811 kernel: acpi PNP0A08:01: MCFG quirk: ECAM at [mem 0x3ffff0000000-0x3fffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 21:16:24.718868 kernel: acpi PNP0A08:01: ECAM area [mem 0x3ffff0000000-0x3fffffffffff] reserved by PNP0C02:00 Apr 12 21:16:24.718926 kernel: acpi PNP0A08:01: ECAM at [mem 0x3ffff0000000-0x3fffffffffff] for [bus 00-ff] Apr 12 21:16:24.718935 kernel: PCI host bridge to bus 0000:00 Apr 12 21:16:24.718996 kernel: pci_bus 0000:00: root bus resource [mem 0x70000000-0x7fffffff window] Apr 12 21:16:24.719060 kernel: pci_bus 0000:00: root bus resource [mem 0x3c0000000000-0x3fffdfffffff window] Apr 12 21:16:24.719118 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 21:16:24.719185 kernel: pci 0000:00:00.0: [1def:e100] type 00 class 0x060000 Apr 12 21:16:24.719254 kernel: pci 0000:00:01.0: [1def:e101] type 01 class 0x060400 Apr 12 21:16:24.719315 kernel: pci 0000:00:01.0: enabling Extended Tags Apr 12 21:16:24.719374 kernel: pci 0000:00:01.0: supports D1 D2 Apr 12 21:16:24.719434 kernel: pci 0000:00:01.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.719503 kernel: pci 0000:00:02.0: [1def:e102] type 01 class 0x060400 Apr 12 21:16:24.719565 kernel: pci 0000:00:02.0: supports D1 D2 Apr 12 21:16:24.719625 kernel: pci 0000:00:02.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.719692 kernel: pci 0000:00:03.0: [1def:e103] type 01 class 0x060400 Apr 12 21:16:24.719756 kernel: pci 0000:00:03.0: supports D1 D2 Apr 12 21:16:24.719819 kernel: pci 0000:00:03.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.719885 kernel: pci 0000:00:04.0: [1def:e104] type 01 class 0x060400 Apr 12 21:16:24.719948 kernel: pci 0000:00:04.0: supports D1 D2 Apr 12 21:16:24.720009 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.720018 kernel: acpiphp: Slot [1-1] registered Apr 12 21:16:24.720025 kernel: acpiphp: Slot [2-1] registered Apr 12 21:16:24.720032 kernel: acpiphp: Slot [3-1] registered Apr 12 21:16:24.720043 kernel: acpiphp: Slot [4-1] registered Apr 12 21:16:24.720095 kernel: pci_bus 0000:00: on NUMA node 0 Apr 12 21:16:24.720158 kernel: pci 0000:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 21:16:24.720220 kernel: pci 0000:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 21:16:24.720281 kernel: pci 0000:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 21:16:24.720342 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 21:16:24.720401 kernel: pci 0000:00:02.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 21:16:24.720462 kernel: pci 0000:00:02.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 21:16:24.720521 kernel: pci 0000:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 21:16:24.720584 kernel: pci 0000:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 21:16:24.720645 kernel: pci 0000:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 03] add_size 200000 add_align 100000 Apr 12 21:16:24.720707 kernel: pci 0000:00:04.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 21:16:24.720766 kernel: pci 0000:00:04.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 21:16:24.720826 kernel: pci 0000:00:04.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 21:16:24.720886 kernel: pci 0000:00:01.0: BAR 14: assigned [mem 0x70000000-0x701fffff] Apr 12 21:16:24.720945 kernel: pci 0000:00:01.0: BAR 15: assigned [mem 0x3c0000000000-0x3c00001fffff 64bit pref] Apr 12 21:16:24.721007 kernel: pci 0000:00:02.0: BAR 14: assigned [mem 0x70200000-0x703fffff] Apr 12 21:16:24.721073 kernel: pci 0000:00:02.0: BAR 15: assigned [mem 0x3c0000200000-0x3c00003fffff 64bit pref] Apr 12 21:16:24.721134 kernel: pci 0000:00:03.0: BAR 14: assigned [mem 0x70400000-0x705fffff] Apr 12 21:16:24.721193 kernel: pci 0000:00:03.0: BAR 15: assigned [mem 0x3c0000400000-0x3c00005fffff 64bit pref] Apr 12 21:16:24.721254 kernel: pci 0000:00:04.0: BAR 14: assigned [mem 0x70600000-0x707fffff] Apr 12 21:16:24.721313 kernel: pci 0000:00:04.0: BAR 15: assigned [mem 0x3c0000600000-0x3c00007fffff 64bit pref] Apr 12 21:16:24.721373 kernel: pci 0000:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.721433 kernel: pci 0000:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.721493 kernel: pci 0000:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.721556 kernel: pci 0000:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.721617 kernel: pci 0000:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.721678 kernel: pci 0000:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.721737 kernel: pci 0000:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.721796 kernel: pci 0000:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.721856 kernel: pci 0000:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.721918 kernel: pci 0000:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.721978 kernel: pci 0000:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.722053 kernel: pci 0000:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.722113 kernel: pci 0000:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.722171 kernel: pci 0000:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.722230 kernel: pci 0000:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.722288 kernel: pci 0000:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.722346 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 21:16:24.722405 kernel: pci 0000:00:01.0: bridge window [mem 0x70000000-0x701fffff] Apr 12 21:16:24.722464 kernel: pci 0000:00:01.0: bridge window [mem 0x3c0000000000-0x3c00001fffff 64bit pref] Apr 12 21:16:24.722525 kernel: pci 0000:00:02.0: PCI bridge to [bus 02] Apr 12 21:16:24.722585 kernel: pci 0000:00:02.0: bridge window [mem 0x70200000-0x703fffff] Apr 12 21:16:24.722646 kernel: pci 0000:00:02.0: bridge window [mem 0x3c0000200000-0x3c00003fffff 64bit pref] Apr 12 21:16:24.722706 kernel: pci 0000:00:03.0: PCI bridge to [bus 03] Apr 12 21:16:24.722767 kernel: pci 0000:00:03.0: bridge window [mem 0x70400000-0x705fffff] Apr 12 21:16:24.722829 kernel: pci 0000:00:03.0: bridge window [mem 0x3c0000400000-0x3c00005fffff 64bit pref] Apr 12 21:16:24.722888 kernel: pci 0000:00:04.0: PCI bridge to [bus 04] Apr 12 21:16:24.722947 kernel: pci 0000:00:04.0: bridge window [mem 0x70600000-0x707fffff] Apr 12 21:16:24.723008 kernel: pci 0000:00:04.0: bridge window [mem 0x3c0000600000-0x3c00007fffff 64bit pref] Apr 12 21:16:24.723065 kernel: pci_bus 0000:00: resource 4 [mem 0x70000000-0x7fffffff window] Apr 12 21:16:24.723121 kernel: pci_bus 0000:00: resource 5 [mem 0x3c0000000000-0x3fffdfffffff window] Apr 12 21:16:24.723186 kernel: pci_bus 0000:01: resource 1 [mem 0x70000000-0x701fffff] Apr 12 21:16:24.723244 kernel: pci_bus 0000:01: resource 2 [mem 0x3c0000000000-0x3c00001fffff 64bit pref] Apr 12 21:16:24.723307 kernel: pci_bus 0000:02: resource 1 [mem 0x70200000-0x703fffff] Apr 12 21:16:24.723363 kernel: pci_bus 0000:02: resource 2 [mem 0x3c0000200000-0x3c00003fffff 64bit pref] Apr 12 21:16:24.723433 kernel: pci_bus 0000:03: resource 1 [mem 0x70400000-0x705fffff] Apr 12 21:16:24.723491 kernel: pci_bus 0000:03: resource 2 [mem 0x3c0000400000-0x3c00005fffff 64bit pref] Apr 12 21:16:24.723554 kernel: pci_bus 0000:04: resource 1 [mem 0x70600000-0x707fffff] Apr 12 21:16:24.723609 kernel: pci_bus 0000:04: resource 2 [mem 0x3c0000600000-0x3c00007fffff 64bit pref] Apr 12 21:16:24.723619 kernel: ACPI: PCI Root Bridge [PCI7] (domain 0005 [bus 00-ff]) Apr 12 21:16:24.723686 kernel: acpi PNP0A08:02: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 21:16:24.723744 kernel: acpi PNP0A08:02: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 21:16:24.723805 kernel: acpi PNP0A08:02: _OSC: OS now controls [AER PCIeCapability] Apr 12 21:16:24.723863 kernel: acpi PNP0A08:02: MCFG quirk: ECAM at [mem 0x2ffff0000000-0x2fffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 21:16:24.723921 kernel: acpi PNP0A08:02: ECAM area [mem 0x2ffff0000000-0x2fffffffffff] reserved by PNP0C02:00 Apr 12 21:16:24.723978 kernel: acpi PNP0A08:02: ECAM at [mem 0x2ffff0000000-0x2fffffffffff] for [bus 00-ff] Apr 12 21:16:24.723988 kernel: PCI host bridge to bus 0005:00 Apr 12 21:16:24.724051 kernel: pci_bus 0005:00: root bus resource [mem 0x30000000-0x3fffffff window] Apr 12 21:16:24.724106 kernel: pci_bus 0005:00: root bus resource [mem 0x2c0000000000-0x2fffdfffffff window] Apr 12 21:16:24.724160 kernel: pci_bus 0005:00: root bus resource [bus 00-ff] Apr 12 21:16:24.724229 kernel: pci 0005:00:00.0: [1def:e110] type 00 class 0x060000 Apr 12 21:16:24.724296 kernel: pci 0005:00:01.0: [1def:e111] type 01 class 0x060400 Apr 12 21:16:24.724356 kernel: pci 0005:00:01.0: supports D1 D2 Apr 12 21:16:24.724416 kernel: pci 0005:00:01.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.724482 kernel: pci 0005:00:03.0: [1def:e113] type 01 class 0x060400 Apr 12 21:16:24.724543 kernel: pci 0005:00:03.0: supports D1 D2 Apr 12 21:16:24.724604 kernel: pci 0005:00:03.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.724670 kernel: pci 0005:00:05.0: [1def:e115] type 01 class 0x060400 Apr 12 21:16:24.724730 kernel: pci 0005:00:05.0: supports D1 D2 Apr 12 21:16:24.724790 kernel: pci 0005:00:05.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.724855 kernel: pci 0005:00:07.0: [1def:e117] type 01 class 0x060400 Apr 12 21:16:24.724914 kernel: pci 0005:00:07.0: supports D1 D2 Apr 12 21:16:24.724975 kernel: pci 0005:00:07.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.724986 kernel: acpiphp: Slot [1-2] registered Apr 12 21:16:24.724993 kernel: acpiphp: Slot [2-2] registered Apr 12 21:16:24.725063 kernel: pci 0005:03:00.0: [144d:a808] type 00 class 0x010802 Apr 12 21:16:24.725130 kernel: pci 0005:03:00.0: reg 0x10: [mem 0x30110000-0x30113fff 64bit] Apr 12 21:16:24.725193 kernel: pci 0005:03:00.0: reg 0x30: [mem 0x30100000-0x3010ffff pref] Apr 12 21:16:24.725264 kernel: pci 0005:04:00.0: [144d:a808] type 00 class 0x010802 Apr 12 21:16:24.725327 kernel: pci 0005:04:00.0: reg 0x10: [mem 0x30010000-0x30013fff 64bit] Apr 12 21:16:24.725392 kernel: pci 0005:04:00.0: reg 0x30: [mem 0x30000000-0x3000ffff pref] Apr 12 21:16:24.725446 kernel: pci_bus 0005:00: on NUMA node 0 Apr 12 21:16:24.725508 kernel: pci 0005:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 21:16:24.725568 kernel: pci 0005:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 21:16:24.725627 kernel: pci 0005:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 21:16:24.725688 kernel: pci 0005:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 21:16:24.725747 kernel: pci 0005:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 21:16:24.725808 kernel: pci 0005:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 21:16:24.725869 kernel: pci 0005:00:05.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 21:16:24.725929 kernel: pci 0005:00:05.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 21:16:24.725988 kernel: pci 0005:00:05.0: bridge window [mem 0x00100000-0x001fffff] to [bus 03] add_size 100000 add_align 100000 Apr 12 21:16:24.726051 kernel: pci 0005:00:07.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 21:16:24.726110 kernel: pci 0005:00:07.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 21:16:24.726169 kernel: pci 0005:00:07.0: bridge window [mem 0x00100000-0x001fffff] to [bus 04] add_size 100000 add_align 100000 Apr 12 21:16:24.726232 kernel: pci 0005:00:01.0: BAR 14: assigned [mem 0x30000000-0x301fffff] Apr 12 21:16:24.726291 kernel: pci 0005:00:01.0: BAR 15: assigned [mem 0x2c0000000000-0x2c00001fffff 64bit pref] Apr 12 21:16:24.726351 kernel: pci 0005:00:03.0: BAR 14: assigned [mem 0x30200000-0x303fffff] Apr 12 21:16:24.726411 kernel: pci 0005:00:03.0: BAR 15: assigned [mem 0x2c0000200000-0x2c00003fffff 64bit pref] Apr 12 21:16:24.726472 kernel: pci 0005:00:05.0: BAR 14: assigned [mem 0x30400000-0x305fffff] Apr 12 21:16:24.726531 kernel: pci 0005:00:05.0: BAR 15: assigned [mem 0x2c0000400000-0x2c00005fffff 64bit pref] Apr 12 21:16:24.726590 kernel: pci 0005:00:07.0: BAR 14: assigned [mem 0x30600000-0x307fffff] Apr 12 21:16:24.726652 kernel: pci 0005:00:07.0: BAR 15: assigned [mem 0x2c0000600000-0x2c00007fffff 64bit pref] Apr 12 21:16:24.726712 kernel: pci 0005:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.726772 kernel: pci 0005:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.726831 kernel: pci 0005:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.726891 kernel: pci 0005:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.726950 kernel: pci 0005:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.727009 kernel: pci 0005:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.727070 kernel: pci 0005:00:07.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.727131 kernel: pci 0005:00:07.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.727191 kernel: pci 0005:00:07.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.727249 kernel: pci 0005:00:07.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.727309 kernel: pci 0005:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.727367 kernel: pci 0005:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.727426 kernel: pci 0005:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.727484 kernel: pci 0005:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.727543 kernel: pci 0005:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.727603 kernel: pci 0005:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.727663 kernel: pci 0005:00:01.0: PCI bridge to [bus 01] Apr 12 21:16:24.727723 kernel: pci 0005:00:01.0: bridge window [mem 0x30000000-0x301fffff] Apr 12 21:16:24.727783 kernel: pci 0005:00:01.0: bridge window [mem 0x2c0000000000-0x2c00001fffff 64bit pref] Apr 12 21:16:24.727844 kernel: pci 0005:00:03.0: PCI bridge to [bus 02] Apr 12 21:16:24.727902 kernel: pci 0005:00:03.0: bridge window [mem 0x30200000-0x303fffff] Apr 12 21:16:24.727962 kernel: pci 0005:00:03.0: bridge window [mem 0x2c0000200000-0x2c00003fffff 64bit pref] Apr 12 21:16:24.728024 kernel: pci 0005:03:00.0: BAR 6: assigned [mem 0x30400000-0x3040ffff pref] Apr 12 21:16:24.728090 kernel: pci 0005:03:00.0: BAR 0: assigned [mem 0x30410000-0x30413fff 64bit] Apr 12 21:16:24.728151 kernel: pci 0005:00:05.0: PCI bridge to [bus 03] Apr 12 21:16:24.728209 kernel: pci 0005:00:05.0: bridge window [mem 0x30400000-0x305fffff] Apr 12 21:16:24.728269 kernel: pci 0005:00:05.0: bridge window [mem 0x2c0000400000-0x2c00005fffff 64bit pref] Apr 12 21:16:24.728331 kernel: pci 0005:04:00.0: BAR 6: assigned [mem 0x30600000-0x3060ffff pref] Apr 12 21:16:24.728394 kernel: pci 0005:04:00.0: BAR 0: assigned [mem 0x30610000-0x30613fff 64bit] Apr 12 21:16:24.728453 kernel: pci 0005:00:07.0: PCI bridge to [bus 04] Apr 12 21:16:24.728515 kernel: pci 0005:00:07.0: bridge window [mem 0x30600000-0x307fffff] Apr 12 21:16:24.728574 kernel: pci 0005:00:07.0: bridge window [mem 0x2c0000600000-0x2c00007fffff 64bit pref] Apr 12 21:16:24.728627 kernel: pci_bus 0005:00: resource 4 [mem 0x30000000-0x3fffffff window] Apr 12 21:16:24.728681 kernel: pci_bus 0005:00: resource 5 [mem 0x2c0000000000-0x2fffdfffffff window] Apr 12 21:16:24.728746 kernel: pci_bus 0005:01: resource 1 [mem 0x30000000-0x301fffff] Apr 12 21:16:24.728804 kernel: pci_bus 0005:01: resource 2 [mem 0x2c0000000000-0x2c00001fffff 64bit pref] Apr 12 21:16:24.728875 kernel: pci_bus 0005:02: resource 1 [mem 0x30200000-0x303fffff] Apr 12 21:16:24.728932 kernel: pci_bus 0005:02: resource 2 [mem 0x2c0000200000-0x2c00003fffff 64bit pref] Apr 12 21:16:24.728994 kernel: pci_bus 0005:03: resource 1 [mem 0x30400000-0x305fffff] Apr 12 21:16:24.729053 kernel: pci_bus 0005:03: resource 2 [mem 0x2c0000400000-0x2c00005fffff 64bit pref] Apr 12 21:16:24.729117 kernel: pci_bus 0005:04: resource 1 [mem 0x30600000-0x307fffff] Apr 12 21:16:24.729176 kernel: pci_bus 0005:04: resource 2 [mem 0x2c0000600000-0x2c00007fffff 64bit pref] Apr 12 21:16:24.729185 kernel: ACPI: PCI Root Bridge [PCI5] (domain 0003 [bus 00-ff]) Apr 12 21:16:24.729250 kernel: acpi PNP0A08:03: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 21:16:24.729308 kernel: acpi PNP0A08:03: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 21:16:24.729366 kernel: acpi PNP0A08:03: _OSC: OS now controls [AER PCIeCapability] Apr 12 21:16:24.729423 kernel: acpi PNP0A08:03: MCFG quirk: ECAM at [mem 0x27fff0000000-0x27ffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 21:16:24.729482 kernel: acpi PNP0A08:03: ECAM area [mem 0x27fff0000000-0x27ffffffffff] reserved by PNP0C02:00 Apr 12 21:16:24.729541 kernel: acpi PNP0A08:03: ECAM at [mem 0x27fff0000000-0x27ffffffffff] for [bus 00-ff] Apr 12 21:16:24.729550 kernel: PCI host bridge to bus 0003:00 Apr 12 21:16:24.729611 kernel: pci_bus 0003:00: root bus resource [mem 0x10000000-0x1fffffff window] Apr 12 21:16:24.729665 kernel: pci_bus 0003:00: root bus resource [mem 0x240000000000-0x27ffdfffffff window] Apr 12 21:16:24.729717 kernel: pci_bus 0003:00: root bus resource [bus 00-ff] Apr 12 21:16:24.729784 kernel: pci 0003:00:00.0: [1def:e110] type 00 class 0x060000 Apr 12 21:16:24.729851 kernel: pci 0003:00:01.0: [1def:e111] type 01 class 0x060400 Apr 12 21:16:24.729915 kernel: pci 0003:00:01.0: supports D1 D2 Apr 12 21:16:24.729974 kernel: pci 0003:00:01.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.730043 kernel: pci 0003:00:03.0: [1def:e113] type 01 class 0x060400 Apr 12 21:16:24.730103 kernel: pci 0003:00:03.0: supports D1 D2 Apr 12 21:16:24.730162 kernel: pci 0003:00:03.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.730230 kernel: pci 0003:00:05.0: [1def:e115] type 01 class 0x060400 Apr 12 21:16:24.730289 kernel: pci 0003:00:05.0: supports D1 D2 Apr 12 21:16:24.730352 kernel: pci 0003:00:05.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.730362 kernel: acpiphp: Slot [1-3] registered Apr 12 21:16:24.730369 kernel: acpiphp: Slot [2-3] registered Apr 12 21:16:24.730437 kernel: pci 0003:03:00.0: [8086:1521] type 00 class 0x020000 Apr 12 21:16:24.730500 kernel: pci 0003:03:00.0: reg 0x10: [mem 0x10020000-0x1003ffff] Apr 12 21:16:24.730561 kernel: pci 0003:03:00.0: reg 0x18: [io 0x1fff8020-0x1fff803f] Apr 12 21:16:24.730626 kernel: pci 0003:03:00.0: reg 0x1c: [mem 0x10044000-0x10047fff] Apr 12 21:16:24.730692 kernel: pci 0003:03:00.0: PME# supported from D0 D3hot D3cold Apr 12 21:16:24.730756 kernel: pci 0003:03:00.0: reg 0x184: [mem 0x00000000-0x00003fff 64bit pref] Apr 12 21:16:24.730820 kernel: pci 0003:03:00.0: VF(n) BAR0 space: [mem 0x00000000-0x0001ffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 21:16:24.730880 kernel: pci 0003:03:00.0: reg 0x190: [mem 0x00000000-0x00003fff 64bit pref] Apr 12 21:16:24.730943 kernel: pci 0003:03:00.0: VF(n) BAR3 space: [mem 0x00000000-0x0001ffff 64bit pref] (contains BAR3 for 8 VFs) Apr 12 21:16:24.731004 kernel: pci 0003:03:00.0: 8.000 Gb/s available PCIe bandwidth, limited by 5.0 GT/s PCIe x2 link at 0003:00:05.0 (capable of 16.000 Gb/s with 5.0 GT/s PCIe x4 link) Apr 12 21:16:24.731077 kernel: pci 0003:03:00.1: [8086:1521] type 00 class 0x020000 Apr 12 21:16:24.731141 kernel: pci 0003:03:00.1: reg 0x10: [mem 0x10000000-0x1001ffff] Apr 12 21:16:24.731203 kernel: pci 0003:03:00.1: reg 0x18: [io 0x1fff8000-0x1fff801f] Apr 12 21:16:24.731265 kernel: pci 0003:03:00.1: reg 0x1c: [mem 0x10040000-0x10043fff] Apr 12 21:16:24.731327 kernel: pci 0003:03:00.1: PME# supported from D0 D3hot D3cold Apr 12 21:16:24.731388 kernel: pci 0003:03:00.1: reg 0x184: [mem 0x00000000-0x00003fff 64bit pref] Apr 12 21:16:24.731450 kernel: pci 0003:03:00.1: VF(n) BAR0 space: [mem 0x00000000-0x0001ffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 21:16:24.731512 kernel: pci 0003:03:00.1: reg 0x190: [mem 0x00000000-0x00003fff 64bit pref] Apr 12 21:16:24.731574 kernel: pci 0003:03:00.1: VF(n) BAR3 space: [mem 0x00000000-0x0001ffff 64bit pref] (contains BAR3 for 8 VFs) Apr 12 21:16:24.731630 kernel: pci_bus 0003:00: on NUMA node 0 Apr 12 21:16:24.731682 kernel: pci_bus 0003:00: max bus depth: 1 pci_try_num: 2 Apr 12 21:16:24.731744 kernel: pci 0003:00:01.0: BAR 14: assigned [mem 0x10000000-0x101fffff] Apr 12 21:16:24.731803 kernel: pci 0003:00:01.0: BAR 15: assigned [mem 0x240000000000-0x2400001fffff 64bit pref] Apr 12 21:16:24.731864 kernel: pci 0003:00:03.0: BAR 14: assigned [mem 0x10200000-0x103fffff] Apr 12 21:16:24.731923 kernel: pci 0003:00:03.0: BAR 15: assigned [mem 0x240000200000-0x2400003fffff 64bit pref] Apr 12 21:16:24.731984 kernel: pci 0003:00:05.0: BAR 14: assigned [mem 0x10400000-0x105fffff] Apr 12 21:16:24.732049 kernel: pci 0003:00:05.0: BAR 15: assigned [mem 0x240000400000-0x2400005fffff 64bit pref] Apr 12 21:16:24.732114 kernel: pci 0003:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.732174 kernel: pci 0003:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.732233 kernel: pci 0003:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.732295 kernel: pci 0003:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.732354 kernel: pci 0003:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.732414 kernel: pci 0003:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.732475 kernel: pci 0003:00:01.0: PCI bridge to [bus 01] Apr 12 21:16:24.732535 kernel: pci 0003:00:01.0: bridge window [mem 0x10000000-0x101fffff] Apr 12 21:16:24.732594 kernel: pci 0003:00:01.0: bridge window [mem 0x240000000000-0x2400001fffff 64bit pref] Apr 12 21:16:24.732653 kernel: pci 0003:00:03.0: PCI bridge to [bus 02] Apr 12 21:16:24.732712 kernel: pci 0003:00:03.0: bridge window [mem 0x10200000-0x103fffff] Apr 12 21:16:24.732771 kernel: pci 0003:00:03.0: bridge window [mem 0x240000200000-0x2400003fffff 64bit pref] Apr 12 21:16:24.732845 kernel: pci 0003:03:00.0: BAR 0: assigned [mem 0x10400000-0x1041ffff] Apr 12 21:16:24.732910 kernel: pci 0003:03:00.1: BAR 0: assigned [mem 0x10420000-0x1043ffff] Apr 12 21:16:24.732973 kernel: pci 0003:03:00.0: BAR 3: assigned [mem 0x10440000-0x10443fff] Apr 12 21:16:24.733116 kernel: pci 0003:03:00.0: BAR 7: assigned [mem 0x240000400000-0x24000041ffff 64bit pref] Apr 12 21:16:24.733187 kernel: pci 0003:03:00.0: BAR 10: assigned [mem 0x240000420000-0x24000043ffff 64bit pref] Apr 12 21:16:24.733249 kernel: pci 0003:03:00.1: BAR 3: assigned [mem 0x10444000-0x10447fff] Apr 12 21:16:24.733311 kernel: pci 0003:03:00.1: BAR 7: assigned [mem 0x240000440000-0x24000045ffff 64bit pref] Apr 12 21:16:24.733372 kernel: pci 0003:03:00.1: BAR 10: assigned [mem 0x240000460000-0x24000047ffff 64bit pref] Apr 12 21:16:24.733432 kernel: pci 0003:03:00.0: BAR 2: no space for [io size 0x0020] Apr 12 21:16:24.733492 kernel: pci 0003:03:00.0: BAR 2: failed to assign [io size 0x0020] Apr 12 21:16:24.733556 kernel: pci 0003:03:00.1: BAR 2: no space for [io size 0x0020] Apr 12 21:16:24.733617 kernel: pci 0003:03:00.1: BAR 2: failed to assign [io size 0x0020] Apr 12 21:16:24.733676 kernel: pci 0003:00:05.0: PCI bridge to [bus 03] Apr 12 21:16:24.733735 kernel: pci 0003:00:05.0: bridge window [mem 0x10400000-0x105fffff] Apr 12 21:16:24.733793 kernel: pci 0003:00:05.0: bridge window [mem 0x240000400000-0x2400005fffff 64bit pref] Apr 12 21:16:24.733847 kernel: pci_bus 0003:00: No. 2 try to assign unassigned res Apr 12 21:16:24.733906 kernel: pci 0003:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.733967 kernel: pci 0003:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.734026 kernel: pci 0003:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.734086 kernel: pci 0003:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.734147 kernel: pci 0003:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.734206 kernel: pci 0003:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.734264 kernel: pci 0003:00:01.0: PCI bridge to [bus 01] Apr 12 21:16:24.734322 kernel: pci 0003:00:01.0: bridge window [mem 0x10000000-0x101fffff] Apr 12 21:16:24.734382 kernel: pci 0003:00:01.0: bridge window [mem 0x240000000000-0x2400001fffff 64bit pref] Apr 12 21:16:24.734441 kernel: pci 0003:00:03.0: PCI bridge to [bus 02] Apr 12 21:16:24.734500 kernel: pci 0003:00:03.0: bridge window [mem 0x10200000-0x103fffff] Apr 12 21:16:24.734558 kernel: pci 0003:00:03.0: bridge window [mem 0x240000200000-0x2400003fffff 64bit pref] Apr 12 21:16:24.734619 kernel: pci 0003:03:00.0: BAR 2: no space for [io size 0x0020] Apr 12 21:16:24.734680 kernel: pci 0003:03:00.0: BAR 2: failed to assign [io size 0x0020] Apr 12 21:16:24.734741 kernel: pci 0003:03:00.1: BAR 2: no space for [io size 0x0020] Apr 12 21:16:24.734801 kernel: pci 0003:03:00.1: BAR 2: failed to assign [io size 0x0020] Apr 12 21:16:24.734862 kernel: pci 0003:00:05.0: PCI bridge to [bus 03] Apr 12 21:16:24.734921 kernel: pci 0003:00:05.0: bridge window [mem 0x10400000-0x105fffff] Apr 12 21:16:24.734981 kernel: pci 0003:00:05.0: bridge window [mem 0x240000400000-0x2400005fffff 64bit pref] Apr 12 21:16:24.735036 kernel: pci_bus 0003:00: Automatically enabled pci realloc, if you have problem, try booting with pci=realloc=off Apr 12 21:16:24.735089 kernel: pci_bus 0003:00: resource 4 [mem 0x10000000-0x1fffffff window] Apr 12 21:16:24.735142 kernel: pci_bus 0003:00: resource 5 [mem 0x240000000000-0x27ffdfffffff window] Apr 12 21:16:24.735221 kernel: pci_bus 0003:01: resource 1 [mem 0x10000000-0x101fffff] Apr 12 21:16:24.735288 kernel: pci_bus 0003:01: resource 2 [mem 0x240000000000-0x2400001fffff 64bit pref] Apr 12 21:16:24.735352 kernel: pci_bus 0003:02: resource 1 [mem 0x10200000-0x103fffff] Apr 12 21:16:24.735412 kernel: pci_bus 0003:02: resource 2 [mem 0x240000200000-0x2400003fffff 64bit pref] Apr 12 21:16:24.735478 kernel: pci_bus 0003:03: resource 1 [mem 0x10400000-0x105fffff] Apr 12 21:16:24.735579 kernel: pci_bus 0003:03: resource 2 [mem 0x240000400000-0x2400005fffff 64bit pref] Apr 12 21:16:24.735591 kernel: ACPI: PCI Root Bridge [PCI0] (domain 000c [bus 00-ff]) Apr 12 21:16:24.735656 kernel: acpi PNP0A08:04: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 21:16:24.735717 kernel: acpi PNP0A08:04: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 21:16:24.735774 kernel: acpi PNP0A08:04: _OSC: OS now controls [AER PCIeCapability] Apr 12 21:16:24.735831 kernel: acpi PNP0A08:04: MCFG quirk: ECAM at [mem 0x33fff0000000-0x33ffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 21:16:24.735888 kernel: acpi PNP0A08:04: ECAM area [mem 0x33fff0000000-0x33ffffffffff] reserved by PNP0C02:00 Apr 12 21:16:24.735944 kernel: acpi PNP0A08:04: ECAM at [mem 0x33fff0000000-0x33ffffffffff] for [bus 00-ff] Apr 12 21:16:24.735954 kernel: PCI host bridge to bus 000c:00 Apr 12 21:16:24.736013 kernel: pci_bus 000c:00: root bus resource [mem 0x40000000-0x4fffffff window] Apr 12 21:16:24.736071 kernel: pci_bus 000c:00: root bus resource [mem 0x300000000000-0x33ffdfffffff window] Apr 12 21:16:24.736124 kernel: pci_bus 000c:00: root bus resource [bus 00-ff] Apr 12 21:16:24.736189 kernel: pci 000c:00:00.0: [1def:e100] type 00 class 0x060000 Apr 12 21:16:24.736256 kernel: pci 000c:00:01.0: [1def:e101] type 01 class 0x060400 Apr 12 21:16:24.736316 kernel: pci 000c:00:01.0: enabling Extended Tags Apr 12 21:16:24.736394 kernel: pci 000c:00:01.0: supports D1 D2 Apr 12 21:16:24.736455 kernel: pci 000c:00:01.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.736523 kernel: pci 000c:00:02.0: [1def:e102] type 01 class 0x060400 Apr 12 21:16:24.736583 kernel: pci 000c:00:02.0: supports D1 D2 Apr 12 21:16:24.736644 kernel: pci 000c:00:02.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.736708 kernel: pci 000c:00:03.0: [1def:e103] type 01 class 0x060400 Apr 12 21:16:24.736768 kernel: pci 000c:00:03.0: supports D1 D2 Apr 12 21:16:24.736826 kernel: pci 000c:00:03.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.736894 kernel: pci 000c:00:04.0: [1def:e104] type 01 class 0x060400 Apr 12 21:16:24.736954 kernel: pci 000c:00:04.0: supports D1 D2 Apr 12 21:16:24.737013 kernel: pci 000c:00:04.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.737023 kernel: acpiphp: Slot [1-4] registered Apr 12 21:16:24.737030 kernel: acpiphp: Slot [2-4] registered Apr 12 21:16:24.737135 kernel: acpiphp: Slot [3-2] registered Apr 12 21:16:24.737143 kernel: acpiphp: Slot [4-2] registered Apr 12 21:16:24.737202 kernel: pci_bus 000c:00: on NUMA node 0 Apr 12 21:16:24.737262 kernel: pci 000c:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 21:16:24.737324 kernel: pci 000c:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 21:16:24.737383 kernel: pci 000c:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 21:16:24.737443 kernel: pci 000c:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 21:16:24.737501 kernel: pci 000c:00:02.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 21:16:24.737559 kernel: pci 000c:00:02.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 21:16:24.737618 kernel: pci 000c:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 21:16:24.737676 kernel: pci 000c:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 21:16:24.737737 kernel: pci 000c:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 03] add_size 200000 add_align 100000 Apr 12 21:16:24.737795 kernel: pci 000c:00:04.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 21:16:24.737854 kernel: pci 000c:00:04.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 21:16:24.737912 kernel: pci 000c:00:04.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 21:16:24.737971 kernel: pci 000c:00:01.0: BAR 14: assigned [mem 0x40000000-0x401fffff] Apr 12 21:16:24.738029 kernel: pci 000c:00:01.0: BAR 15: assigned [mem 0x300000000000-0x3000001fffff 64bit pref] Apr 12 21:16:24.738091 kernel: pci 000c:00:02.0: BAR 14: assigned [mem 0x40200000-0x403fffff] Apr 12 21:16:24.738152 kernel: pci 000c:00:02.0: BAR 15: assigned [mem 0x300000200000-0x3000003fffff 64bit pref] Apr 12 21:16:24.738210 kernel: pci 000c:00:03.0: BAR 14: assigned [mem 0x40400000-0x405fffff] Apr 12 21:16:24.738268 kernel: pci 000c:00:03.0: BAR 15: assigned [mem 0x300000400000-0x3000005fffff 64bit pref] Apr 12 21:16:24.738327 kernel: pci 000c:00:04.0: BAR 14: assigned [mem 0x40600000-0x407fffff] Apr 12 21:16:24.738385 kernel: pci 000c:00:04.0: BAR 15: assigned [mem 0x300000600000-0x3000007fffff 64bit pref] Apr 12 21:16:24.738443 kernel: pci 000c:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.738501 kernel: pci 000c:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.738561 kernel: pci 000c:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.738620 kernel: pci 000c:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.738678 kernel: pci 000c:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.738737 kernel: pci 000c:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.738796 kernel: pci 000c:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.738854 kernel: pci 000c:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.738912 kernel: pci 000c:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.738974 kernel: pci 000c:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.739033 kernel: pci 000c:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.739096 kernel: pci 000c:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.739155 kernel: pci 000c:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.739212 kernel: pci 000c:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.739272 kernel: pci 000c:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.739329 kernel: pci 000c:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.739388 kernel: pci 000c:00:01.0: PCI bridge to [bus 01] Apr 12 21:16:24.739446 kernel: pci 000c:00:01.0: bridge window [mem 0x40000000-0x401fffff] Apr 12 21:16:24.739505 kernel: pci 000c:00:01.0: bridge window [mem 0x300000000000-0x3000001fffff 64bit pref] Apr 12 21:16:24.739565 kernel: pci 000c:00:02.0: PCI bridge to [bus 02] Apr 12 21:16:24.739623 kernel: pci 000c:00:02.0: bridge window [mem 0x40200000-0x403fffff] Apr 12 21:16:24.739682 kernel: pci 000c:00:02.0: bridge window [mem 0x300000200000-0x3000003fffff 64bit pref] Apr 12 21:16:24.739740 kernel: pci 000c:00:03.0: PCI bridge to [bus 03] Apr 12 21:16:24.739799 kernel: pci 000c:00:03.0: bridge window [mem 0x40400000-0x405fffff] Apr 12 21:16:24.739857 kernel: pci 000c:00:03.0: bridge window [mem 0x300000400000-0x3000005fffff 64bit pref] Apr 12 21:16:24.739918 kernel: pci 000c:00:04.0: PCI bridge to [bus 04] Apr 12 21:16:24.739977 kernel: pci 000c:00:04.0: bridge window [mem 0x40600000-0x407fffff] Apr 12 21:16:24.740037 kernel: pci 000c:00:04.0: bridge window [mem 0x300000600000-0x3000007fffff 64bit pref] Apr 12 21:16:24.740091 kernel: pci_bus 000c:00: resource 4 [mem 0x40000000-0x4fffffff window] Apr 12 21:16:24.740144 kernel: pci_bus 000c:00: resource 5 [mem 0x300000000000-0x33ffdfffffff window] Apr 12 21:16:24.740208 kernel: pci_bus 000c:01: resource 1 [mem 0x40000000-0x401fffff] Apr 12 21:16:24.740263 kernel: pci_bus 000c:01: resource 2 [mem 0x300000000000-0x3000001fffff 64bit pref] Apr 12 21:16:24.740327 kernel: pci_bus 000c:02: resource 1 [mem 0x40200000-0x403fffff] Apr 12 21:16:24.740382 kernel: pci_bus 000c:02: resource 2 [mem 0x300000200000-0x3000003fffff 64bit pref] Apr 12 21:16:24.740453 kernel: pci_bus 000c:03: resource 1 [mem 0x40400000-0x405fffff] Apr 12 21:16:24.740508 kernel: pci_bus 000c:03: resource 2 [mem 0x300000400000-0x3000005fffff 64bit pref] Apr 12 21:16:24.740570 kernel: pci_bus 000c:04: resource 1 [mem 0x40600000-0x407fffff] Apr 12 21:16:24.740626 kernel: pci_bus 000c:04: resource 2 [mem 0x300000600000-0x3000007fffff 64bit pref] Apr 12 21:16:24.740637 kernel: ACPI: PCI Root Bridge [PCI4] (domain 0002 [bus 00-ff]) Apr 12 21:16:24.740700 kernel: acpi PNP0A08:05: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 21:16:24.740758 kernel: acpi PNP0A08:05: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 21:16:24.740815 kernel: acpi PNP0A08:05: _OSC: OS now controls [AER PCIeCapability] Apr 12 21:16:24.740872 kernel: acpi PNP0A08:05: MCFG quirk: ECAM at [mem 0x23fff0000000-0x23ffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 21:16:24.740928 kernel: acpi PNP0A08:05: ECAM area [mem 0x23fff0000000-0x23ffffffffff] reserved by PNP0C02:00 Apr 12 21:16:24.740984 kernel: acpi PNP0A08:05: ECAM at [mem 0x23fff0000000-0x23ffffffffff] for [bus 00-ff] Apr 12 21:16:24.740995 kernel: PCI host bridge to bus 0002:00 Apr 12 21:16:24.741057 kernel: pci_bus 0002:00: root bus resource [mem 0x00800000-0x0fffffff window] Apr 12 21:16:24.741110 kernel: pci_bus 0002:00: root bus resource [mem 0x200000000000-0x23ffdfffffff window] Apr 12 21:16:24.741163 kernel: pci_bus 0002:00: root bus resource [bus 00-ff] Apr 12 21:16:24.741229 kernel: pci 0002:00:00.0: [1def:e110] type 00 class 0x060000 Apr 12 21:16:24.741295 kernel: pci 0002:00:01.0: [1def:e111] type 01 class 0x060400 Apr 12 21:16:24.741356 kernel: pci 0002:00:01.0: supports D1 D2 Apr 12 21:16:24.741415 kernel: pci 0002:00:01.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.741480 kernel: pci 0002:00:03.0: [1def:e113] type 01 class 0x060400 Apr 12 21:16:24.741538 kernel: pci 0002:00:03.0: supports D1 D2 Apr 12 21:16:24.741597 kernel: pci 0002:00:03.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.741661 kernel: pci 0002:00:05.0: [1def:e115] type 01 class 0x060400 Apr 12 21:16:24.741720 kernel: pci 0002:00:05.0: supports D1 D2 Apr 12 21:16:24.741780 kernel: pci 0002:00:05.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.741845 kernel: pci 0002:00:07.0: [1def:e117] type 01 class 0x060400 Apr 12 21:16:24.741904 kernel: pci 0002:00:07.0: supports D1 D2 Apr 12 21:16:24.741963 kernel: pci 0002:00:07.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.741972 kernel: acpiphp: Slot [1-5] registered Apr 12 21:16:24.741980 kernel: acpiphp: Slot [2-5] registered Apr 12 21:16:24.741987 kernel: acpiphp: Slot [3-3] registered Apr 12 21:16:24.741994 kernel: acpiphp: Slot [4-3] registered Apr 12 21:16:24.742048 kernel: pci_bus 0002:00: on NUMA node 0 Apr 12 21:16:24.742107 kernel: pci 0002:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 21:16:24.742168 kernel: pci 0002:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 21:16:24.742228 kernel: pci 0002:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 21:16:24.742288 kernel: pci 0002:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 21:16:24.742348 kernel: pci 0002:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 21:16:24.742407 kernel: pci 0002:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 21:16:24.742466 kernel: pci 0002:00:05.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 21:16:24.742524 kernel: pci 0002:00:05.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 21:16:24.742583 kernel: pci 0002:00:05.0: bridge window [mem 0x00100000-0x000fffff] to [bus 03] add_size 200000 add_align 100000 Apr 12 21:16:24.742642 kernel: pci 0002:00:07.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 21:16:24.742700 kernel: pci 0002:00:07.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 21:16:24.742760 kernel: pci 0002:00:07.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 21:16:24.742819 kernel: pci 0002:00:01.0: BAR 14: assigned [mem 0x00800000-0x009fffff] Apr 12 21:16:24.742877 kernel: pci 0002:00:01.0: BAR 15: assigned [mem 0x200000000000-0x2000001fffff 64bit pref] Apr 12 21:16:24.742936 kernel: pci 0002:00:03.0: BAR 14: assigned [mem 0x00a00000-0x00bfffff] Apr 12 21:16:24.742994 kernel: pci 0002:00:03.0: BAR 15: assigned [mem 0x200000200000-0x2000003fffff 64bit pref] Apr 12 21:16:24.743055 kernel: pci 0002:00:05.0: BAR 14: assigned [mem 0x00c00000-0x00dfffff] Apr 12 21:16:24.743115 kernel: pci 0002:00:05.0: BAR 15: assigned [mem 0x200000400000-0x2000005fffff 64bit pref] Apr 12 21:16:24.743176 kernel: pci 0002:00:07.0: BAR 14: assigned [mem 0x00e00000-0x00ffffff] Apr 12 21:16:24.743235 kernel: pci 0002:00:07.0: BAR 15: assigned [mem 0x200000600000-0x2000007fffff 64bit pref] Apr 12 21:16:24.743294 kernel: pci 0002:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.743353 kernel: pci 0002:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.743412 kernel: pci 0002:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.743470 kernel: pci 0002:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.743528 kernel: pci 0002:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.743586 kernel: pci 0002:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.743646 kernel: pci 0002:00:07.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.743707 kernel: pci 0002:00:07.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.743767 kernel: pci 0002:00:07.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.743826 kernel: pci 0002:00:07.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.743886 kernel: pci 0002:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.743944 kernel: pci 0002:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.744003 kernel: pci 0002:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.744066 kernel: pci 0002:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.744125 kernel: pci 0002:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.744187 kernel: pci 0002:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.744246 kernel: pci 0002:00:01.0: PCI bridge to [bus 01] Apr 12 21:16:24.744307 kernel: pci 0002:00:01.0: bridge window [mem 0x00800000-0x009fffff] Apr 12 21:16:24.744367 kernel: pci 0002:00:01.0: bridge window [mem 0x200000000000-0x2000001fffff 64bit pref] Apr 12 21:16:24.744426 kernel: pci 0002:00:03.0: PCI bridge to [bus 02] Apr 12 21:16:24.744486 kernel: pci 0002:00:03.0: bridge window [mem 0x00a00000-0x00bfffff] Apr 12 21:16:24.744545 kernel: pci 0002:00:03.0: bridge window [mem 0x200000200000-0x2000003fffff 64bit pref] Apr 12 21:16:24.744607 kernel: pci 0002:00:05.0: PCI bridge to [bus 03] Apr 12 21:16:24.744666 kernel: pci 0002:00:05.0: bridge window [mem 0x00c00000-0x00dfffff] Apr 12 21:16:24.744727 kernel: pci 0002:00:05.0: bridge window [mem 0x200000400000-0x2000005fffff 64bit pref] Apr 12 21:16:24.744786 kernel: pci 0002:00:07.0: PCI bridge to [bus 04] Apr 12 21:16:24.744846 kernel: pci 0002:00:07.0: bridge window [mem 0x00e00000-0x00ffffff] Apr 12 21:16:24.744907 kernel: pci 0002:00:07.0: bridge window [mem 0x200000600000-0x2000007fffff 64bit pref] Apr 12 21:16:24.744963 kernel: pci_bus 0002:00: resource 4 [mem 0x00800000-0x0fffffff window] Apr 12 21:16:24.745018 kernel: pci_bus 0002:00: resource 5 [mem 0x200000000000-0x23ffdfffffff window] Apr 12 21:16:24.745085 kernel: pci_bus 0002:01: resource 1 [mem 0x00800000-0x009fffff] Apr 12 21:16:24.745143 kernel: pci_bus 0002:01: resource 2 [mem 0x200000000000-0x2000001fffff 64bit pref] Apr 12 21:16:24.745207 kernel: pci_bus 0002:02: resource 1 [mem 0x00a00000-0x00bfffff] Apr 12 21:16:24.745265 kernel: pci_bus 0002:02: resource 2 [mem 0x200000200000-0x2000003fffff 64bit pref] Apr 12 21:16:24.745338 kernel: pci_bus 0002:03: resource 1 [mem 0x00c00000-0x00dfffff] Apr 12 21:16:24.745394 kernel: pci_bus 0002:03: resource 2 [mem 0x200000400000-0x2000005fffff 64bit pref] Apr 12 21:16:24.745457 kernel: pci_bus 0002:04: resource 1 [mem 0x00e00000-0x00ffffff] Apr 12 21:16:24.745513 kernel: pci_bus 0002:04: resource 2 [mem 0x200000600000-0x2000007fffff 64bit pref] Apr 12 21:16:24.745523 kernel: ACPI: PCI Root Bridge [PCI2] (domain 0001 [bus 00-ff]) Apr 12 21:16:24.745587 kernel: acpi PNP0A08:06: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 21:16:24.745647 kernel: acpi PNP0A08:06: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 21:16:24.745707 kernel: acpi PNP0A08:06: _OSC: OS now controls [AER PCIeCapability] Apr 12 21:16:24.745766 kernel: acpi PNP0A08:06: MCFG quirk: ECAM at [mem 0x3bfff0000000-0x3bffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 21:16:24.745824 kernel: acpi PNP0A08:06: ECAM area [mem 0x3bfff0000000-0x3bffffffffff] reserved by PNP0C02:00 Apr 12 21:16:24.745881 kernel: acpi PNP0A08:06: ECAM at [mem 0x3bfff0000000-0x3bffffffffff] for [bus 00-ff] Apr 12 21:16:24.745891 kernel: PCI host bridge to bus 0001:00 Apr 12 21:16:24.745950 kernel: pci_bus 0001:00: root bus resource [mem 0x60000000-0x6fffffff window] Apr 12 21:16:24.746006 kernel: pci_bus 0001:00: root bus resource [mem 0x380000000000-0x3bffdfffffff window] Apr 12 21:16:24.746072 kernel: pci_bus 0001:00: root bus resource [bus 00-ff] Apr 12 21:16:24.746141 kernel: pci 0001:00:00.0: [1def:e100] type 00 class 0x060000 Apr 12 21:16:24.746211 kernel: pci 0001:00:01.0: [1def:e101] type 01 class 0x060400 Apr 12 21:16:24.746272 kernel: pci 0001:00:01.0: enabling Extended Tags Apr 12 21:16:24.746332 kernel: pci 0001:00:01.0: supports D1 D2 Apr 12 21:16:24.746395 kernel: pci 0001:00:01.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.746462 kernel: pci 0001:00:02.0: [1def:e102] type 01 class 0x060400 Apr 12 21:16:24.746522 kernel: pci 0001:00:02.0: supports D1 D2 Apr 12 21:16:24.746582 kernel: pci 0001:00:02.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.746647 kernel: pci 0001:00:03.0: [1def:e103] type 01 class 0x060400 Apr 12 21:16:24.746707 kernel: pci 0001:00:03.0: supports D1 D2 Apr 12 21:16:24.746766 kernel: pci 0001:00:03.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.746836 kernel: pci 0001:00:04.0: [1def:e104] type 01 class 0x060400 Apr 12 21:16:24.746895 kernel: pci 0001:00:04.0: supports D1 D2 Apr 12 21:16:24.746954 kernel: pci 0001:00:04.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.746963 kernel: acpiphp: Slot [1-6] registered Apr 12 21:16:24.747031 kernel: pci 0001:01:00.0: [15b3:1015] type 00 class 0x020000 Apr 12 21:16:24.747098 kernel: pci 0001:01:00.0: reg 0x10: [mem 0x380002000000-0x380003ffffff 64bit pref] Apr 12 21:16:24.747161 kernel: pci 0001:01:00.0: reg 0x30: [mem 0x60100000-0x601fffff pref] Apr 12 21:16:24.747224 kernel: pci 0001:01:00.0: PME# supported from D3cold Apr 12 21:16:24.747286 kernel: pci 0001:01:00.0: 31.504 Gb/s available PCIe bandwidth, limited by 8.0 GT/s PCIe x4 link at 0001:00:01.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Apr 12 21:16:24.747355 kernel: pci 0001:01:00.1: [15b3:1015] type 00 class 0x020000 Apr 12 21:16:24.747418 kernel: pci 0001:01:00.1: reg 0x10: [mem 0x380000000000-0x380001ffffff 64bit pref] Apr 12 21:16:24.747479 kernel: pci 0001:01:00.1: reg 0x30: [mem 0x60000000-0x600fffff pref] Apr 12 21:16:24.747540 kernel: pci 0001:01:00.1: PME# supported from D3cold Apr 12 21:16:24.747550 kernel: acpiphp: Slot [2-6] registered Apr 12 21:16:24.747557 kernel: acpiphp: Slot [3-4] registered Apr 12 21:16:24.747566 kernel: acpiphp: Slot [4-4] registered Apr 12 21:16:24.747618 kernel: pci_bus 0001:00: on NUMA node 0 Apr 12 21:16:24.747678 kernel: pci 0001:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 21:16:24.747738 kernel: pci 0001:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 21:16:24.747798 kernel: pci 0001:00:02.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 21:16:24.747859 kernel: pci 0001:00:02.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 21:16:24.747919 kernel: pci 0001:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 21:16:24.747980 kernel: pci 0001:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 21:16:24.748044 kernel: pci 0001:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 03] add_size 200000 add_align 100000 Apr 12 21:16:24.748106 kernel: pci 0001:00:04.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 21:16:24.748166 kernel: pci 0001:00:04.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 21:16:24.748225 kernel: pci 0001:00:04.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 21:16:24.748286 kernel: pci 0001:00:01.0: BAR 15: assigned [mem 0x380000000000-0x380003ffffff 64bit pref] Apr 12 21:16:24.748348 kernel: pci 0001:00:01.0: BAR 14: assigned [mem 0x60000000-0x601fffff] Apr 12 21:16:24.748410 kernel: pci 0001:00:02.0: BAR 14: assigned [mem 0x60200000-0x603fffff] Apr 12 21:16:24.748469 kernel: pci 0001:00:02.0: BAR 15: assigned [mem 0x380004000000-0x3800041fffff 64bit pref] Apr 12 21:16:24.748529 kernel: pci 0001:00:03.0: BAR 14: assigned [mem 0x60400000-0x605fffff] Apr 12 21:16:24.748588 kernel: pci 0001:00:03.0: BAR 15: assigned [mem 0x380004200000-0x3800043fffff 64bit pref] Apr 12 21:16:24.748646 kernel: pci 0001:00:04.0: BAR 14: assigned [mem 0x60600000-0x607fffff] Apr 12 21:16:24.748709 kernel: pci 0001:00:04.0: BAR 15: assigned [mem 0x380004400000-0x3800045fffff 64bit pref] Apr 12 21:16:24.748768 kernel: pci 0001:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.748828 kernel: pci 0001:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.748890 kernel: pci 0001:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.748950 kernel: pci 0001:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.749009 kernel: pci 0001:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.749072 kernel: pci 0001:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.749131 kernel: pci 0001:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.749190 kernel: pci 0001:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.749249 kernel: pci 0001:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.749309 kernel: pci 0001:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.749370 kernel: pci 0001:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.749429 kernel: pci 0001:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.749489 kernel: pci 0001:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.749548 kernel: pci 0001:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.749607 kernel: pci 0001:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.749666 kernel: pci 0001:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.749728 kernel: pci 0001:01:00.0: BAR 0: assigned [mem 0x380000000000-0x380001ffffff 64bit pref] Apr 12 21:16:24.749792 kernel: pci 0001:01:00.1: BAR 0: assigned [mem 0x380002000000-0x380003ffffff 64bit pref] Apr 12 21:16:24.749854 kernel: pci 0001:01:00.0: BAR 6: assigned [mem 0x60000000-0x600fffff pref] Apr 12 21:16:24.749918 kernel: pci 0001:01:00.1: BAR 6: assigned [mem 0x60100000-0x601fffff pref] Apr 12 21:16:24.749978 kernel: pci 0001:00:01.0: PCI bridge to [bus 01] Apr 12 21:16:24.750041 kernel: pci 0001:00:01.0: bridge window [mem 0x60000000-0x601fffff] Apr 12 21:16:24.750100 kernel: pci 0001:00:01.0: bridge window [mem 0x380000000000-0x380003ffffff 64bit pref] Apr 12 21:16:24.750162 kernel: pci 0001:00:02.0: PCI bridge to [bus 02] Apr 12 21:16:24.750221 kernel: pci 0001:00:02.0: bridge window [mem 0x60200000-0x603fffff] Apr 12 21:16:24.750282 kernel: pci 0001:00:02.0: bridge window [mem 0x380004000000-0x3800041fffff 64bit pref] Apr 12 21:16:24.750342 kernel: pci 0001:00:03.0: PCI bridge to [bus 03] Apr 12 21:16:24.750401 kernel: pci 0001:00:03.0: bridge window [mem 0x60400000-0x605fffff] Apr 12 21:16:24.750462 kernel: pci 0001:00:03.0: bridge window [mem 0x380004200000-0x3800043fffff 64bit pref] Apr 12 21:16:24.750522 kernel: pci 0001:00:04.0: PCI bridge to [bus 04] Apr 12 21:16:24.750581 kernel: pci 0001:00:04.0: bridge window [mem 0x60600000-0x607fffff] Apr 12 21:16:24.750643 kernel: pci 0001:00:04.0: bridge window [mem 0x380004400000-0x3800045fffff 64bit pref] Apr 12 21:16:24.750697 kernel: pci_bus 0001:00: resource 4 [mem 0x60000000-0x6fffffff window] Apr 12 21:16:24.750753 kernel: pci_bus 0001:00: resource 5 [mem 0x380000000000-0x3bffdfffffff window] Apr 12 21:16:24.750825 kernel: pci_bus 0001:01: resource 1 [mem 0x60000000-0x601fffff] Apr 12 21:16:24.750885 kernel: pci_bus 0001:01: resource 2 [mem 0x380000000000-0x380003ffffff 64bit pref] Apr 12 21:16:24.750951 kernel: pci_bus 0001:02: resource 1 [mem 0x60200000-0x603fffff] Apr 12 21:16:24.751008 kernel: pci_bus 0001:02: resource 2 [mem 0x380004000000-0x3800041fffff 64bit pref] Apr 12 21:16:24.751077 kernel: pci_bus 0001:03: resource 1 [mem 0x60400000-0x605fffff] Apr 12 21:16:24.751133 kernel: pci_bus 0001:03: resource 2 [mem 0x380004200000-0x3800043fffff 64bit pref] Apr 12 21:16:24.751198 kernel: pci_bus 0001:04: resource 1 [mem 0x60600000-0x607fffff] Apr 12 21:16:24.751255 kernel: pci_bus 0001:04: resource 2 [mem 0x380004400000-0x3800045fffff 64bit pref] Apr 12 21:16:24.751265 kernel: ACPI: PCI Root Bridge [PCI6] (domain 0004 [bus 00-ff]) Apr 12 21:16:24.751330 kernel: acpi PNP0A08:07: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 21:16:24.751391 kernel: acpi PNP0A08:07: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 21:16:24.751451 kernel: acpi PNP0A08:07: _OSC: OS now controls [AER PCIeCapability] Apr 12 21:16:24.751508 kernel: acpi PNP0A08:07: MCFG quirk: ECAM at [mem 0x2bfff0000000-0x2bffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 21:16:24.751567 kernel: acpi PNP0A08:07: ECAM area [mem 0x2bfff0000000-0x2bffffffffff] reserved by PNP0C02:00 Apr 12 21:16:24.751625 kernel: acpi PNP0A08:07: ECAM at [mem 0x2bfff0000000-0x2bffffffffff] for [bus 00-ff] Apr 12 21:16:24.751634 kernel: PCI host bridge to bus 0004:00 Apr 12 21:16:24.751695 kernel: pci_bus 0004:00: root bus resource [mem 0x20000000-0x2fffffff window] Apr 12 21:16:24.751751 kernel: pci_bus 0004:00: root bus resource [mem 0x280000000000-0x2bffdfffffff window] Apr 12 21:16:24.751804 kernel: pci_bus 0004:00: root bus resource [bus 00-ff] Apr 12 21:16:24.751874 kernel: pci 0004:00:00.0: [1def:e110] type 00 class 0x060000 Apr 12 21:16:24.751944 kernel: pci 0004:00:01.0: [1def:e111] type 01 class 0x060400 Apr 12 21:16:24.752007 kernel: pci 0004:00:01.0: supports D1 D2 Apr 12 21:16:24.752071 kernel: pci 0004:00:01.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.752138 kernel: pci 0004:00:03.0: [1def:e113] type 01 class 0x060400 Apr 12 21:16:24.752200 kernel: pci 0004:00:03.0: supports D1 D2 Apr 12 21:16:24.752260 kernel: pci 0004:00:03.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.752327 kernel: pci 0004:00:05.0: [1def:e115] type 01 class 0x060400 Apr 12 21:16:24.752387 kernel: pci 0004:00:05.0: supports D1 D2 Apr 12 21:16:24.752448 kernel: pci 0004:00:05.0: PME# supported from D0 D1 D3hot Apr 12 21:16:24.752518 kernel: pci 0004:01:00.0: [1a03:1150] type 01 class 0x060400 Apr 12 21:16:24.752586 kernel: pci 0004:01:00.0: enabling Extended Tags Apr 12 21:16:24.752648 kernel: pci 0004:01:00.0: supports D1 D2 Apr 12 21:16:24.752711 kernel: pci 0004:01:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 21:16:24.752778 kernel: pci_bus 0004:02: extended config space not accessible Apr 12 21:16:24.752859 kernel: pci 0004:02:00.0: [1a03:2000] type 00 class 0x030000 Apr 12 21:16:24.752925 kernel: pci 0004:02:00.0: reg 0x10: [mem 0x20000000-0x21ffffff] Apr 12 21:16:24.752994 kernel: pci 0004:02:00.0: reg 0x14: [mem 0x22000000-0x2201ffff] Apr 12 21:16:24.753066 kernel: pci 0004:02:00.0: reg 0x18: [io 0x2fff8000-0x2fff807f] Apr 12 21:16:24.753133 kernel: pci 0004:02:00.0: BAR 0: assigned to efifb Apr 12 21:16:24.753197 kernel: pci 0004:02:00.0: supports D1 D2 Apr 12 21:16:24.753264 kernel: pci 0004:02:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 21:16:24.753333 kernel: pci 0004:03:00.0: [1912:0014] type 00 class 0x0c0330 Apr 12 21:16:24.753397 kernel: pci 0004:03:00.0: reg 0x10: [mem 0x22200000-0x22201fff 64bit] Apr 12 21:16:24.753460 kernel: pci 0004:03:00.0: PME# supported from D0 D3hot D3cold Apr 12 21:16:24.753515 kernel: pci_bus 0004:00: on NUMA node 0 Apr 12 21:16:24.753578 kernel: pci 0004:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01-02] add_size 200000 add_align 100000 Apr 12 21:16:24.753640 kernel: pci 0004:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 21:16:24.753702 kernel: pci 0004:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 21:16:24.753763 kernel: pci 0004:00:03.0: bridge window [mem 0x00100000-0x001fffff] to [bus 03] add_size 100000 add_align 100000 Apr 12 21:16:24.753827 kernel: pci 0004:00:05.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 21:16:24.753889 kernel: pci 0004:00:05.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 21:16:24.753950 kernel: pci 0004:00:05.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 21:16:24.754014 kernel: pci 0004:00:01.0: BAR 14: assigned [mem 0x20000000-0x22ffffff] Apr 12 21:16:24.754078 kernel: pci 0004:00:01.0: BAR 15: assigned [mem 0x280000000000-0x2800001fffff 64bit pref] Apr 12 21:16:24.754140 kernel: pci 0004:00:03.0: BAR 14: assigned [mem 0x23000000-0x231fffff] Apr 12 21:16:24.754201 kernel: pci 0004:00:03.0: BAR 15: assigned [mem 0x280000200000-0x2800003fffff 64bit pref] Apr 12 21:16:24.754264 kernel: pci 0004:00:05.0: BAR 14: assigned [mem 0x23200000-0x233fffff] Apr 12 21:16:24.754325 kernel: pci 0004:00:05.0: BAR 15: assigned [mem 0x280000400000-0x2800005fffff 64bit pref] Apr 12 21:16:24.754387 kernel: pci 0004:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.754449 kernel: pci 0004:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.754509 kernel: pci 0004:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.754571 kernel: pci 0004:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.754630 kernel: pci 0004:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.754691 kernel: pci 0004:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.754753 kernel: pci 0004:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.754815 kernel: pci 0004:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.754876 kernel: pci 0004:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.754936 kernel: pci 0004:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.755000 kernel: pci 0004:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.755064 kernel: pci 0004:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.755129 kernel: pci 0004:01:00.0: BAR 14: assigned [mem 0x20000000-0x22ffffff] Apr 12 21:16:24.755190 kernel: pci 0004:01:00.0: BAR 13: no space for [io size 0x1000] Apr 12 21:16:24.755254 kernel: pci 0004:01:00.0: BAR 13: failed to assign [io size 0x1000] Apr 12 21:16:24.755322 kernel: pci 0004:02:00.0: BAR 0: assigned [mem 0x20000000-0x21ffffff] Apr 12 21:16:24.755388 kernel: pci 0004:02:00.0: BAR 1: assigned [mem 0x22000000-0x2201ffff] Apr 12 21:16:24.755453 kernel: pci 0004:02:00.0: BAR 2: no space for [io size 0x0080] Apr 12 21:16:24.755520 kernel: pci 0004:02:00.0: BAR 2: failed to assign [io size 0x0080] Apr 12 21:16:24.755581 kernel: pci 0004:01:00.0: PCI bridge to [bus 02] Apr 12 21:16:24.755644 kernel: pci 0004:01:00.0: bridge window [mem 0x20000000-0x22ffffff] Apr 12 21:16:24.755703 kernel: pci 0004:00:01.0: PCI bridge to [bus 01-02] Apr 12 21:16:24.755766 kernel: pci 0004:00:01.0: bridge window [mem 0x20000000-0x22ffffff] Apr 12 21:16:24.755828 kernel: pci 0004:00:01.0: bridge window [mem 0x280000000000-0x2800001fffff 64bit pref] Apr 12 21:16:24.755892 kernel: pci 0004:03:00.0: BAR 0: assigned [mem 0x23000000-0x23001fff 64bit] Apr 12 21:16:24.755953 kernel: pci 0004:00:03.0: PCI bridge to [bus 03] Apr 12 21:16:24.756013 kernel: pci 0004:00:03.0: bridge window [mem 0x23000000-0x231fffff] Apr 12 21:16:24.756077 kernel: pci 0004:00:03.0: bridge window [mem 0x280000200000-0x2800003fffff 64bit pref] Apr 12 21:16:24.756136 kernel: pci 0004:00:05.0: PCI bridge to [bus 04] Apr 12 21:16:24.756196 kernel: pci 0004:00:05.0: bridge window [mem 0x23200000-0x233fffff] Apr 12 21:16:24.756255 kernel: pci 0004:00:05.0: bridge window [mem 0x280000400000-0x2800005fffff 64bit pref] Apr 12 21:16:24.756310 kernel: pci_bus 0004:00: Some PCI device resources are unassigned, try booting with pci=realloc Apr 12 21:16:24.756365 kernel: pci_bus 0004:00: resource 4 [mem 0x20000000-0x2fffffff window] Apr 12 21:16:24.756418 kernel: pci_bus 0004:00: resource 5 [mem 0x280000000000-0x2bffdfffffff window] Apr 12 21:16:24.756482 kernel: pci_bus 0004:01: resource 1 [mem 0x20000000-0x22ffffff] Apr 12 21:16:24.756538 kernel: pci_bus 0004:01: resource 2 [mem 0x280000000000-0x2800001fffff 64bit pref] Apr 12 21:16:24.756600 kernel: pci_bus 0004:02: resource 1 [mem 0x20000000-0x22ffffff] Apr 12 21:16:24.756663 kernel: pci_bus 0004:03: resource 1 [mem 0x23000000-0x231fffff] Apr 12 21:16:24.756723 kernel: pci_bus 0004:03: resource 2 [mem 0x280000200000-0x2800003fffff 64bit pref] Apr 12 21:16:24.756786 kernel: pci_bus 0004:04: resource 1 [mem 0x23200000-0x233fffff] Apr 12 21:16:24.756843 kernel: pci_bus 0004:04: resource 2 [mem 0x280000400000-0x2800005fffff 64bit pref] Apr 12 21:16:24.756853 kernel: iommu: Default domain type: Translated Apr 12 21:16:24.756860 kernel: iommu: DMA domain TLB invalidation policy: strict mode Apr 12 21:16:24.756926 kernel: pci 0004:02:00.0: vgaarb: VGA device added: decodes=io+mem,owns=none,locks=none Apr 12 21:16:24.756991 kernel: pci 0004:02:00.0: vgaarb: bridge control possible Apr 12 21:16:24.757060 kernel: pci 0004:02:00.0: vgaarb: setting as boot device (VGA legacy resources not available) Apr 12 21:16:24.757071 kernel: vgaarb: loaded Apr 12 21:16:24.757079 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 21:16:24.757086 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 21:16:24.757094 kernel: PTP clock support registered Apr 12 21:16:24.757101 kernel: Registered efivars operations Apr 12 21:16:24.757108 kernel: clocksource: Switched to clocksource arch_sys_counter Apr 12 21:16:24.757116 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 21:16:24.757123 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 21:16:24.757131 kernel: pnp: PnP ACPI init Apr 12 21:16:24.757198 kernel: system 00:00: [mem 0x3bfff0000000-0x3bffffffffff window] could not be reserved Apr 12 21:16:24.757255 kernel: system 00:00: [mem 0x3ffff0000000-0x3fffffffffff window] could not be reserved Apr 12 21:16:24.757309 kernel: system 00:00: [mem 0x23fff0000000-0x23ffffffffff window] could not be reserved Apr 12 21:16:24.757367 kernel: system 00:00: [mem 0x27fff0000000-0x27ffffffffff window] could not be reserved Apr 12 21:16:24.757423 kernel: system 00:00: [mem 0x2bfff0000000-0x2bffffffffff window] could not be reserved Apr 12 21:16:24.757479 kernel: system 00:00: [mem 0x2ffff0000000-0x2fffffffffff window] could not be reserved Apr 12 21:16:24.757535 kernel: system 00:00: [mem 0x33fff0000000-0x33ffffffffff window] could not be reserved Apr 12 21:16:24.757588 kernel: system 00:00: [mem 0x37fff0000000-0x37ffffffffff window] could not be reserved Apr 12 21:16:24.757598 kernel: pnp: PnP ACPI: found 1 devices Apr 12 21:16:24.757605 kernel: NET: Registered PF_INET protocol family Apr 12 21:16:24.757613 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 21:16:24.757620 kernel: tcp_listen_portaddr_hash hash table entries: 65536 (order: 8, 1048576 bytes, linear) Apr 12 21:16:24.757628 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 21:16:24.757635 kernel: TCP established hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 21:16:24.757644 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Apr 12 21:16:24.757652 kernel: TCP: Hash tables configured (established 524288 bind 65536) Apr 12 21:16:24.757659 kernel: UDP hash table entries: 65536 (order: 9, 2097152 bytes, linear) Apr 12 21:16:24.757667 kernel: UDP-Lite hash table entries: 65536 (order: 9, 2097152 bytes, linear) Apr 12 21:16:24.757674 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 21:16:24.757738 kernel: pci 0001:01:00.0: CLS mismatch (64 != 32), using 64 bytes Apr 12 21:16:24.757748 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Apr 12 21:16:24.757755 kernel: kvm [1]: IPA Size Limit: 48 bits Apr 12 21:16:24.757764 kernel: kvm [1]: GICv3: no GICV resource entry Apr 12 21:16:24.757772 kernel: kvm [1]: disabling GICv2 emulation Apr 12 21:16:24.757779 kernel: kvm [1]: GIC system register CPU interface enabled Apr 12 21:16:24.757786 kernel: kvm [1]: vgic interrupt IRQ9 Apr 12 21:16:24.757793 kernel: kvm [1]: VHE mode initialized successfully Apr 12 21:16:24.757801 kernel: Initialise system trusted keyrings Apr 12 21:16:24.757808 kernel: workingset: timestamp_bits=39 max_order=26 bucket_order=0 Apr 12 21:16:24.757817 kernel: Key type asymmetric registered Apr 12 21:16:24.757824 kernel: Asymmetric key parser 'x509' registered Apr 12 21:16:24.757831 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 21:16:24.757839 kernel: io scheduler mq-deadline registered Apr 12 21:16:24.757847 kernel: io scheduler kyber registered Apr 12 21:16:24.757854 kernel: io scheduler bfq registered Apr 12 21:16:24.757861 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Apr 12 21:16:24.757868 kernel: ACPI: button: Power Button [PWRB] Apr 12 21:16:24.757876 kernel: ACPI GTDT: found 1 SBSA generic Watchdog(s). Apr 12 21:16:24.757883 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 21:16:24.757949 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: option mask 0x0 Apr 12 21:16:24.758009 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 21:16:24.758069 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 21:16:24.758126 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: allocated 262144 entries for cmdq Apr 12 21:16:24.758181 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: allocated 128 entries for evtq Apr 12 21:16:24.758236 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: allocated 256 entries for priq Apr 12 21:16:24.758299 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: option mask 0x0 Apr 12 21:16:24.758354 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 21:16:24.758412 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 21:16:24.758467 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: allocated 262144 entries for cmdq Apr 12 21:16:24.758523 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: allocated 128 entries for evtq Apr 12 21:16:24.758577 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: allocated 256 entries for priq Apr 12 21:16:24.758642 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: option mask 0x0 Apr 12 21:16:24.758698 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 21:16:24.758755 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 21:16:24.758810 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: allocated 262144 entries for cmdq Apr 12 21:16:24.758865 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: allocated 128 entries for evtq Apr 12 21:16:24.758920 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: allocated 256 entries for priq Apr 12 21:16:24.758981 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: option mask 0x0 Apr 12 21:16:24.759041 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 21:16:24.759096 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 21:16:24.759153 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: allocated 262144 entries for cmdq Apr 12 21:16:24.759208 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: allocated 128 entries for evtq Apr 12 21:16:24.759262 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: allocated 256 entries for priq Apr 12 21:16:24.759332 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: option mask 0x0 Apr 12 21:16:24.759389 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 21:16:24.759445 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 21:16:24.759502 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: allocated 262144 entries for cmdq Apr 12 21:16:24.759558 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: allocated 128 entries for evtq Apr 12 21:16:24.759612 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: allocated 256 entries for priq Apr 12 21:16:24.759674 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: option mask 0x0 Apr 12 21:16:24.759731 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 21:16:24.759786 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 21:16:24.759842 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: allocated 262144 entries for cmdq Apr 12 21:16:24.759898 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: allocated 128 entries for evtq Apr 12 21:16:24.759954 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: allocated 256 entries for priq Apr 12 21:16:24.760017 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: option mask 0x0 Apr 12 21:16:24.760079 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 21:16:24.760134 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 21:16:24.760189 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: allocated 262144 entries for cmdq Apr 12 21:16:24.760245 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: allocated 128 entries for evtq Apr 12 21:16:24.760301 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: allocated 256 entries for priq Apr 12 21:16:24.760363 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: option mask 0x0 Apr 12 21:16:24.760418 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 21:16:24.760474 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 21:16:24.760529 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: allocated 262144 entries for cmdq Apr 12 21:16:24.760583 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: allocated 128 entries for evtq Apr 12 21:16:24.760640 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: allocated 256 entries for priq Apr 12 21:16:24.760650 kernel: thunder_xcv, ver 1.0 Apr 12 21:16:24.760657 kernel: thunder_bgx, ver 1.0 Apr 12 21:16:24.760665 kernel: nicpf, ver 1.0 Apr 12 21:16:24.760673 kernel: nicvf, ver 1.0 Apr 12 21:16:24.760736 kernel: rtc-efi rtc-efi.0: registered as rtc0 Apr 12 21:16:24.760794 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-04-12T21:16:23 UTC (1712956583) Apr 12 21:16:24.760804 kernel: efifb: probing for efifb Apr 12 21:16:24.760813 kernel: efifb: framebuffer at 0x20000000, using 1876k, total 1875k Apr 12 21:16:24.760820 kernel: efifb: mode is 800x600x32, linelength=3200, pages=1 Apr 12 21:16:24.760828 kernel: efifb: scrolling: redraw Apr 12 21:16:24.760835 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Apr 12 21:16:24.760843 kernel: Console: switching to colour frame buffer device 100x37 Apr 12 21:16:24.760850 kernel: fb0: EFI VGA frame buffer device Apr 12 21:16:24.760857 kernel: SMCCC: SOC_ID: ID = jep106:0a16:0001 Revision = 0x000000a1 Apr 12 21:16:24.760865 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 21:16:24.760872 kernel: NET: Registered PF_INET6 protocol family Apr 12 21:16:24.760880 kernel: Segment Routing with IPv6 Apr 12 21:16:24.760888 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 21:16:24.760895 kernel: NET: Registered PF_PACKET protocol family Apr 12 21:16:24.760902 kernel: Key type dns_resolver registered Apr 12 21:16:24.760910 kernel: registered taskstats version 1 Apr 12 21:16:24.760917 kernel: Loading compiled-in X.509 certificates Apr 12 21:16:24.760924 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 8c258d82bbd8df4a9da2c0ea4108142f04be6b34' Apr 12 21:16:24.760932 kernel: Key type .fscrypt registered Apr 12 21:16:24.760939 kernel: Key type fscrypt-provisioning registered Apr 12 21:16:24.760948 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 21:16:24.760955 kernel: ima: Allocated hash algorithm: sha1 Apr 12 21:16:24.760962 kernel: ima: No architecture policies found Apr 12 21:16:24.761023 kernel: pcieport 000d:00:01.0: Adding to iommu group 0 Apr 12 21:16:24.761088 kernel: pcieport 000d:00:01.0: AER: enabled with IRQ 91 Apr 12 21:16:24.761150 kernel: pcieport 000d:00:02.0: Adding to iommu group 1 Apr 12 21:16:24.761212 kernel: pcieport 000d:00:02.0: AER: enabled with IRQ 91 Apr 12 21:16:24.761273 kernel: pcieport 000d:00:03.0: Adding to iommu group 2 Apr 12 21:16:24.761334 kernel: pcieport 000d:00:03.0: AER: enabled with IRQ 91 Apr 12 21:16:24.761396 kernel: pcieport 000d:00:04.0: Adding to iommu group 3 Apr 12 21:16:24.761455 kernel: pcieport 000d:00:04.0: AER: enabled with IRQ 91 Apr 12 21:16:24.761517 kernel: pcieport 0000:00:01.0: Adding to iommu group 4 Apr 12 21:16:24.761577 kernel: pcieport 0000:00:01.0: AER: enabled with IRQ 92 Apr 12 21:16:24.761639 kernel: pcieport 0000:00:02.0: Adding to iommu group 5 Apr 12 21:16:24.761699 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 92 Apr 12 21:16:24.761759 kernel: pcieport 0000:00:03.0: Adding to iommu group 6 Apr 12 21:16:24.761819 kernel: pcieport 0000:00:03.0: AER: enabled with IRQ 92 Apr 12 21:16:24.761882 kernel: pcieport 0000:00:04.0: Adding to iommu group 7 Apr 12 21:16:24.761945 kernel: pcieport 0000:00:04.0: AER: enabled with IRQ 92 Apr 12 21:16:24.762007 kernel: pcieport 0005:00:01.0: Adding to iommu group 8 Apr 12 21:16:24.762071 kernel: pcieport 0005:00:01.0: AER: enabled with IRQ 93 Apr 12 21:16:24.762131 kernel: pcieport 0005:00:03.0: Adding to iommu group 9 Apr 12 21:16:24.762192 kernel: pcieport 0005:00:03.0: AER: enabled with IRQ 93 Apr 12 21:16:24.762253 kernel: pcieport 0005:00:05.0: Adding to iommu group 10 Apr 12 21:16:24.762313 kernel: pcieport 0005:00:05.0: AER: enabled with IRQ 93 Apr 12 21:16:24.762377 kernel: pcieport 0005:00:07.0: Adding to iommu group 11 Apr 12 21:16:24.762437 kernel: pcieport 0005:00:07.0: AER: enabled with IRQ 93 Apr 12 21:16:24.762499 kernel: pcieport 0003:00:01.0: Adding to iommu group 12 Apr 12 21:16:24.762558 kernel: pcieport 0003:00:01.0: AER: enabled with IRQ 94 Apr 12 21:16:24.762619 kernel: pcieport 0003:00:03.0: Adding to iommu group 13 Apr 12 21:16:24.762678 kernel: pcieport 0003:00:03.0: AER: enabled with IRQ 94 Apr 12 21:16:24.762738 kernel: pcieport 0003:00:05.0: Adding to iommu group 14 Apr 12 21:16:24.762797 kernel: pcieport 0003:00:05.0: AER: enabled with IRQ 94 Apr 12 21:16:24.762860 kernel: pcieport 000c:00:01.0: Adding to iommu group 15 Apr 12 21:16:24.762921 kernel: pcieport 000c:00:01.0: AER: enabled with IRQ 95 Apr 12 21:16:24.762980 kernel: pcieport 000c:00:02.0: Adding to iommu group 16 Apr 12 21:16:24.763044 kernel: pcieport 000c:00:02.0: AER: enabled with IRQ 95 Apr 12 21:16:24.763104 kernel: pcieport 000c:00:03.0: Adding to iommu group 17 Apr 12 21:16:24.763165 kernel: pcieport 000c:00:03.0: AER: enabled with IRQ 95 Apr 12 21:16:24.763226 kernel: pcieport 000c:00:04.0: Adding to iommu group 18 Apr 12 21:16:24.763285 kernel: pcieport 000c:00:04.0: AER: enabled with IRQ 95 Apr 12 21:16:24.763346 kernel: pcieport 0002:00:01.0: Adding to iommu group 19 Apr 12 21:16:24.763407 kernel: pcieport 0002:00:01.0: AER: enabled with IRQ 96 Apr 12 21:16:24.763468 kernel: pcieport 0002:00:03.0: Adding to iommu group 20 Apr 12 21:16:24.763527 kernel: pcieport 0002:00:03.0: AER: enabled with IRQ 96 Apr 12 21:16:24.763589 kernel: pcieport 0002:00:05.0: Adding to iommu group 21 Apr 12 21:16:24.763648 kernel: pcieport 0002:00:05.0: AER: enabled with IRQ 96 Apr 12 21:16:24.763708 kernel: pcieport 0002:00:07.0: Adding to iommu group 22 Apr 12 21:16:24.763768 kernel: pcieport 0002:00:07.0: AER: enabled with IRQ 96 Apr 12 21:16:24.763829 kernel: pcieport 0001:00:01.0: Adding to iommu group 23 Apr 12 21:16:24.763891 kernel: pcieport 0001:00:01.0: AER: enabled with IRQ 97 Apr 12 21:16:24.763951 kernel: pcieport 0001:00:02.0: Adding to iommu group 24 Apr 12 21:16:24.764012 kernel: pcieport 0001:00:02.0: AER: enabled with IRQ 97 Apr 12 21:16:24.764075 kernel: pcieport 0001:00:03.0: Adding to iommu group 25 Apr 12 21:16:24.764135 kernel: pcieport 0001:00:03.0: AER: enabled with IRQ 97 Apr 12 21:16:24.764195 kernel: pcieport 0001:00:04.0: Adding to iommu group 26 Apr 12 21:16:24.764254 kernel: pcieport 0001:00:04.0: AER: enabled with IRQ 97 Apr 12 21:16:24.764315 kernel: pcieport 0004:00:01.0: Adding to iommu group 27 Apr 12 21:16:24.764377 kernel: pcieport 0004:00:01.0: AER: enabled with IRQ 98 Apr 12 21:16:24.764438 kernel: pcieport 0004:00:03.0: Adding to iommu group 28 Apr 12 21:16:24.764497 kernel: pcieport 0004:00:03.0: AER: enabled with IRQ 98 Apr 12 21:16:24.764558 kernel: pcieport 0004:00:05.0: Adding to iommu group 29 Apr 12 21:16:24.764618 kernel: pcieport 0004:00:05.0: AER: enabled with IRQ 98 Apr 12 21:16:24.764681 kernel: pcieport 0004:01:00.0: Adding to iommu group 30 Apr 12 21:16:24.764691 kernel: Freeing unused kernel memory: 36352K Apr 12 21:16:24.764700 kernel: Run /init as init process Apr 12 21:16:24.764707 kernel: with arguments: Apr 12 21:16:24.764714 kernel: /init Apr 12 21:16:24.764721 kernel: with environment: Apr 12 21:16:24.764729 kernel: HOME=/ Apr 12 21:16:24.764735 kernel: TERM=linux Apr 12 21:16:24.764743 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 21:16:24.764752 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 21:16:24.764762 systemd[1]: Detected architecture arm64. Apr 12 21:16:24.764771 systemd[1]: Running in initrd. Apr 12 21:16:24.764779 systemd[1]: No hostname configured, using default hostname. Apr 12 21:16:24.764786 systemd[1]: Hostname set to . Apr 12 21:16:24.764793 systemd[1]: Initializing machine ID from random generator. Apr 12 21:16:24.764802 systemd[1]: Queued start job for default target initrd.target. Apr 12 21:16:24.764809 systemd[1]: Started systemd-ask-password-console.path. Apr 12 21:16:24.764817 systemd[1]: Reached target cryptsetup.target. Apr 12 21:16:24.764824 systemd[1]: Reached target paths.target. Apr 12 21:16:24.764833 systemd[1]: Reached target slices.target. Apr 12 21:16:24.764841 systemd[1]: Reached target swap.target. Apr 12 21:16:24.764848 systemd[1]: Reached target timers.target. Apr 12 21:16:24.764856 systemd[1]: Listening on iscsid.socket. Apr 12 21:16:24.764864 systemd[1]: Listening on iscsiuio.socket. Apr 12 21:16:24.764872 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 21:16:24.764879 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 21:16:24.764888 systemd[1]: Listening on systemd-journald.socket. Apr 12 21:16:24.764896 systemd[1]: Listening on systemd-networkd.socket. Apr 12 21:16:24.764904 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 21:16:24.764911 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 21:16:24.764919 systemd[1]: Reached target sockets.target. Apr 12 21:16:24.764926 systemd[1]: Starting kmod-static-nodes.service... Apr 12 21:16:24.764934 systemd[1]: Finished network-cleanup.service. Apr 12 21:16:24.764941 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 21:16:24.764949 systemd[1]: Starting systemd-journald.service... Apr 12 21:16:24.764958 systemd[1]: Starting systemd-modules-load.service... Apr 12 21:16:24.764965 systemd[1]: Starting systemd-resolved.service... Apr 12 21:16:24.764973 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 21:16:24.764981 systemd[1]: Finished kmod-static-nodes.service. Apr 12 21:16:24.764988 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 21:16:24.765000 systemd-journald[834]: Journal started Apr 12 21:16:24.765045 systemd-journald[834]: Runtime Journal (/run/log/journal/0125b540dc0f473784e4b6bc1871d925) is 8.0M, max 4.0G, 3.9G free. Apr 12 21:16:24.704640 systemd-modules-load[835]: Inserted module 'overlay' Apr 12 21:16:24.826909 kernel: audit: type=1130 audit(1712956584.771:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:24.826931 systemd[1]: Started systemd-resolved.service. Apr 12 21:16:24.826946 kernel: Bridge firewalling registered Apr 12 21:16:24.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:24.752137 systemd-resolved[836]: Positive Trust Anchors: Apr 12 21:16:24.931169 kernel: SCSI subsystem initialized Apr 12 21:16:24.931183 kernel: audit: type=1130 audit(1712956584.839:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:24.931193 systemd[1]: Started systemd-journald.service. Apr 12 21:16:24.931203 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 21:16:24.931213 kernel: device-mapper: uevent: version 1.0.3 Apr 12 21:16:24.931221 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 21:16:24.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:24.752144 systemd-resolved[836]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 21:16:24.979272 kernel: audit: type=1130 audit(1712956584.935:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:24.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:24.752171 systemd-resolved[836]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 21:16:25.046985 kernel: audit: type=1130 audit(1712956584.983:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:24.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:24.757091 systemd-resolved[836]: Defaulting to hostname 'linux'. Apr 12 21:16:25.091225 kernel: audit: type=1130 audit(1712956585.051:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:25.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:24.814903 systemd-modules-load[835]: Inserted module 'br_netfilter' Apr 12 21:16:25.140841 kernel: audit: type=1130 audit(1712956585.096:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:25.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:24.910550 systemd-modules-load[835]: Inserted module 'dm_multipath' Apr 12 21:16:24.935967 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 21:16:24.984232 systemd[1]: Finished systemd-modules-load.service. Apr 12 21:16:25.051954 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 21:16:25.096309 systemd[1]: Reached target nss-lookup.target. Apr 12 21:16:25.147015 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 21:16:25.229385 kernel: audit: type=1130 audit(1712956585.191:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:25.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:25.157377 systemd[1]: Starting systemd-sysctl.service... Apr 12 21:16:25.272322 kernel: audit: type=1130 audit(1712956585.233:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:25.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:25.167990 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 21:16:25.324735 kernel: audit: type=1130 audit(1712956585.277:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:25.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:25.183041 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 21:16:25.335636 dracut-cmdline[855]: dracut-dracut-053 Apr 12 21:16:25.335636 dracut-cmdline[855]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=t Apr 12 21:16:25.335636 dracut-cmdline[855]: tyS1,115200n8 flatcar.first_boot=detected acpi=force flatcar.oem.id=packet flatcar.autologin verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 21:16:25.191467 systemd[1]: Finished systemd-sysctl.service. Apr 12 21:16:25.234096 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 21:16:25.278504 systemd[1]: Starting dracut-cmdline.service... Apr 12 21:16:25.409047 kernel: Loading iSCSI transport class v2.0-870. Apr 12 21:16:25.430046 kernel: iscsi: registered transport (tcp) Apr 12 21:16:25.461504 kernel: iscsi: registered transport (qla4xxx) Apr 12 21:16:25.461524 kernel: QLogic iSCSI HBA Driver Apr 12 21:16:25.492068 systemd[1]: Finished dracut-cmdline.service. Apr 12 21:16:25.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:25.498101 systemd[1]: Starting dracut-pre-udev.service... Apr 12 21:16:25.554047 kernel: raid6: neonx8 gen() 13866 MB/s Apr 12 21:16:25.579043 kernel: raid6: neonx8 xor() 10875 MB/s Apr 12 21:16:25.604043 kernel: raid6: neonx4 gen() 13624 MB/s Apr 12 21:16:25.629043 kernel: raid6: neonx4 xor() 11097 MB/s Apr 12 21:16:25.654044 kernel: raid6: neonx2 gen() 13003 MB/s Apr 12 21:16:25.679044 kernel: raid6: neonx2 xor() 10679 MB/s Apr 12 21:16:25.704043 kernel: raid6: neonx1 gen() 10511 MB/s Apr 12 21:16:25.728043 kernel: raid6: neonx1 xor() 8748 MB/s Apr 12 21:16:25.752043 kernel: raid6: int64x8 gen() 6294 MB/s Apr 12 21:16:25.776044 kernel: raid6: int64x8 xor() 3555 MB/s Apr 12 21:16:25.800044 kernel: raid6: int64x4 gen() 7265 MB/s Apr 12 21:16:25.824044 kernel: raid6: int64x4 xor() 3873 MB/s Apr 12 21:16:25.848044 kernel: raid6: int64x2 gen() 6172 MB/s Apr 12 21:16:25.872045 kernel: raid6: int64x2 xor() 3331 MB/s Apr 12 21:16:25.895044 kernel: raid6: int64x1 gen() 5056 MB/s Apr 12 21:16:25.926276 kernel: raid6: int64x1 xor() 2655 MB/s Apr 12 21:16:25.926296 kernel: raid6: using algorithm neonx8 gen() 13866 MB/s Apr 12 21:16:25.926313 kernel: raid6: .... xor() 10875 MB/s, rmw enabled Apr 12 21:16:25.934046 kernel: raid6: using neon recovery algorithm Apr 12 21:16:25.966538 kernel: xor: measuring software checksum speed Apr 12 21:16:25.966559 kernel: 8regs : 17300 MB/sec Apr 12 21:16:25.973818 kernel: 32regs : 20749 MB/sec Apr 12 21:16:25.988606 kernel: arm64_neon : 27873 MB/sec Apr 12 21:16:25.988628 kernel: xor: using function: arm64_neon (27873 MB/sec) Apr 12 21:16:26.048041 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Apr 12 21:16:26.056709 systemd[1]: Finished dracut-pre-udev.service. Apr 12 21:16:26.118917 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 21:16:26.118934 kernel: audit: type=1130 audit(1712956586.059:12): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:26.118945 kernel: audit: type=1334 audit(1712956586.069:13): prog-id=7 op=LOAD Apr 12 21:16:26.118953 kernel: audit: type=1334 audit(1712956586.096:14): prog-id=8 op=LOAD Apr 12 21:16:26.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:26.069000 audit: BPF prog-id=7 op=LOAD Apr 12 21:16:26.096000 audit: BPF prog-id=8 op=LOAD Apr 12 21:16:26.097780 systemd[1]: Starting systemd-udevd.service... Apr 12 21:16:26.129225 systemd-udevd[1031]: Using default interface naming scheme 'v252'. Apr 12 21:16:26.132493 systemd[1]: Started systemd-udevd.service. Apr 12 21:16:26.169569 kernel: audit: type=1130 audit(1712956586.136:15): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:26.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:26.138523 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 21:16:26.177319 dracut-pre-trigger[1038]: rd.md=0: removing MD RAID activation Apr 12 21:16:26.184942 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 21:16:26.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:26.193736 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 21:16:26.229524 kernel: audit: type=1130 audit(1712956586.192:16): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:26.285609 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 21:16:26.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:26.331038 kernel: audit: type=1130 audit(1712956586.295:17): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:26.360428 kernel: ACPI: bus type USB registered Apr 12 21:16:26.360457 kernel: usbcore: registered new interface driver usbfs Apr 12 21:16:26.360476 kernel: usbcore: registered new interface driver hub Apr 12 21:16:26.366044 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Apr 12 21:16:26.366054 kernel: nvme 0005:03:00.0: Adding to iommu group 31 Apr 12 21:16:26.367039 kernel: nvme nvme0: pci function 0005:03:00.0 Apr 12 21:16:26.367129 kernel: nvme 0005:04:00.0: Adding to iommu group 32 Apr 12 21:16:26.367204 kernel: nvme nvme1: pci function 0005:04:00.0 Apr 12 21:16:26.374042 kernel: usbcore: registered new device driver usb Apr 12 21:16:26.374053 kernel: nvme nvme0: Shutdown timeout set to 8 seconds Apr 12 21:16:26.374123 kernel: nvme nvme1: Shutdown timeout set to 8 seconds Apr 12 21:16:26.379039 kernel: mlx5_core 0001:01:00.0: Adding to iommu group 33 Apr 12 21:16:26.380039 kernel: mlx5_core 0001:01:00.0: firmware version: 14.31.1014 Apr 12 21:16:26.380107 kernel: mlx5_core 0001:01:00.0: 31.504 Gb/s available PCIe bandwidth, limited by 8.0 GT/s PCIe x4 link at 0001:00:01.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Apr 12 21:16:26.381793 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Apr 12 21:16:26.391638 kernel: igb 0003:03:00.0: Adding to iommu group 34 Apr 12 21:16:26.397041 kernel: nvme nvme0: 32/0/0 default/read/poll queues Apr 12 21:16:26.397180 kernel: nvme nvme1: 32/0/0 default/read/poll queues Apr 12 21:16:26.552949 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 21:16:26.552968 kernel: GPT:9289727 != 1875385007 Apr 12 21:16:26.552977 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 21:16:26.562875 kernel: GPT:9289727 != 1875385007 Apr 12 21:16:26.570397 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 21:16:26.587306 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 21:16:26.587327 kernel: igb 0003:03:00.0: added PHC on eth0 Apr 12 21:16:26.606880 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 21:16:26.718941 kernel: igb 0003:03:00.0: Intel(R) Gigabit Ethernet Network Connection Apr 12 21:16:26.719033 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by (udev-worker) (1075) Apr 12 21:16:26.719046 kernel: igb 0003:03:00.0: eth0: (PCIe:5.0Gb/s:Width x2) 18:c0:4d:0c:6a:ec Apr 12 21:16:26.719114 kernel: igb 0003:03:00.0: eth0: PBA No: 106300-000 Apr 12 21:16:26.719182 kernel: igb 0003:03:00.0: Using MSI-X interrupts. 8 rx queue(s), 8 tx queue(s) Apr 12 21:16:26.719247 kernel: igb 0003:03:00.1: Adding to iommu group 35 Apr 12 21:16:26.719317 kernel: xhci_hcd 0004:03:00.0: Adding to iommu group 36 Apr 12 21:16:26.719387 kernel: xhci_hcd 0004:03:00.0: xHCI Host Controller Apr 12 21:16:26.719452 kernel: xhci_hcd 0004:03:00.0: new USB bus registered, assigned bus number 1 Apr 12 21:16:26.719515 kernel: xhci_hcd 0004:03:00.0: Zeroing 64bit base registers, expecting fault Apr 12 21:16:26.726503 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 21:16:26.731280 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 21:16:26.752070 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 21:16:26.763576 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 21:16:26.774507 systemd[1]: Starting disk-uuid.service... Apr 12 21:16:26.781854 disk-uuid[1117]: Primary Header is updated. Apr 12 21:16:26.781854 disk-uuid[1117]: Secondary Entries is updated. Apr 12 21:16:26.781854 disk-uuid[1117]: Secondary Header is updated. Apr 12 21:16:26.999272 kernel: xhci_hcd 0004:03:00.0: hcc params 0x014051cf hci version 0x100 quirks 0x0000001100000410 Apr 12 21:16:26.999394 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 21:16:26.999404 kernel: xhci_hcd 0004:03:00.0: xHCI Host Controller Apr 12 21:16:26.999473 kernel: xhci_hcd 0004:03:00.0: new USB bus registered, assigned bus number 2 Apr 12 21:16:26.999540 kernel: xhci_hcd 0004:03:00.0: Host supports USB 3.0 SuperSpeed Apr 12 21:16:26.999605 kernel: hub 1-0:1.0: USB hub found Apr 12 21:16:26.999691 kernel: hub 1-0:1.0: 4 ports detected Apr 12 21:16:26.999766 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Apr 12 21:16:26.999897 kernel: hub 2-0:1.0: USB hub found Apr 12 21:16:26.999978 kernel: hub 2-0:1.0: 4 ports detected Apr 12 21:16:27.000058 kernel: mlx5_core 0001:01:00.0: Port module event: module 0, Cable plugged Apr 12 21:16:27.000131 kernel: igb 0003:03:00.1: added PHC on eth1 Apr 12 21:16:27.000202 kernel: igb 0003:03:00.1: Intel(R) Gigabit Ethernet Network Connection Apr 12 21:16:27.000266 kernel: igb 0003:03:00.1: eth1: (PCIe:5.0Gb/s:Width x2) 18:c0:4d:0c:6a:ed Apr 12 21:16:27.000333 kernel: igb 0003:03:00.1: eth1: PBA No: 106300-000 Apr 12 21:16:27.000398 kernel: igb 0003:03:00.1: Using MSI-X interrupts. 8 rx queue(s), 8 tx queue(s) Apr 12 21:16:27.000463 kernel: igb 0003:03:00.1 eno2: renamed from eth1 Apr 12 21:16:27.000527 kernel: igb 0003:03:00.0 eno1: renamed from eth0 Apr 12 21:16:27.015041 kernel: mlx5_core 0001:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 21:16:27.113048 kernel: usb 1-3: new high-speed USB device number 2 using xhci_hcd Apr 12 21:16:27.265610 kernel: hub 1-3:1.0: USB hub found Apr 12 21:16:27.265791 kernel: hub 1-3:1.0: 4 ports detected Apr 12 21:16:27.354047 kernel: mlx5_core 0001:01:00.1: Adding to iommu group 37 Apr 12 21:16:27.354201 kernel: mlx5_core 0001:01:00.1: firmware version: 14.31.1014 Apr 12 21:16:27.388815 kernel: mlx5_core 0001:01:00.1: 31.504 Gb/s available PCIe bandwidth, limited by 8.0 GT/s PCIe x4 link at 0001:00:01.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Apr 12 21:16:27.388882 kernel: usb 2-3: new SuperSpeed USB device number 2 using xhci_hcd Apr 12 21:16:27.429046 kernel: hub 2-3:1.0: USB hub found Apr 12 21:16:27.448042 kernel: hub 2-3:1.0: 4 ports detected Apr 12 21:16:27.738369 kernel: mlx5_core 0001:01:00.1: Port module event: module 1, Cable plugged Apr 12 21:16:27.783047 kernel: mlx5_core 0001:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 21:16:27.801045 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 21:16:27.801203 disk-uuid[1118]: The operation has completed successfully. Apr 12 21:16:28.125046 kernel: mlx5_core 0001:01:00.1 enP1p1s0f1np1: renamed from eth1 Apr 12 21:16:28.146046 kernel: mlx5_core 0001:01:00.0 enP1p1s0f0np0: renamed from eth0 Apr 12 21:16:28.204486 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 21:16:28.294454 kernel: audit: type=1130 audit(1712956588.209:18): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:28.294474 kernel: audit: type=1131 audit(1712956588.209:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:28.294484 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Apr 12 21:16:28.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:28.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:28.204568 systemd[1]: Finished disk-uuid.service. Apr 12 21:16:28.211112 systemd[1]: Starting verity-setup.service... Apr 12 21:16:28.310155 systemd[1]: Found device dev-mapper-usr.device. Apr 12 21:16:28.320570 systemd[1]: Mounting sysusr-usr.mount... Apr 12 21:16:28.329872 systemd[1]: Finished verity-setup.service. Apr 12 21:16:28.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:28.388049 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 21:16:28.388325 systemd[1]: Mounted sysusr-usr.mount. Apr 12 21:16:28.392862 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 21:16:28.461934 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Apr 12 21:16:28.461948 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 21:16:28.461957 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 21:16:28.461970 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 21:16:28.394087 systemd[1]: Starting ignition-setup.service... Apr 12 21:16:28.403138 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 21:16:28.478031 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 21:16:28.483321 systemd[1]: Finished ignition-setup.service. Apr 12 21:16:28.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:28.493434 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 21:16:28.510995 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 21:16:28.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:28.516000 audit: BPF prog-id=9 op=LOAD Apr 12 21:16:28.517636 systemd[1]: Starting systemd-networkd.service... Apr 12 21:16:28.541837 systemd-networkd[1483]: lo: Link UP Apr 12 21:16:28.541843 systemd-networkd[1483]: lo: Gained carrier Apr 12 21:16:28.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:28.542330 systemd-networkd[1483]: Enumeration completed Apr 12 21:16:28.542436 systemd[1]: Started systemd-networkd.service. Apr 12 21:16:28.543040 systemd-networkd[1483]: enP1p1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 21:16:28.577979 ignition[1457]: Ignition 2.14.0 Apr 12 21:16:28.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:28.550354 systemd[1]: Reached target network.target. Apr 12 21:16:28.577985 ignition[1457]: Stage: fetch-offline Apr 12 21:16:28.559489 systemd[1]: Starting iscsiuio.service... Apr 12 21:16:28.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:28.608014 iscsid[1497]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 21:16:28.608014 iscsid[1497]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 21:16:28.608014 iscsid[1497]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 21:16:28.608014 iscsid[1497]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 21:16:28.608014 iscsid[1497]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 21:16:28.608014 iscsid[1497]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 21:16:28.608014 iscsid[1497]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 21:16:28.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:28.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:28.578065 ignition[1457]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 21:16:28.574390 systemd[1]: Started iscsiuio.service. Apr 12 21:16:28.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:28.578083 ignition[1457]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 21:16:28.584483 systemd[1]: Starting iscsid.service... Apr 12 21:16:28.582158 ignition[1457]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 21:16:28.599453 systemd[1]: Started iscsid.service. Apr 12 21:16:28.582269 ignition[1457]: parsed url from cmdline: "" Apr 12 21:16:28.605451 systemd[1]: Starting dracut-initqueue.service... Apr 12 21:16:28.582272 ignition[1457]: no config URL provided Apr 12 21:16:28.605691 unknown[1457]: fetched base config from "system" Apr 12 21:16:28.582276 ignition[1457]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 21:16:28.605698 unknown[1457]: fetched user config from "system" Apr 12 21:16:28.582317 ignition[1457]: parsing config with SHA512: aab42fe5dc18fb1c20b11bdee294b24ab2f282db68ab6e7913da919606ff45e4b4c3837225671a7abf9092561f50752fffbc07438a397b889bd06ec31879112f Apr 12 21:16:28.613053 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 21:16:28.606156 ignition[1457]: fetch-offline: fetch-offline passed Apr 12 21:16:28.625735 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Apr 12 21:16:28.606161 ignition[1457]: POST message to Packet Timeline Apr 12 21:16:28.627293 systemd[1]: Starting ignition-kargs.service... Apr 12 21:16:28.606166 ignition[1457]: POST Status error: resource requires networking Apr 12 21:16:28.643868 systemd[1]: Finished dracut-initqueue.service. Apr 12 21:16:28.606213 ignition[1457]: Ignition finished successfully Apr 12 21:16:28.661457 systemd[1]: Reached target remote-fs-pre.target. Apr 12 21:16:28.638938 ignition[1510]: Ignition 2.14.0 Apr 12 21:16:28.670384 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 21:16:28.638944 ignition[1510]: Stage: kargs Apr 12 21:16:28.679847 systemd[1]: Reached target remote-fs.target. Apr 12 21:16:28.639044 ignition[1510]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 21:16:28.695331 systemd[1]: Starting dracut-pre-mount.service... Apr 12 21:16:28.639059 ignition[1510]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 21:16:28.709872 systemd[1]: Finished dracut-pre-mount.service. Apr 12 21:16:28.643569 ignition[1510]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 21:16:28.644483 ignition[1510]: kargs: kargs passed Apr 12 21:16:28.644488 ignition[1510]: POST message to Packet Timeline Apr 12 21:16:28.644501 ignition[1510]: GET https://metadata.packet.net/metadata: attempt #1 Apr 12 21:16:28.647712 ignition[1510]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:38450->[::1]:53: read: connection refused Apr 12 21:16:28.848057 ignition[1510]: GET https://metadata.packet.net/metadata: attempt #2 Apr 12 21:16:28.848487 ignition[1510]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:41200->[::1]:53: read: connection refused Apr 12 21:16:29.249518 ignition[1510]: GET https://metadata.packet.net/metadata: attempt #3 Apr 12 21:16:29.250118 ignition[1510]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:42982->[::1]:53: read: connection refused Apr 12 21:16:29.375044 kernel: mlx5_core 0001:01:00.1 enP1p1s0f1np1: Link up Apr 12 21:16:29.378562 systemd-networkd[1483]: enP1p1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 21:16:29.398391 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enP1p1s0f1np1: link becomes ready Apr 12 21:16:30.050814 ignition[1510]: GET https://metadata.packet.net/metadata: attempt #4 Apr 12 21:16:30.051295 ignition[1510]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:43168->[::1]:53: read: connection refused Apr 12 21:16:30.222049 kernel: mlx5_core 0001:01:00.0 enP1p1s0f0np0: Link up Apr 12 21:16:30.225945 systemd-networkd[1483]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 21:16:30.277876 systemd-networkd[1483]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 21:16:30.330469 systemd-networkd[1483]: enP1p1s0f1np1: Link UP Apr 12 21:16:30.330841 systemd-networkd[1483]: enP1p1s0f1np1: Gained carrier Apr 12 21:16:30.339479 systemd-networkd[1483]: enP1p1s0f0np0: Link UP Apr 12 21:16:30.339815 systemd-networkd[1483]: eno2: Link UP Apr 12 21:16:30.340165 systemd-networkd[1483]: eno1: Link UP Apr 12 21:16:30.389953 systemd-networkd[1483]: enP1p1s0f0np0: Gained carrier Apr 12 21:16:30.394728 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enP1p1s0f0np0: link becomes ready Apr 12 21:16:30.430111 systemd-networkd[1483]: enP1p1s0f0np0: DHCPv4 address 147.75.62.222/30, gateway 147.75.62.221 acquired from 147.28.144.140 Apr 12 21:16:31.274245 systemd-networkd[1483]: enP1p1s0f1np1: Gained IPv6LL Apr 12 21:16:31.402273 systemd-networkd[1483]: enP1p1s0f0np0: Gained IPv6LL Apr 12 21:16:31.652918 ignition[1510]: GET https://metadata.packet.net/metadata: attempt #5 Apr 12 21:16:31.653648 ignition[1510]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:45573->[::1]:53: read: connection refused Apr 12 21:16:34.856580 ignition[1510]: GET https://metadata.packet.net/metadata: attempt #6 Apr 12 21:16:34.887803 ignition[1510]: GET result: OK Apr 12 21:16:35.012116 ignition[1510]: Ignition finished successfully Apr 12 21:16:35.014479 systemd[1]: Finished ignition-kargs.service. Apr 12 21:16:35.066986 kernel: kauditd_printk_skb: 10 callbacks suppressed Apr 12 21:16:35.067005 kernel: audit: type=1130 audit(1712956595.017:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:35.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:35.029829 ignition[1533]: Ignition 2.14.0 Apr 12 21:16:35.019343 systemd[1]: Starting ignition-disks.service... Apr 12 21:16:35.029836 ignition[1533]: Stage: disks Apr 12 21:16:35.029943 ignition[1533]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 21:16:35.029960 ignition[1533]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 21:16:35.031905 ignition[1533]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 21:16:35.032773 ignition[1533]: disks: disks passed Apr 12 21:16:35.032777 ignition[1533]: POST message to Packet Timeline Apr 12 21:16:35.032790 ignition[1533]: GET https://metadata.packet.net/metadata: attempt #1 Apr 12 21:16:35.060719 ignition[1533]: GET result: OK Apr 12 21:16:35.216140 ignition[1533]: Ignition finished successfully Apr 12 21:16:35.217946 systemd[1]: Finished ignition-disks.service. Apr 12 21:16:35.260983 kernel: audit: type=1130 audit(1712956595.224:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:35.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:35.224863 systemd[1]: Reached target initrd-root-device.target. Apr 12 21:16:35.265509 systemd[1]: Reached target local-fs-pre.target. Apr 12 21:16:35.274638 systemd[1]: Reached target local-fs.target. Apr 12 21:16:35.283760 systemd[1]: Reached target sysinit.target. Apr 12 21:16:35.292510 systemd[1]: Reached target basic.target. Apr 12 21:16:35.302483 systemd[1]: Starting systemd-fsck-root.service... Apr 12 21:16:35.319113 systemd-fsck[1550]: ROOT: clean, 612/553520 files, 56018/553472 blocks Apr 12 21:16:35.322941 systemd[1]: Finished systemd-fsck-root.service. Apr 12 21:16:35.384411 kernel: audit: type=1130 audit(1712956595.328:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:35.384440 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 21:16:35.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:35.331645 systemd[1]: Mounting sysroot.mount... Apr 12 21:16:35.390758 systemd[1]: Mounted sysroot.mount. Apr 12 21:16:35.398031 systemd[1]: Reached target initrd-root-fs.target. Apr 12 21:16:35.408073 systemd[1]: Mounting sysroot-usr.mount... Apr 12 21:16:35.417575 systemd[1]: Starting flatcar-metadata-hostname.service... Apr 12 21:16:35.426409 systemd[1]: Starting flatcar-static-network.service... Apr 12 21:16:35.434236 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 21:16:35.434293 systemd[1]: Reached target ignition-diskful.target. Apr 12 21:16:35.445367 systemd[1]: Mounted sysroot-usr.mount. Apr 12 21:16:35.533598 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/nvme0n1p6 scanned by mount (1563) Apr 12 21:16:35.533613 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Apr 12 21:16:35.533623 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 21:16:35.533632 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 21:16:35.533641 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 21:16:35.533664 coreos-metadata[1558]: Apr 12 21:16:35.495 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 21:16:35.533664 coreos-metadata[1558]: Apr 12 21:16:35.516 INFO Fetch successful Apr 12 21:16:35.458510 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 21:16:35.599932 kernel: audit: type=1130 audit(1712956595.561:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:35.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:35.599974 coreos-metadata[1557]: Apr 12 21:16:35.495 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 21:16:35.599974 coreos-metadata[1557]: Apr 12 21:16:35.516 INFO Fetch successful Apr 12 21:16:35.599974 coreos-metadata[1557]: Apr 12 21:16:35.547 INFO wrote hostname ci-3510.3.3-a-03d04c2097 to /sysroot/etc/hostname Apr 12 21:16:35.748995 kernel: audit: type=1130 audit(1712956595.604:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:35.749011 kernel: audit: type=1131 audit(1712956595.604:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:35.749021 kernel: audit: type=1130 audit(1712956595.688:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:35.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:35.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:35.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:35.480300 systemd[1]: Starting initrd-setup-root.service... Apr 12 21:16:35.540993 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 21:16:35.765334 initrd-setup-root[1586]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 21:16:35.552132 systemd[1]: Finished flatcar-metadata-hostname.service. Apr 12 21:16:35.815221 kernel: audit: type=1130 audit(1712956595.775:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:35.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:35.815265 initrd-setup-root[1594]: cut: /sysroot/etc/group: No such file or directory Apr 12 21:16:35.561387 systemd[1]: flatcar-static-network.service: Deactivated successfully. Apr 12 21:16:35.825952 initrd-setup-root[1602]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 21:16:35.831399 ignition[1633]: INFO : Ignition 2.14.0 Apr 12 21:16:35.831399 ignition[1633]: INFO : Stage: mount Apr 12 21:16:35.831399 ignition[1633]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 21:16:35.831399 ignition[1633]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 21:16:35.831399 ignition[1633]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 21:16:35.831399 ignition[1633]: INFO : mount: mount passed Apr 12 21:16:35.831399 ignition[1633]: INFO : POST message to Packet Timeline Apr 12 21:16:35.831399 ignition[1633]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 21:16:35.831399 ignition[1633]: INFO : GET result: OK Apr 12 21:16:35.561453 systemd[1]: Finished flatcar-static-network.service. Apr 12 21:16:35.896792 initrd-setup-root[1612]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 21:16:35.604513 systemd[1]: Finished initrd-setup-root.service. Apr 12 21:16:35.689363 systemd[1]: Starting ignition-mount.service... Apr 12 21:16:35.740217 systemd[1]: Starting sysroot-boot.service... Apr 12 21:16:35.755831 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 21:16:35.920704 ignition[1633]: INFO : Ignition finished successfully Apr 12 21:16:35.964532 kernel: audit: type=1130 audit(1712956595.925:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:35.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:35.756087 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 21:16:35.766103 systemd[1]: Finished sysroot-boot.service. Apr 12 21:16:36.043136 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/nvme0n1p6 scanned by mount (1651) Apr 12 21:16:36.043153 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Apr 12 21:16:36.043163 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 21:16:36.043172 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 21:16:36.043181 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 21:16:35.916187 systemd[1]: Finished ignition-mount.service. Apr 12 21:16:35.926621 systemd[1]: Starting ignition-files.service... Apr 12 21:16:35.973517 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 21:16:36.061714 ignition[1670]: INFO : Ignition 2.14.0 Apr 12 21:16:36.061714 ignition[1670]: INFO : Stage: files Apr 12 21:16:36.061714 ignition[1670]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 21:16:36.061714 ignition[1670]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 21:16:35.984003 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 21:16:36.092428 ignition[1670]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 21:16:36.092428 ignition[1670]: DEBUG : files: compiled without relabeling support, skipping Apr 12 21:16:36.092428 ignition[1670]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 21:16:36.092428 ignition[1670]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 21:16:36.092428 ignition[1670]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 21:16:36.092428 ignition[1670]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 21:16:36.092428 ignition[1670]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 21:16:36.092428 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 21:16:36.092428 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Apr 12 21:16:36.067199 unknown[1670]: wrote ssh authorized keys file for user: core Apr 12 21:16:36.182069 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 21:16:36.398555 ignition[1670]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Apr 12 21:16:36.414155 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 21:16:36.414155 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 21:16:36.414155 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Apr 12 21:16:36.453682 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 21:16:36.573984 ignition[1670]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Apr 12 21:16:36.591858 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 21:16:36.591858 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 21:16:36.591858 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubeadm: attempt #1 Apr 12 21:16:36.733086 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 21:16:39.133299 ignition[1670]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 5a08b81f9cc82d3cce21130856ca63b8dafca9149d9775dd25b376eb0f18209aa0e4a47c0a6d7e6fb1316aacd5d59dec770f26c09120c866949d70bc415518b3 Apr 12 21:16:39.151640 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 21:16:39.151640 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 21:16:39.151640 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubelet: attempt #1 Apr 12 21:16:39.265566 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 21:16:44.463737 ignition[1670]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 5a898ef543a6482895101ea58e33602e3c0a7682d322aaf08ac3dc8a5a3c8da8f09600d577024549288f8cebb1a86f9c79927796b69a3d8fe989ca8f12b147d6 Apr 12 21:16:44.482476 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 21:16:44.482476 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Apr 12 21:16:44.482476 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 21:16:44.482476 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 21:16:44.482476 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 21:16:44.482476 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 21:16:44.482476 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 21:16:44.482476 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Apr 12 21:16:44.482476 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 21:16:44.614919 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1693) Apr 12 21:16:44.488884 systemd[1]: mnt-oem3974652284.mount: Deactivated successfully. Apr 12 21:16:44.621104 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3974652284" Apr 12 21:16:44.621104 ignition[1670]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3974652284": device or resource busy Apr 12 21:16:44.621104 ignition[1670]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3974652284", trying btrfs: device or resource busy Apr 12 21:16:44.621104 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3974652284" Apr 12 21:16:44.621104 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3974652284" Apr 12 21:16:44.621104 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3974652284" Apr 12 21:16:44.621104 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3974652284" Apr 12 21:16:44.621104 ignition[1670]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Apr 12 21:16:44.621104 ignition[1670]: INFO : files: op(e): [started] processing unit "packet-phone-home.service" Apr 12 21:16:44.621104 ignition[1670]: INFO : files: op(e): [finished] processing unit "packet-phone-home.service" Apr 12 21:16:44.621104 ignition[1670]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 21:16:44.621104 ignition[1670]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 21:16:44.621104 ignition[1670]: INFO : files: op(10): [started] processing unit "prepare-cni-plugins.service" Apr 12 21:16:44.621104 ignition[1670]: INFO : files: op(10): op(11): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 21:16:44.621104 ignition[1670]: INFO : files: op(10): op(11): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 21:16:44.621104 ignition[1670]: INFO : files: op(10): [finished] processing unit "prepare-cni-plugins.service" Apr 12 21:16:44.621104 ignition[1670]: INFO : files: op(12): [started] processing unit "prepare-critools.service" Apr 12 21:16:45.161015 kernel: audit: type=1130 audit(1712956604.646:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.161039 kernel: audit: type=1130 audit(1712956604.744:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.161050 kernel: audit: type=1130 audit(1712956604.800:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.161059 kernel: audit: type=1131 audit(1712956604.800:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.161069 kernel: audit: type=1130 audit(1712956604.937:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.161078 kernel: audit: type=1131 audit(1712956604.937:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.161090 kernel: audit: type=1130 audit(1712956605.076:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:44.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:44.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:44.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:44.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:44.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:44.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.161253 ignition[1670]: INFO : files: op(12): op(13): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 21:16:45.161253 ignition[1670]: INFO : files: op(12): op(13): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 21:16:45.161253 ignition[1670]: INFO : files: op(12): [finished] processing unit "prepare-critools.service" Apr 12 21:16:45.161253 ignition[1670]: INFO : files: op(14): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 21:16:45.161253 ignition[1670]: INFO : files: op(14): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 21:16:45.161253 ignition[1670]: INFO : files: op(15): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 21:16:45.161253 ignition[1670]: INFO : files: op(15): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 21:16:45.161253 ignition[1670]: INFO : files: op(16): [started] setting preset to enabled for "prepare-critools.service" Apr 12 21:16:45.161253 ignition[1670]: INFO : files: op(16): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 21:16:45.161253 ignition[1670]: INFO : files: op(17): [started] setting preset to enabled for "packet-phone-home.service" Apr 12 21:16:45.161253 ignition[1670]: INFO : files: op(17): [finished] setting preset to enabled for "packet-phone-home.service" Apr 12 21:16:45.161253 ignition[1670]: INFO : files: createResultFile: createFiles: op(18): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 21:16:45.161253 ignition[1670]: INFO : files: createResultFile: createFiles: op(18): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 21:16:45.161253 ignition[1670]: INFO : files: files passed Apr 12 21:16:45.161253 ignition[1670]: INFO : POST message to Packet Timeline Apr 12 21:16:45.161253 ignition[1670]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 21:16:45.161253 ignition[1670]: INFO : GET result: OK Apr 12 21:16:45.161253 ignition[1670]: INFO : Ignition finished successfully Apr 12 21:16:45.526915 kernel: audit: type=1131 audit(1712956605.198:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.526930 kernel: audit: type=1131 audit(1712956605.418:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.526940 kernel: audit: type=1131 audit(1712956605.475:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:44.633512 systemd[1]: Finished ignition-files.service. Apr 12 21:16:44.648751 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 21:16:44.709180 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 21:16:45.563889 initrd-setup-root-after-ignition[1708]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 21:16:44.710881 systemd[1]: Starting ignition-quench.service... Apr 12 21:16:45.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:44.727656 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 21:16:45.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:44.744965 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 21:16:45.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:44.745028 systemd[1]: Finished ignition-quench.service. Apr 12 21:16:45.622356 iscsid[1497]: iscsid shutting down. Apr 12 21:16:44.800897 systemd[1]: Reached target ignition-complete.target. Apr 12 21:16:45.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:44.892651 systemd[1]: Starting initrd-parse-etc.service... Apr 12 21:16:44.923142 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 21:16:45.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.663610 ignition[1723]: INFO : Ignition 2.14.0 Apr 12 21:16:45.663610 ignition[1723]: INFO : Stage: umount Apr 12 21:16:45.663610 ignition[1723]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 21:16:45.663610 ignition[1723]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 21:16:45.663610 ignition[1723]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 21:16:45.663610 ignition[1723]: INFO : umount: umount passed Apr 12 21:16:45.663610 ignition[1723]: INFO : POST message to Packet Timeline Apr 12 21:16:45.663610 ignition[1723]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 21:16:45.663610 ignition[1723]: INFO : GET result: OK Apr 12 21:16:45.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:44.923303 systemd[1]: Finished initrd-parse-etc.service. Apr 12 21:16:44.937419 systemd[1]: Reached target initrd-fs.target. Apr 12 21:16:45.781131 ignition[1723]: INFO : Ignition finished successfully Apr 12 21:16:45.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.026137 systemd[1]: Reached target initrd.target. Apr 12 21:16:45.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.799000 audit: BPF prog-id=6 op=UNLOAD Apr 12 21:16:45.042769 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 21:16:45.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.044200 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 21:16:45.064382 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 21:16:45.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.078253 systemd[1]: Starting initrd-cleanup.service... Apr 12 21:16:45.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.140832 systemd[1]: Stopped target nss-lookup.target. Apr 12 21:16:45.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.150515 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 21:16:45.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.166366 systemd[1]: Stopped target timers.target. Apr 12 21:16:45.182171 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 21:16:45.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.182260 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 21:16:45.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.198220 systemd[1]: Stopped target initrd.target. Apr 12 21:16:45.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.249489 systemd[1]: Stopped target basic.target. Apr 12 21:16:45.265369 systemd[1]: Stopped target ignition-complete.target. Apr 12 21:16:45.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.281185 systemd[1]: Stopped target ignition-diskful.target. Apr 12 21:16:45.297112 systemd[1]: Stopped target initrd-root-device.target. Apr 12 21:16:45.312977 systemd[1]: Stopped target remote-fs.target. Apr 12 21:16:45.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.328520 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 21:16:45.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.344347 systemd[1]: Stopped target sysinit.target. Apr 12 21:16:45.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.360397 systemd[1]: Stopped target local-fs.target. Apr 12 21:16:45.376372 systemd[1]: Stopped target local-fs-pre.target. Apr 12 21:16:45.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.392343 systemd[1]: Stopped target swap.target. Apr 12 21:16:45.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:45.408102 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 21:16:45.408188 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 21:16:45.418508 systemd[1]: Stopped target cryptsetup.target. Apr 12 21:16:45.464353 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 21:16:45.464430 systemd[1]: Stopped dracut-initqueue.service. Apr 12 21:16:45.475113 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 21:16:45.475191 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 21:16:45.521626 systemd[1]: Stopped target paths.target. Apr 12 21:16:45.532261 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 21:16:45.534054 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 21:16:45.542827 systemd[1]: Stopped target slices.target. Apr 12 21:16:45.553302 systemd[1]: Stopped target sockets.target. Apr 12 21:16:45.569164 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 21:16:45.569250 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 21:16:45.585147 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 21:16:45.585222 systemd[1]: Stopped ignition-files.service. Apr 12 21:16:45.595717 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Apr 12 21:16:45.595793 systemd[1]: Stopped flatcar-metadata-hostname.service. Apr 12 21:16:45.607988 systemd[1]: Stopping ignition-mount.service... Apr 12 21:16:45.617272 systemd[1]: Stopping iscsid.service... Apr 12 21:16:45.627471 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 21:16:45.627639 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 21:16:45.639877 systemd[1]: Stopping sysroot-boot.service... Apr 12 21:16:45.648611 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 21:16:45.648813 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 21:16:45.658908 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 21:16:45.658986 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 21:16:45.671496 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 21:16:45.672335 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 21:16:45.672440 systemd[1]: Stopped iscsid.service. Apr 12 21:16:45.678659 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 21:16:45.678722 systemd[1]: Stopped sysroot-boot.service. Apr 12 21:16:45.688105 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 21:16:45.688151 systemd[1]: Closed iscsid.socket. Apr 12 21:16:45.701707 systemd[1]: Stopping iscsiuio.service... Apr 12 21:16:45.715899 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 21:16:45.715983 systemd[1]: Stopped iscsiuio.service. Apr 12 21:16:45.730319 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 21:16:45.730380 systemd[1]: Finished initrd-cleanup.service. Apr 12 21:16:45.740589 systemd[1]: Stopped target network.target. Apr 12 21:16:45.748914 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 21:16:45.748955 systemd[1]: Closed iscsiuio.socket. Apr 12 21:16:45.758336 systemd[1]: Stopping systemd-networkd.service... Apr 12 21:16:45.765062 systemd-networkd[1483]: enP1p1s0f0np0: DHCPv6 lease lost Apr 12 21:16:45.767495 systemd[1]: Stopping systemd-resolved.service... Apr 12 21:16:45.774117 systemd-networkd[1483]: enP1p1s0f1np1: DHCPv6 lease lost Apr 12 21:16:46.157000 audit: BPF prog-id=9 op=UNLOAD Apr 12 21:16:45.777886 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 21:16:45.777961 systemd[1]: Stopped systemd-resolved.service. Apr 12 21:16:45.786095 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 21:16:45.786193 systemd[1]: Stopped systemd-networkd.service. Apr 12 21:16:45.795352 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 21:16:45.795418 systemd[1]: Stopped ignition-mount.service. Apr 12 21:16:45.804150 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 21:16:45.804177 systemd[1]: Closed systemd-networkd.socket. Apr 12 21:16:45.818070 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 21:16:45.818105 systemd[1]: Stopped ignition-disks.service. Apr 12 21:16:45.827583 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 21:16:45.827614 systemd[1]: Stopped ignition-kargs.service. Apr 12 21:16:45.836964 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 21:16:45.836994 systemd[1]: Stopped ignition-setup.service. Apr 12 21:16:45.846337 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 21:16:45.846363 systemd[1]: Stopped initrd-setup-root.service. Apr 12 21:16:45.856875 systemd[1]: Stopping network-cleanup.service... Apr 12 21:16:45.865141 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 21:16:45.865206 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 21:16:45.874427 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 21:16:45.874496 systemd[1]: Stopped systemd-sysctl.service. Apr 12 21:16:45.883563 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 21:16:45.883594 systemd[1]: Stopped systemd-modules-load.service. Apr 12 21:16:45.892454 systemd[1]: Stopping systemd-udevd.service... Apr 12 21:16:45.903143 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 21:16:45.903816 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 21:16:45.903938 systemd[1]: Stopped systemd-udevd.service. Apr 12 21:16:45.912441 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 21:16:45.912626 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 21:16:45.919167 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 21:16:45.919191 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 21:16:45.927725 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 21:16:45.927756 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 21:16:45.936527 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 21:16:45.936574 systemd[1]: Stopped dracut-cmdline.service. Apr 12 21:16:45.945139 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 21:16:45.945170 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 21:16:45.955386 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 21:16:45.963043 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 21:16:45.963120 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 21:16:45.972634 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 21:16:45.972741 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 21:16:46.625196 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 21:16:46.625275 systemd[1]: Stopped network-cleanup.service. Apr 12 21:16:46.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:46.633391 systemd[1]: Reached target initrd-switch-root.target. Apr 12 21:16:46.642664 systemd[1]: Starting initrd-switch-root.service... Apr 12 21:16:46.654118 systemd[1]: Switching root. Apr 12 21:16:46.688191 systemd-journald[834]: Journal stopped Apr 12 21:16:49.633031 systemd-journald[834]: Received SIGTERM from PID 1 (systemd). Apr 12 21:16:49.633057 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 21:16:49.633068 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 21:16:49.633076 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 21:16:49.633084 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 21:16:49.633092 kernel: SELinux: policy capability open_perms=1 Apr 12 21:16:49.633101 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 21:16:49.633110 kernel: SELinux: policy capability always_check_network=0 Apr 12 21:16:49.633118 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 21:16:49.633126 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 21:16:49.633134 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 21:16:49.633142 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 21:16:49.633150 systemd[1]: Successfully loaded SELinux policy in 139.708ms. Apr 12 21:16:49.633160 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.411ms. Apr 12 21:16:49.633172 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 21:16:49.633181 systemd[1]: Detected architecture arm64. Apr 12 21:16:49.633190 systemd[1]: Detected first boot. Apr 12 21:16:49.633199 systemd[1]: Hostname set to . Apr 12 21:16:49.633208 systemd[1]: Initializing machine ID from random generator. Apr 12 21:16:49.633218 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 21:16:49.633227 systemd[1]: Populated /etc with preset unit settings. Apr 12 21:16:49.633236 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 21:16:49.633246 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 21:16:49.633256 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 21:16:49.633265 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 21:16:49.633274 systemd[1]: Stopped initrd-switch-root.service. Apr 12 21:16:49.633284 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 21:16:49.633294 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 21:16:49.633303 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 21:16:49.633312 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 21:16:49.633321 systemd[1]: Created slice system-getty.slice. Apr 12 21:16:49.633332 systemd[1]: Created slice system-modprobe.slice. Apr 12 21:16:49.633341 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 21:16:49.633350 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 21:16:49.633360 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 21:16:49.633369 systemd[1]: Created slice user.slice. Apr 12 21:16:49.633378 systemd[1]: Started systemd-ask-password-console.path. Apr 12 21:16:49.633387 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 21:16:49.633396 systemd[1]: Set up automount boot.automount. Apr 12 21:16:49.633405 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 21:16:49.633416 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 21:16:49.633425 systemd[1]: Stopped target initrd-fs.target. Apr 12 21:16:49.633434 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 21:16:49.633444 systemd[1]: Reached target integritysetup.target. Apr 12 21:16:49.633454 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 21:16:49.633463 systemd[1]: Reached target remote-fs.target. Apr 12 21:16:49.633472 systemd[1]: Reached target slices.target. Apr 12 21:16:49.633481 systemd[1]: Reached target swap.target. Apr 12 21:16:49.633490 systemd[1]: Reached target torcx.target. Apr 12 21:16:49.633499 systemd[1]: Reached target veritysetup.target. Apr 12 21:16:49.633508 systemd[1]: Listening on systemd-coredump.socket. Apr 12 21:16:49.633518 systemd[1]: Listening on systemd-initctl.socket. Apr 12 21:16:49.633527 systemd[1]: Listening on systemd-networkd.socket. Apr 12 21:16:49.633537 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 21:16:49.633546 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 21:16:49.633556 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 21:16:49.633565 systemd[1]: Mounting dev-hugepages.mount... Apr 12 21:16:49.633574 systemd[1]: Mounting dev-mqueue.mount... Apr 12 21:16:49.633584 systemd[1]: Mounting media.mount... Apr 12 21:16:49.633593 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 21:16:49.633602 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 21:16:49.633611 systemd[1]: Mounting tmp.mount... Apr 12 21:16:49.633620 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 21:16:49.633630 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 21:16:49.633640 systemd[1]: Starting kmod-static-nodes.service... Apr 12 21:16:49.633649 systemd[1]: Starting modprobe@configfs.service... Apr 12 21:16:49.633659 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 21:16:49.633668 systemd[1]: Starting modprobe@drm.service... Apr 12 21:16:49.633677 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 21:16:49.633686 systemd[1]: Starting modprobe@fuse.service... Apr 12 21:16:49.633695 kernel: fuse: init (API version 7.34) Apr 12 21:16:49.633704 systemd[1]: Starting modprobe@loop.service... Apr 12 21:16:49.633713 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 21:16:49.633725 kernel: loop: module loaded Apr 12 21:16:49.633735 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 21:16:49.633744 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 21:16:49.633753 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 21:16:49.633762 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 21:16:49.633772 systemd[1]: Stopped systemd-journald.service. Apr 12 21:16:49.633781 systemd[1]: systemd-journald.service: Consumed 4.313s CPU time. Apr 12 21:16:49.633790 systemd[1]: Starting systemd-journald.service... Apr 12 21:16:49.633801 systemd[1]: Starting systemd-modules-load.service... Apr 12 21:16:49.633810 systemd[1]: Starting systemd-network-generator.service... Apr 12 21:16:49.633822 systemd-journald[1894]: Journal started Apr 12 21:16:49.633859 systemd-journald[1894]: Runtime Journal (/run/log/journal/43bb2567aa7d4316a719fb5724b42003) is 8.0M, max 4.0G, 3.9G free. Apr 12 21:16:46.862000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 21:16:47.006000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 21:16:47.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 21:16:47.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 21:16:47.014000 audit: BPF prog-id=10 op=LOAD Apr 12 21:16:47.014000 audit: BPF prog-id=10 op=UNLOAD Apr 12 21:16:47.015000 audit: BPF prog-id=11 op=LOAD Apr 12 21:16:47.015000 audit: BPF prog-id=11 op=UNLOAD Apr 12 21:16:47.045000 audit[1774]: AVC avc: denied { associate } for pid=1774 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 21:16:47.045000 audit[1774]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40002d189c a1=40001cadf8 a2=40001d10c0 a3=32 items=0 ppid=1753 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:16:47.045000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 21:16:47.064000 audit[1774]: AVC avc: denied { associate } for pid=1774 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 21:16:47.064000 audit[1774]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40002d1979 a2=1ed a3=0 items=2 ppid=1753 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:16:47.064000 audit: CWD cwd="/" Apr 12 21:16:47.064000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:47.064000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:47.064000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 21:16:48.775000 audit: BPF prog-id=12 op=LOAD Apr 12 21:16:48.775000 audit: BPF prog-id=3 op=UNLOAD Apr 12 21:16:48.775000 audit: BPF prog-id=13 op=LOAD Apr 12 21:16:48.776000 audit: BPF prog-id=14 op=LOAD Apr 12 21:16:48.776000 audit: BPF prog-id=4 op=UNLOAD Apr 12 21:16:48.776000 audit: BPF prog-id=5 op=UNLOAD Apr 12 21:16:48.777000 audit: BPF prog-id=15 op=LOAD Apr 12 21:16:48.777000 audit: BPF prog-id=12 op=UNLOAD Apr 12 21:16:48.778000 audit: BPF prog-id=16 op=LOAD Apr 12 21:16:48.778000 audit: BPF prog-id=17 op=LOAD Apr 12 21:16:48.778000 audit: BPF prog-id=13 op=UNLOAD Apr 12 21:16:48.778000 audit: BPF prog-id=14 op=UNLOAD Apr 12 21:16:48.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:48.801000 audit: BPF prog-id=15 op=UNLOAD Apr 12 21:16:48.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:48.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:49.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:49.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:49.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:49.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:49.594000 audit: BPF prog-id=18 op=LOAD Apr 12 21:16:49.594000 audit: BPF prog-id=19 op=LOAD Apr 12 21:16:49.595000 audit: BPF prog-id=20 op=LOAD Apr 12 21:16:49.595000 audit: BPF prog-id=16 op=UNLOAD Apr 12 21:16:49.595000 audit: BPF prog-id=17 op=UNLOAD Apr 12 21:16:49.628000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 21:16:49.628000 audit[1894]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffe62b94f0 a2=4000 a3=1 items=0 ppid=1 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:16:49.628000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 21:16:48.774118 systemd[1]: Queued start job for default target multi-user.target. Apr 12 21:16:47.043833 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 21:16:48.778793 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 21:16:47.044126 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:47Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 21:16:48.779136 systemd[1]: systemd-journald.service: Consumed 4.313s CPU time. Apr 12 21:16:47.044144 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:47Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 21:16:47.044173 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:47Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 21:16:47.044183 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:47Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 21:16:47.044206 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:47Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 21:16:47.044217 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:47Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 21:16:47.044413 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:47Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 21:16:47.044446 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:47Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 21:16:47.044457 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:47Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 21:16:47.045338 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:47Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 21:16:47.045368 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:47Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 21:16:47.045385 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:47Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 21:16:47.045398 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:47Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 21:16:47.045415 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:47Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 21:16:47.045428 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:47Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 21:16:48.442547 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:48Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 21:16:48.442846 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:48Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 21:16:48.442947 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:48Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 21:16:48.443111 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:48Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 21:16:48.443168 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:48Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 21:16:48.443227 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2024-04-12T21:16:48Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 21:16:49.654077 systemd[1]: Starting systemd-remount-fs.service... Apr 12 21:16:49.669051 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 21:16:49.692932 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 21:16:49.692963 systemd[1]: Stopped verity-setup.service. Apr 12 21:16:49.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:49.706626 kernel: kauditd_printk_skb: 77 callbacks suppressed Apr 12 21:16:49.706638 kernel: audit: type=1131 audit(1712956609.696:117): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:49.706650 systemd[1]: Started systemd-journald.service. Apr 12 21:16:49.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:49.755198 systemd[1]: Mounted dev-hugepages.mount. Apr 12 21:16:49.791038 kernel: audit: type=1130 audit(1712956609.754:118): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:49.794797 systemd[1]: Mounted dev-mqueue.mount. Apr 12 21:16:49.799348 systemd[1]: Mounted media.mount. Apr 12 21:16:49.803795 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 21:16:49.808126 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 21:16:49.812405 systemd[1]: Mounted tmp.mount. Apr 12 21:16:49.816752 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 21:16:49.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:49.821135 systemd[1]: Finished kmod-static-nodes.service. Apr 12 21:16:49.856039 kernel: audit: type=1130 audit(1712956609.820:119): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:49.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:49.859898 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 21:16:49.860010 systemd[1]: Finished modprobe@configfs.service. Apr 12 21:16:49.895037 kernel: audit: type=1130 audit(1712956609.859:120): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:49.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:49.899108 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 21:16:49.899216 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 21:16:49.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:49.970166 kernel: audit: type=1130 audit(1712956609.898:121): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:49.970191 kernel: audit: type=1131 audit(1712956609.898:122): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:49.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:49.975205 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 21:16:49.975314 systemd[1]: Finished modprobe@drm.service. Apr 12 21:16:49.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.048066 kernel: audit: type=1130 audit(1712956609.974:123): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.048090 kernel: audit: type=1131 audit(1712956609.974:124): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.053431 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 21:16:50.053575 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 21:16:50.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.090037 kernel: audit: type=1130 audit(1712956610.053:125): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.090050 kernel: audit: type=1131 audit(1712956610.053:126): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.132275 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 21:16:50.132382 systemd[1]: Finished modprobe@fuse.service. Apr 12 21:16:50.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.137552 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 21:16:50.137657 systemd[1]: Finished modprobe@loop.service. Apr 12 21:16:50.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.142875 systemd[1]: Finished systemd-modules-load.service. Apr 12 21:16:50.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.148385 systemd[1]: Finished systemd-network-generator.service. Apr 12 21:16:50.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.153764 systemd[1]: Finished systemd-remount-fs.service. Apr 12 21:16:50.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.158988 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 21:16:50.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.164631 systemd[1]: Reached target network-pre.target. Apr 12 21:16:50.170922 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 21:16:50.177327 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 21:16:50.182366 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 21:16:50.183861 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 21:16:50.190022 systemd[1]: Starting systemd-journal-flush.service... Apr 12 21:16:50.195183 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 21:16:50.196277 systemd[1]: Starting systemd-random-seed.service... Apr 12 21:16:50.196500 systemd-journald[1894]: Time spent on flushing to /var/log/journal/43bb2567aa7d4316a719fb5724b42003 is 24.932ms for 2571 entries. Apr 12 21:16:50.196500 systemd-journald[1894]: System Journal (/var/log/journal/43bb2567aa7d4316a719fb5724b42003) is 8.0M, max 195.6M, 187.6M free. Apr 12 21:16:50.228705 systemd-journald[1894]: Received client request to flush runtime journal. Apr 12 21:16:50.213542 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 21:16:50.214610 systemd[1]: Starting systemd-sysctl.service... Apr 12 21:16:50.220387 systemd[1]: Starting systemd-sysusers.service... Apr 12 21:16:50.226455 systemd[1]: Starting systemd-udev-settle.service... Apr 12 21:16:50.232784 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 21:16:50.237157 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 21:16:50.241481 systemd[1]: Finished systemd-journal-flush.service. Apr 12 21:16:50.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.245756 systemd[1]: Finished systemd-random-seed.service. Apr 12 21:16:50.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.249903 systemd[1]: Finished systemd-sysctl.service. Apr 12 21:16:50.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.253995 systemd[1]: Finished systemd-sysusers.service. Apr 12 21:16:50.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.259498 systemd[1]: Reached target first-boot-complete.target. Apr 12 21:16:50.263395 udevadm[1911]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 21:16:50.505221 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 21:16:50.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.509000 audit: BPF prog-id=21 op=LOAD Apr 12 21:16:50.509000 audit: BPF prog-id=22 op=LOAD Apr 12 21:16:50.509000 audit: BPF prog-id=7 op=UNLOAD Apr 12 21:16:50.509000 audit: BPF prog-id=8 op=UNLOAD Apr 12 21:16:50.510459 systemd[1]: Starting systemd-udevd.service... Apr 12 21:16:50.527681 systemd-udevd[1912]: Using default interface naming scheme 'v252'. Apr 12 21:16:50.540245 systemd[1]: Started systemd-udevd.service. Apr 12 21:16:50.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.545000 audit: BPF prog-id=23 op=LOAD Apr 12 21:16:50.546220 systemd[1]: Starting systemd-networkd.service... Apr 12 21:16:50.552049 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Apr 12 21:16:50.553000 audit: BPF prog-id=24 op=LOAD Apr 12 21:16:50.553000 audit: BPF prog-id=25 op=LOAD Apr 12 21:16:50.553000 audit: BPF prog-id=26 op=LOAD Apr 12 21:16:50.554260 systemd[1]: Starting systemd-userdbd.service... Apr 12 21:16:50.590045 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1915) Apr 12 21:16:50.587000 audit[1974]: AVC avc: denied { confidentiality } for pid=1974 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 21:16:50.596589 systemd[1]: Started systemd-userdbd.service. Apr 12 21:16:50.587000 audit[1974]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff93326010 a1=e46d4 a2=ffff953824b0 a3=aaab146d5010 items=312 ppid=1912 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:16:50.587000 audit: CWD cwd="/" Apr 12 21:16:50.587000 audit: PATH item=0 name=(null) inode=40 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=1 name=(null) inode=61447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=2 name=(null) inode=61447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=3 name=(null) inode=61448 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=4 name=(null) inode=61447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=5 name=(null) inode=61449 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=6 name=(null) inode=61447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=7 name=(null) inode=61450 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=8 name=(null) inode=61450 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=9 name=(null) inode=61451 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=10 name=(null) inode=61450 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=11 name=(null) inode=61452 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=12 name=(null) inode=61450 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=13 name=(null) inode=61453 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=14 name=(null) inode=61450 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=15 name=(null) inode=61454 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=16 name=(null) inode=61450 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=17 name=(null) inode=61455 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=18 name=(null) inode=61447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=19 name=(null) inode=61456 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=20 name=(null) inode=61456 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=21 name=(null) inode=61457 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=22 name=(null) inode=61456 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=23 name=(null) inode=61458 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=24 name=(null) inode=61456 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=25 name=(null) inode=61459 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=26 name=(null) inode=61456 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=27 name=(null) inode=61460 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=28 name=(null) inode=61456 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=29 name=(null) inode=61461 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=30 name=(null) inode=61447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=31 name=(null) inode=61462 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=32 name=(null) inode=61462 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=33 name=(null) inode=61463 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=34 name=(null) inode=61462 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=35 name=(null) inode=61464 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=36 name=(null) inode=61462 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=37 name=(null) inode=61465 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=38 name=(null) inode=61462 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=39 name=(null) inode=61466 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=40 name=(null) inode=61462 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=41 name=(null) inode=61467 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=42 name=(null) inode=61447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=43 name=(null) inode=61468 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=44 name=(null) inode=61468 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=45 name=(null) inode=61469 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=46 name=(null) inode=61468 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=47 name=(null) inode=61470 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=48 name=(null) inode=61468 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=49 name=(null) inode=61471 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=50 name=(null) inode=61468 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=51 name=(null) inode=61472 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=52 name=(null) inode=61468 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=53 name=(null) inode=61473 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=54 name=(null) inode=61447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=55 name=(null) inode=61474 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=56 name=(null) inode=61474 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=57 name=(null) inode=61475 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=58 name=(null) inode=61474 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=59 name=(null) inode=61476 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=60 name=(null) inode=61474 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=61 name=(null) inode=61477 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=62 name=(null) inode=61474 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=63 name=(null) inode=61478 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=64 name=(null) inode=61474 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=65 name=(null) inode=61479 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=66 name=(null) inode=61447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=67 name=(null) inode=61480 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=68 name=(null) inode=61480 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=69 name=(null) inode=61481 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=70 name=(null) inode=61480 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=71 name=(null) inode=61482 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=72 name=(null) inode=61480 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=73 name=(null) inode=61483 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=74 name=(null) inode=61480 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=75 name=(null) inode=61484 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=76 name=(null) inode=61480 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=77 name=(null) inode=61485 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=78 name=(null) inode=61447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=79 name=(null) inode=61486 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.599057 kernel: IPMI message handler: version 39.2 Apr 12 21:16:50.587000 audit: PATH item=80 name=(null) inode=61486 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=81 name=(null) inode=61487 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=82 name=(null) inode=61486 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=83 name=(null) inode=61488 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=84 name=(null) inode=61486 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=85 name=(null) inode=61489 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=86 name=(null) inode=61486 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=87 name=(null) inode=61490 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=88 name=(null) inode=61486 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=89 name=(null) inode=61491 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=90 name=(null) inode=61447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=91 name=(null) inode=61492 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=92 name=(null) inode=61492 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=93 name=(null) inode=61493 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=94 name=(null) inode=61492 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=95 name=(null) inode=61494 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=96 name=(null) inode=61492 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=97 name=(null) inode=61495 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=98 name=(null) inode=61492 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=99 name=(null) inode=61496 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=100 name=(null) inode=61492 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=101 name=(null) inode=61497 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=102 name=(null) inode=61447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=103 name=(null) inode=61498 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=104 name=(null) inode=61498 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=105 name=(null) inode=61499 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=106 name=(null) inode=61498 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=107 name=(null) inode=61500 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=108 name=(null) inode=61498 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=109 name=(null) inode=61501 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=110 name=(null) inode=61498 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=111 name=(null) inode=61502 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=112 name=(null) inode=61498 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=113 name=(null) inode=61503 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=114 name=(null) inode=61447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=115 name=(null) inode=61504 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=116 name=(null) inode=61504 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=117 name=(null) inode=61505 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=118 name=(null) inode=61504 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=119 name=(null) inode=61506 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=120 name=(null) inode=61504 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=121 name=(null) inode=61507 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=122 name=(null) inode=61504 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=123 name=(null) inode=61508 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=124 name=(null) inode=61504 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=125 name=(null) inode=61509 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=126 name=(null) inode=61447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=127 name=(null) inode=61510 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=128 name=(null) inode=61510 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=129 name=(null) inode=61511 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=130 name=(null) inode=61510 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=131 name=(null) inode=61512 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=132 name=(null) inode=61510 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=133 name=(null) inode=61513 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=134 name=(null) inode=61510 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=135 name=(null) inode=61514 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=136 name=(null) inode=61510 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=137 name=(null) inode=61515 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=138 name=(null) inode=61447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=139 name=(null) inode=61516 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=140 name=(null) inode=61516 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=141 name=(null) inode=61517 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=142 name=(null) inode=61516 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=143 name=(null) inode=61518 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=144 name=(null) inode=61516 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=145 name=(null) inode=61519 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=146 name=(null) inode=61516 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=147 name=(null) inode=61520 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=148 name=(null) inode=61516 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=149 name=(null) inode=61521 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=150 name=(null) inode=61447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=151 name=(null) inode=61522 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=152 name=(null) inode=61522 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=153 name=(null) inode=61523 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=154 name=(null) inode=61522 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=155 name=(null) inode=61524 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=156 name=(null) inode=61522 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=157 name=(null) inode=61525 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=158 name=(null) inode=61522 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=159 name=(null) inode=61526 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=160 name=(null) inode=61522 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=161 name=(null) inode=61527 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=162 name=(null) inode=40 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=163 name=(null) inode=61528 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=164 name=(null) inode=61528 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=165 name=(null) inode=61529 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=166 name=(null) inode=61528 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=167 name=(null) inode=61530 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=168 name=(null) inode=61528 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=169 name=(null) inode=61531 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=170 name=(null) inode=61531 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=171 name=(null) inode=61532 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=172 name=(null) inode=61531 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=173 name=(null) inode=61533 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=174 name=(null) inode=61531 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=175 name=(null) inode=61534 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=176 name=(null) inode=61531 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=177 name=(null) inode=61535 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=178 name=(null) inode=61531 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=179 name=(null) inode=61536 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=180 name=(null) inode=61528 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=181 name=(null) inode=61537 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=182 name=(null) inode=61537 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=183 name=(null) inode=61538 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=184 name=(null) inode=61537 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=185 name=(null) inode=61539 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=186 name=(null) inode=61537 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=187 name=(null) inode=61540 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=188 name=(null) inode=61537 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=189 name=(null) inode=61541 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=190 name=(null) inode=61537 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=191 name=(null) inode=61542 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=192 name=(null) inode=61528 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=193 name=(null) inode=61543 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=194 name=(null) inode=61543 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=195 name=(null) inode=61544 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=196 name=(null) inode=61543 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=197 name=(null) inode=61545 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=198 name=(null) inode=61543 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=199 name=(null) inode=61546 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=200 name=(null) inode=61543 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=201 name=(null) inode=61547 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=202 name=(null) inode=61543 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=203 name=(null) inode=61548 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=204 name=(null) inode=61528 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=205 name=(null) inode=61549 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=206 name=(null) inode=61549 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=207 name=(null) inode=61550 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=208 name=(null) inode=61549 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=209 name=(null) inode=61551 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=210 name=(null) inode=61549 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=211 name=(null) inode=61552 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=212 name=(null) inode=61549 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=213 name=(null) inode=61553 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=214 name=(null) inode=61549 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=215 name=(null) inode=61554 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=216 name=(null) inode=61528 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=217 name=(null) inode=61555 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=218 name=(null) inode=61555 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=219 name=(null) inode=61556 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=220 name=(null) inode=61555 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=221 name=(null) inode=61557 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=222 name=(null) inode=61555 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=223 name=(null) inode=61558 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=224 name=(null) inode=61555 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=225 name=(null) inode=61559 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=226 name=(null) inode=61555 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=227 name=(null) inode=61560 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=228 name=(null) inode=61528 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=229 name=(null) inode=61561 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=230 name=(null) inode=61561 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=231 name=(null) inode=61562 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=232 name=(null) inode=61561 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=233 name=(null) inode=61563 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=234 name=(null) inode=61561 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=235 name=(null) inode=61564 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=236 name=(null) inode=61561 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=237 name=(null) inode=61565 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=238 name=(null) inode=61561 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=239 name=(null) inode=61566 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=240 name=(null) inode=61528 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=241 name=(null) inode=61567 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=242 name=(null) inode=61567 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=243 name=(null) inode=61568 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=244 name=(null) inode=61567 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=245 name=(null) inode=61569 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=246 name=(null) inode=61567 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=247 name=(null) inode=61570 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=248 name=(null) inode=61567 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=249 name=(null) inode=61571 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=250 name=(null) inode=61567 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=251 name=(null) inode=61572 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=252 name=(null) inode=61528 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=253 name=(null) inode=61573 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=254 name=(null) inode=61573 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=255 name=(null) inode=61574 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=256 name=(null) inode=61573 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=257 name=(null) inode=61575 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=258 name=(null) inode=61573 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=259 name=(null) inode=61576 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=260 name=(null) inode=61573 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=261 name=(null) inode=61577 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=262 name=(null) inode=61573 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=263 name=(null) inode=61578 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=264 name=(null) inode=61528 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=265 name=(null) inode=61579 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=266 name=(null) inode=61579 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=267 name=(null) inode=61580 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=268 name=(null) inode=61579 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=269 name=(null) inode=61581 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=270 name=(null) inode=61579 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=271 name=(null) inode=61582 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=272 name=(null) inode=61579 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=273 name=(null) inode=61583 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=274 name=(null) inode=61579 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=275 name=(null) inode=61584 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=276 name=(null) inode=61528 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=277 name=(null) inode=61585 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=278 name=(null) inode=61585 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=279 name=(null) inode=61586 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=280 name=(null) inode=61585 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=281 name=(null) inode=61587 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=282 name=(null) inode=61585 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=283 name=(null) inode=61588 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=284 name=(null) inode=61585 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=285 name=(null) inode=61589 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=286 name=(null) inode=61585 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=287 name=(null) inode=61590 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=288 name=(null) inode=61528 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=289 name=(null) inode=61591 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=290 name=(null) inode=61591 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=291 name=(null) inode=61592 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=292 name=(null) inode=61591 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=293 name=(null) inode=61593 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=294 name=(null) inode=61591 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=295 name=(null) inode=61594 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=296 name=(null) inode=61591 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=297 name=(null) inode=61595 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=298 name=(null) inode=61591 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=299 name=(null) inode=61596 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=300 name=(null) inode=61528 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=301 name=(null) inode=61597 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=302 name=(null) inode=61597 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=303 name=(null) inode=61598 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=304 name=(null) inode=61597 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=305 name=(null) inode=61599 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=306 name=(null) inode=61597 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=307 name=(null) inode=61600 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=308 name=(null) inode=61597 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=309 name=(null) inode=61601 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=310 name=(null) inode=61597 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PATH item=311 name=(null) inode=61602 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:16:50.587000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 21:16:50.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.603691 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 21:16:50.609042 kernel: ipmi device interface Apr 12 21:16:50.620041 kernel: ipmi_ssif: IPMI SSIF Interface driver Apr 12 21:16:50.620064 kernel: ipmi_si: IPMI System Interface driver Apr 12 21:16:50.635954 kernel: ipmi_si: Unable to find any System Interface(s) Apr 12 21:16:50.671132 systemd-networkd[1922]: bond0: netdev ready Apr 12 21:16:50.674230 systemd-networkd[1922]: lo: Link UP Apr 12 21:16:50.674235 systemd-networkd[1922]: lo: Gained carrier Apr 12 21:16:50.679039 systemd-networkd[1922]: Enumeration completed Apr 12 21:16:50.679123 systemd[1]: Started systemd-networkd.service. Apr 12 21:16:50.679446 systemd-networkd[1922]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Apr 12 21:16:50.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.686904 systemd-networkd[1922]: enP1p1s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:52:2a:bd.network. Apr 12 21:16:50.695434 systemd[1]: Finished systemd-udev-settle.service. Apr 12 21:16:50.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.699732 systemd[1]: Starting lvm2-activation-early.service... Apr 12 21:16:50.710483 lvm[2009]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 21:16:50.743858 systemd[1]: Finished lvm2-activation-early.service. Apr 12 21:16:50.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.746962 systemd[1]: Reached target cryptsetup.target. Apr 12 21:16:50.751432 systemd[1]: Starting lvm2-activation.service... Apr 12 21:16:50.756004 lvm[2010]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 21:16:50.791965 systemd[1]: Finished lvm2-activation.service. Apr 12 21:16:50.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.795089 systemd[1]: Reached target local-fs-pre.target. Apr 12 21:16:50.798417 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 21:16:50.798438 systemd[1]: Reached target local-fs.target. Apr 12 21:16:50.801691 systemd[1]: Reached target machines.target. Apr 12 21:16:50.806263 systemd[1]: Starting ldconfig.service... Apr 12 21:16:50.810605 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 21:16:50.810667 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 21:16:50.811827 systemd[1]: Starting systemd-boot-update.service... Apr 12 21:16:50.815699 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 21:16:50.819888 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 21:16:50.823105 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 21:16:50.823136 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 21:16:50.824263 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 21:16:50.829228 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 21:16:50.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.832434 systemd[1]: boot.automount: Got automount request for /boot, triggered by 2012 (bootctl) Apr 12 21:16:50.833494 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 21:16:50.841781 systemd-tmpfiles[2017]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 21:16:50.845941 systemd-tmpfiles[2017]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 21:16:50.852217 systemd-tmpfiles[2017]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 21:16:50.882189 systemd-fsck[2023]: fsck.fat 4.2 (2021-01-31) Apr 12 21:16:50.882189 systemd-fsck[2023]: /dev/nvme0n1p1: 236 files, 117047/258078 clusters Apr 12 21:16:50.883454 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 21:16:50.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.887811 systemd[1]: Mounting boot.mount... Apr 12 21:16:50.896919 systemd[1]: Mounted boot.mount. Apr 12 21:16:50.900727 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 21:16:50.901284 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 21:16:50.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.909574 systemd[1]: Finished systemd-boot-update.service. Apr 12 21:16:50.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.972857 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 21:16:50.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:16:50.977338 systemd[1]: Starting audit-rules.service... Apr 12 21:16:50.981638 systemd[1]: Starting clean-ca-certificates.service... Apr 12 21:16:50.986163 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 21:16:50.990000 audit: BPF prog-id=27 op=LOAD Apr 12 21:16:50.991411 systemd[1]: Starting systemd-resolved.service... Apr 12 21:16:50.995000 audit: BPF prog-id=28 op=LOAD Apr 12 21:16:50.996429 systemd[1]: Starting systemd-timesyncd.service... Apr 12 21:16:51.000761 systemd[1]: Starting systemd-update-utmp.service... Apr 12 21:16:51.004250 systemd[1]: Finished clean-ca-certificates.service. Apr 12 21:16:51.006000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 21:16:51.006000 audit[2048]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdccb2aa0 a2=420 a3=0 items=0 ppid=2028 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:16:51.006000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 21:16:51.006634 augenrules[2048]: No rules Apr 12 21:16:51.007487 systemd[1]: Finished audit-rules.service. Apr 12 21:16:51.010430 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 21:16:51.014111 ldconfig[2011]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 21:16:51.015146 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 21:16:51.015948 systemd[1]: Finished ldconfig.service. Apr 12 21:16:51.018997 systemd[1]: Finished systemd-update-utmp.service. Apr 12 21:16:51.022970 systemd[1]: Starting systemd-update-done.service... Apr 12 21:16:51.029548 systemd[1]: Finished systemd-update-done.service. Apr 12 21:16:51.050877 systemd[1]: Started systemd-timesyncd.service. Apr 12 21:16:51.052650 systemd-resolved[2040]: Positive Trust Anchors: Apr 12 21:16:51.052660 systemd-resolved[2040]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 21:16:51.052688 systemd-resolved[2040]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 21:16:51.053643 systemd[1]: Reached target time-set.target. Apr 12 21:16:51.056097 systemd-resolved[2040]: Using system hostname 'ci-3510.3.3-a-03d04c2097'. Apr 12 21:16:52.626048 kernel: mlx5_core 0001:01:00.1 enP1p1s0f1np1: Link up Apr 12 21:16:52.641044 kernel: bond0: (slave enP1p1s0f1np1): Enslaving as a backup interface with an up link Apr 12 21:16:52.642082 systemd-networkd[1922]: enP1p1s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:52:2a:bc.network. Apr 12 21:16:52.674049 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 21:16:52.793047 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 21:16:53.330046 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 21:16:53.458048 kernel: mlx5_core 0001:01:00.0 enP1p1s0f0np0: Link up Apr 12 21:16:53.474039 kernel: bond0: (slave enP1p1s0f0np0): Enslaving as a backup interface with an up link Apr 12 21:16:53.474078 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Apr 12 21:16:53.484846 systemd-networkd[1922]: bond0: Link UP Apr 12 21:16:53.485161 systemd-networkd[1922]: enP1p1s0f1np1: Link UP Apr 12 21:16:53.485447 systemd[1]: Started systemd-resolved.service. Apr 12 21:16:53.485994 systemd[1]: Reached target network.target. Apr 12 21:16:53.487038 kernel: bond0: (slave enP1p1s0f1np1): link status definitely up, 25000 Mbps full duplex Apr 12 21:16:53.487068 kernel: bond0: active interface up! Apr 12 21:16:53.487481 systemd-networkd[1922]: enP1p1s0f1np1: Gained carrier Apr 12 21:16:53.488038 kernel: bond0: (slave enP1p1s0f0np0): link status definitely up, 25000 Mbps full duplex Apr 12 21:16:53.488526 systemd-networkd[1922]: enP1p1s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:52:2a:bc.network. Apr 12 21:16:53.521016 systemd[1]: Reached target nss-lookup.target. Apr 12 21:16:53.524895 systemd[1]: Reached target sysinit.target. Apr 12 21:16:53.528781 systemd[1]: Started motdgen.path. Apr 12 21:16:53.532590 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 21:16:53.536669 systemd[1]: Started logrotate.timer. Apr 12 21:16:53.540657 systemd[1]: Started mdadm.timer. Apr 12 21:16:53.544504 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 21:16:53.548366 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 21:16:53.548387 systemd[1]: Reached target paths.target. Apr 12 21:16:53.552183 systemd[1]: Reached target timers.target. Apr 12 21:16:53.556237 systemd[1]: Listening on dbus.socket. Apr 12 21:16:53.561299 systemd[1]: Starting docker.socket... Apr 12 21:16:53.567637 systemd[1]: Listening on sshd.socket. Apr 12 21:16:53.571572 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 21:16:53.571984 systemd[1]: Listening on docker.socket. Apr 12 21:16:53.575918 systemd[1]: Reached target sockets.target. Apr 12 21:16:53.579672 systemd[1]: Reached target basic.target. Apr 12 21:16:53.583453 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 21:16:53.583472 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 21:16:53.584596 systemd[1]: Starting containerd.service... Apr 12 21:16:53.589396 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 21:16:53.594742 systemd[1]: Starting coreos-metadata.service... Apr 12 21:16:53.596040 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:53.599039 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:53.630008 coreos-metadata[2058]: Apr 12 21:16:53.629 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 21:16:53.632304 coreos-metadata[2058]: Apr 12 21:16:53.632 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Apr 12 21:16:53.633452 coreos-metadata[2061]: Apr 12 21:16:53.633 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 21:16:53.634253 coreos-metadata[2061]: Apr 12 21:16:53.634 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Apr 12 21:16:53.637038 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:53.637528 systemd[1]: Starting dbus.service... Apr 12 21:16:53.640038 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:53.642038 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:53.663743 dbus-daemon[2066]: [system] SELinux support is enabled Apr 12 21:16:53.679038 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:53.679770 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 21:16:53.682038 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:53.684037 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:53.685325 jq[2067]: false Apr 12 21:16:53.720038 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:53.720719 systemd[1]: Starting extend-filesystems.service... Apr 12 21:16:53.723038 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:53.725037 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:53.759853 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 21:16:53.760041 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:53.761091 systemd[1]: Starting motdgen.service... Apr 12 21:16:53.763037 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:53.763451 extend-filesystems[2068]: Found nvme1n1 Apr 12 21:16:53.837137 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:53.837177 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:53.837225 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 233815889 blocks Apr 12 21:16:53.837251 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:53.837288 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:53.812490 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 21:16:53.837404 extend-filesystems[2068]: Found nvme0n1 Apr 12 21:16:53.837404 extend-filesystems[2068]: Found nvme0n1p1 Apr 12 21:16:53.837404 extend-filesystems[2068]: Found nvme0n1p2 Apr 12 21:16:53.837404 extend-filesystems[2068]: Found nvme0n1p3 Apr 12 21:16:53.837404 extend-filesystems[2068]: Found usr Apr 12 21:16:53.837404 extend-filesystems[2068]: Found nvme0n1p4 Apr 12 21:16:53.837404 extend-filesystems[2068]: Found nvme0n1p6 Apr 12 21:16:53.837404 extend-filesystems[2068]: Found nvme0n1p7 Apr 12 21:16:53.837404 extend-filesystems[2068]: Found nvme0n1p9 Apr 12 21:16:53.837404 extend-filesystems[2068]: Checking size of /dev/nvme0n1p9 Apr 12 21:16:53.837404 extend-filesystems[2068]: Resized partition /dev/nvme0n1p9 Apr 12 21:16:54.591616 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.591648 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.591661 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.591710 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.591739 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.591764 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.591789 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.591813 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.591849 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.591874 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.591893 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.591905 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.591937 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.591950 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.591962 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.591974 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.591989 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592002 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592025 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592057 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592070 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592082 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592095 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592130 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592144 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592157 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592171 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592199 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592235 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592248 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592260 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592273 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592303 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592316 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592348 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592361 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592373 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592386 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592398 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592412 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592425 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592437 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592450 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592462 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592499 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592512 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592525 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592547 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592559 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592572 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592585 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592613 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592626 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.592773 extend-filesystems[2082]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 21:16:54.650322 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.650378 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.650404 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.650429 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:53.865971 systemd[1]: Starting prepare-critools.service... Apr 12 21:16:54.497657 dbus-daemon[2066]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 21:16:54.650693 coreos-metadata[2061]: Apr 12 21:16:54.634 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 21:16:54.650693 coreos-metadata[2061]: Apr 12 21:16:54.634 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Apr 12 21:16:54.650865 coreos-metadata[2058]: Apr 12 21:16:54.632 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 21:16:54.650865 coreos-metadata[2058]: Apr 12 21:16:54.632 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Apr 12 21:16:53.921702 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 21:16:53.979315 systemd[1]: Starting sshd-keygen.service... Apr 12 21:16:54.040182 systemd[1]: Starting systemd-logind.service... Apr 12 21:16:54.134238 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 21:16:54.134407 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 21:16:54.651538 update_engine[2095]: I0412 21:16:54.170681 2095 main.cc:92] Flatcar Update Engine starting Apr 12 21:16:54.651538 update_engine[2095]: I0412 21:16:54.173010 2095 update_check_scheduler.cc:74] Next update check in 6m36s Apr 12 21:16:54.135456 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 21:16:54.651823 jq[2096]: true Apr 12 21:16:54.136913 systemd[1]: Starting update-engine.service... Apr 12 21:16:54.207176 systemd-logind[2094]: Watching system buttons on /dev/input/event0 (Power Button) Apr 12 21:16:54.652210 tar[2098]: ./ Apr 12 21:16:54.652210 tar[2098]: ./loopback Apr 12 21:16:54.652210 tar[2098]: ./bandwidth Apr 12 21:16:54.652210 tar[2098]: ./ptp Apr 12 21:16:54.652210 tar[2098]: ./vlan Apr 12 21:16:54.652210 tar[2098]: ./host-device Apr 12 21:16:54.652210 tar[2098]: ./tuning Apr 12 21:16:54.652210 tar[2098]: ./vrf Apr 12 21:16:54.652210 tar[2098]: ./sbr Apr 12 21:16:54.208074 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 21:16:54.652564 tar[2099]: crictl Apr 12 21:16:54.235571 systemd-logind[2094]: New seat seat0. Apr 12 21:16:54.652813 jq[2102]: true Apr 12 21:16:54.265881 systemd[1]: Started dbus.service. Apr 12 21:16:54.652964 env[2103]: time="2024-04-12T21:16:54.535895640Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 21:16:54.652964 env[2103]: time="2024-04-12T21:16:54.551957640Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 21:16:54.652964 env[2103]: time="2024-04-12T21:16:54.552108400Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 21:16:54.652964 env[2103]: time="2024-04-12T21:16:54.553478960Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.1 Apr 12 21:16:54.652964 env[2103]: 54-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 21:16:54.652964 env[2103]: time="2024-04-12T21:16:54.553503920Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 21:16:54.652964 env[2103]: time="2024-04-12T21:16:54.553688360Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter Apr 12 21:16:54.652964 env[2103]: : skip plugin" type=io.containerd.snapshotter.v1 Apr 12 21:16:54.652964 env[2103]: time="2024-04-12T21:16:54.553706120Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 21:16:54.652964 env[2103]: time="2024-04-12T21:16:54.553720240Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 21:16:54.652964 env[2103]: time="2024-04-12T21:16:54.553730120Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 21:16:54.652964 env[2103]: time="2024-04-12T21:16:54.553805600Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 21:16:54.652964 env[2103]: time="2024-04-12T21:16:54.554230640Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 21:16:54.353184 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 21:16:54.653424 env[2103]: time="2024-04-12T21:16:54.554389080Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 21:16:54.653424 env[2103]: time="2024-04-12T21:16:54.554403800Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 21:16:54.653424 env[2103]: time="2024-04-12T21:16:54.554462800Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 21:16:54.653424 env[2103]: time="2024-04-12T21:16:54.554473720Z" level=info msg="metadata content store policy set" policy=shared Apr 12 21:16:54.653424 env[2103]: time="2024-04-12T21:16:54.569973720Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 21:16:54.653424 env[2103]: time="2024-04-12T21:16:54.570018280Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 21:16:54.653424 env[2103]: time="2024-04-12T21:16:54.570031040Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 21:16:54.653424 env[2103]: time="2024-04-12T21:16:54.570063440Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 21:16:54.653424 env[2103]: time="2024-04-12T21:16:54.570077960Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 21:16:54.653424 env[2103]: time="2024-04-12T21:16:54.570091520Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 21:16:54.653424 env[2103]: time="2024-04-12T21:16:54.570103840Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 21:16:54.653424 env[2103]: time="2024-04-12T21:16:54.570430160Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 21:16:54.653424 env[2103]: time="2024-04-12T21:16:54.570447280Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 21:16:54.353449 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 21:16:54.653767 env[2103]: time="2024-04-12T21:16:54.570461160Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 21:16:54.653767 env[2103]: time="2024-04-12T21:16:54.570473440Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 21:16:54.653767 env[2103]: time="2024-04-12T21:16:54.570485920Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 21:16:54.653767 env[2103]: time="2024-04-12T21:16:54.572917120Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 21:16:54.653767 env[2103]: time="2024-04-12T21:16:54.575869840Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 21:16:54.653767 env[2103]: time="2024-04-12T21:16:54.576095720Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 21:16:54.653767 env[2103]: time="2024-04-12T21:16:54.576122280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 21:16:54.653767 env[2103]: time="2024-04-12T21:16:54.576136760Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 21:16:54.653767 env[2103]: time="2024-04-12T21:16:54.576246480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 21:16:54.653767 env[2103]: time="2024-04-12T21:16:54.576258840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 21:16:54.653767 env[2103]: time="2024-04-12T21:16:54.576271120Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 21:16:54.653767 env[2103]: time="2024-04-12T21:16:54.576282280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 21:16:54.653767 env[2103]: time="2024-04-12T21:16:54.576293640Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 21:16:54.653767 env[2103]: time="2024-04-12T21:16:54.576307400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 21:16:54.654052 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.654074 bash[2132]: Updated "/home/core/.ssh/authorized_keys" Apr 12 21:16:54.353982 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 21:16:54.654180 env[2103]: time="2024-04-12T21:16:54.576318480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 21:16:54.654180 env[2103]: time="2024-04-12T21:16:54.576331000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 21:16:54.654180 env[2103]: time="2024-04-12T21:16:54.576343360Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 21:16:54.654180 env[2103]: time="2024-04-12T21:16:54.578834000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 21:16:54.654180 env[2103]: time="2024-04-12T21:16:54.578853280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 21:16:54.654180 env[2103]: time="2024-04-12T21:16:54.578865400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 21:16:54.654180 env[2103]: time="2024-04-12T21:16:54.578877200Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 21:16:54.654180 env[2103]: time="2024-04-12T21:16:54.578892240Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 21:16:54.654180 env[2103]: time="2024-04-12T21:16:54.578902840Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 21:16:54.654180 env[2103]: time="2024-04-12T21:16:54.578920040Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 21:16:54.654180 env[2103]: time="2024-04-12T21:16:54.578956120Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 21:16:54.354178 systemd[1]: Finished motdgen.service. Apr 12 21:16:54.654446 env[2103]: time="2024-04-12T21:16:54.579178160Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 21:16:54.409426 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 21:16:54.655550 env[2103]: time="2024-04-12T21:16:54.579230640Z" level=info msg="Connect containerd service" Apr 12 21:16:54.655550 env[2103]: time="2024-04-12T21:16:54.579262800Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 21:16:54.655550 env[2103]: time="2024-04-12T21:16:54.582617800Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 21:16:54.655550 env[2103]: time="2024-04-12T21:16:54.582879760Z" level=info msg="Start subscribing containerd event" Apr 12 21:16:54.655550 env[2103]: time="2024-04-12T21:16:54.583383480Z" level=info msg="Start recovering state" Apr 12 21:16:54.655550 env[2103]: time="2024-04-12T21:16:54.583373800Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 21:16:54.655550 env[2103]: time="2024-04-12T21:16:54.583693440Z" level=info msg="Start event monitor" Apr 12 21:16:54.655550 env[2103]: time="2024-04-12T21:16:54.583728080Z" level=info msg="Start snapshots syncer" Apr 12 21:16:54.655550 env[2103]: time="2024-04-12T21:16:54.583738640Z" level=info msg="Start cni network conf syncer for default" Apr 12 21:16:54.655550 env[2103]: time="2024-04-12T21:16:54.583745920Z" level=info msg="Start streaming server" Apr 12 21:16:54.655550 env[2103]: time="2024-04-12T21:16:54.583702600Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 21:16:54.655550 env[2103]: time="2024-04-12T21:16:54.583840920Z" level=info msg="containerd successfully booted in 0.048558s" Apr 12 21:16:54.409683 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 21:16:54.501029 systemd[1]: Started systemd-logind.service. Apr 12 21:16:54.571569 systemd[1]: Started update-engine.service. Apr 12 21:16:54.621149 systemd[1]: Started containerd.service. Apr 12 21:16:54.657527 tar[2098]: ./tap Apr 12 21:16:54.680040 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.680409 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 21:16:54.682038 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.685039 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.686465 tar[2098]: ./dhcp Apr 12 21:16:54.724038 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.726121 systemd[1]: Started locksmithd.service. Apr 12 21:16:54.739040 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.742038 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.757302 tar[2098]: ./static Apr 12 21:16:54.768576 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 21:16:54.768700 systemd[1]: Reached target system-config.target. Apr 12 21:16:54.769038 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.772038 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.774605 locksmithd[2135]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 21:16:54.778181 tar[2098]: ./firewall Apr 12 21:16:54.798268 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 21:16:54.798390 systemd[1]: Reached target user-config.target. Apr 12 21:16:54.799038 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.802040 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.809638 tar[2098]: ./macvlan Apr 12 21:16:54.829037 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.835936 systemd[1]: Finished prepare-critools.service. Apr 12 21:16:54.838266 tar[2098]: ./dummy Apr 12 21:16:54.844037 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.847040 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.866404 tar[2098]: ./bridge Apr 12 21:16:54.874037 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.889040 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.897080 tar[2098]: ./ipvlan Apr 12 21:16:54.904038 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.919040 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.925247 tar[2098]: ./portmap Apr 12 21:16:54.934038 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.949039 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.952036 tar[2098]: ./host-local Apr 12 21:16:54.964038 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.978038 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.985722 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 21:16:54.993037 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:54.996037 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:55.020038 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:55.034038 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:55.047036 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:55.061037 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:55.074038 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:55.074052 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 233815889 Apr 12 21:16:55.083046 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:55.097635 extend-filesystems[2082]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Apr 12 21:16:55.097635 extend-filesystems[2082]: old_desc_blocks = 1, new_desc_blocks = 112 Apr 12 21:16:55.097635 extend-filesystems[2082]: The filesystem on /dev/nvme0n1p9 is now 233815889 (4k) blocks long. Apr 12 21:16:55.176177 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:55.176197 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:55.176211 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:55.176223 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 21:16:55.176245 kernel: bond0: (slave enP1p1s0f1np1): invalid new link 1 on slave Apr 12 21:16:55.176264 extend-filesystems[2068]: Resized filesystem in /dev/nvme0n1p9 Apr 12 21:16:55.098719 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 21:16:55.098871 systemd[1]: Finished extend-filesystems.service. Apr 12 21:16:55.154229 systemd-networkd[1922]: enP1p1s0f0np0: Link UP Apr 12 21:16:55.154572 systemd-networkd[1922]: bond0: Gained carrier Apr 12 21:16:55.154739 systemd-timesyncd[2043]: Network configuration changed, trying to establish connection. Apr 12 21:16:55.154755 systemd-networkd[1922]: enP1p1s0f0np0: Gained carrier Apr 12 21:16:55.177213 systemd-timesyncd[2043]: Network configuration changed, trying to establish connection. Apr 12 21:16:55.177256 systemd-timesyncd[2043]: Network configuration changed, trying to establish connection. Apr 12 21:16:55.177564 systemd-networkd[1922]: enP1p1s0f1np1: Link DOWN Apr 12 21:16:55.177567 systemd-networkd[1922]: enP1p1s0f1np1: Lost carrier Apr 12 21:16:55.190222 systemd-timesyncd[2043]: Network configuration changed, trying to establish connection. Apr 12 21:16:55.190263 systemd-timesyncd[2043]: Network configuration changed, trying to establish connection. Apr 12 21:16:55.190570 systemd-timesyncd[2043]: Network configuration changed, trying to establish connection. Apr 12 21:16:55.988331 sshd_keygen[2093]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 21:16:56.005265 systemd[1]: Finished sshd-keygen.service. Apr 12 21:16:56.010243 systemd[1]: Starting issuegen.service... Apr 12 21:16:56.017359 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 21:16:56.017505 systemd[1]: Finished issuegen.service. Apr 12 21:16:56.018039 kernel: mlx5_core 0001:01:00.1 enP1p1s0f1np1: Link up Apr 12 21:16:56.020039 kernel: bond0: (slave enP1p1s0f1np1): link status up again after 200 ms Apr 12 21:16:56.021751 systemd-networkd[1922]: enP1p1s0f1np1: Link UP Apr 12 21:16:56.021974 systemd-timesyncd[2043]: Network configuration changed, trying to establish connection. Apr 12 21:16:56.022040 kernel: bond0: (slave enP1p1s0f1np1): link status up again after 200 ms Apr 12 21:16:56.022070 kernel: bond0: (slave enP1p1s0f1np1): speed changed to 0 on port 1 Apr 12 21:16:56.022086 systemd-timesyncd[2043]: Network configuration changed, trying to establish connection. Apr 12 21:16:56.022223 systemd-timesyncd[2043]: Network configuration changed, trying to establish connection. Apr 12 21:16:56.030907 systemd-networkd[1922]: enP1p1s0f1np1: Gained carrier Apr 12 21:16:56.062795 systemd[1]: Starting systemd-user-sessions.service... Apr 12 21:16:56.072987 kernel: bond0: (slave enP1p1s0f1np1): link status definitely up, 25000 Mbps full duplex Apr 12 21:16:56.077083 systemd[1]: Finished systemd-user-sessions.service. Apr 12 21:16:56.079256 systemd-timesyncd[2043]: Network configuration changed, trying to establish connection. Apr 12 21:16:56.079325 systemd-timesyncd[2043]: Network configuration changed, trying to establish connection. Apr 12 21:16:56.082361 systemd[1]: Started getty@tty1.service. Apr 12 21:16:56.087701 systemd[1]: Started serial-getty@ttyAMA0.service. Apr 12 21:16:56.091753 systemd[1]: Reached target getty.target. Apr 12 21:16:56.170110 systemd-networkd[1922]: bond0: Gained IPv6LL Apr 12 21:16:56.170334 systemd-timesyncd[2043]: Network configuration changed, trying to establish connection. Apr 12 21:16:56.632990 coreos-metadata[2058]: Apr 12 21:16:56.632 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Apr 12 21:16:56.634810 coreos-metadata[2061]: Apr 12 21:16:56.634 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Apr 12 21:16:57.066413 systemd-timesyncd[2043]: Network configuration changed, trying to establish connection. Apr 12 21:16:57.066539 systemd-timesyncd[2043]: Network configuration changed, trying to establish connection. Apr 12 21:16:58.253047 kernel: mlx5_core 0001:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Apr 12 21:17:01.086526 kernel: mlx5_core 0001:01:00.0: modify lag map port 1:2 port 2:2 Apr 12 21:17:01.086748 kernel: mlx5_core 0001:01:00.0: modify lag map port 1:1 port 2:2 Apr 12 21:17:01.102940 login[2162]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Apr 12 21:17:01.103263 login[2161]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 21:17:01.111859 systemd-logind[2094]: New session 1 of user core. Apr 12 21:17:01.112852 systemd[1]: Created slice user-500.slice. Apr 12 21:17:01.114150 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 21:17:01.121481 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 21:17:01.122888 systemd[1]: Starting user@500.service... Apr 12 21:17:01.125879 (systemd)[2167]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:01.199132 systemd[2167]: Queued start job for default target default.target. Apr 12 21:17:01.199593 systemd[2167]: Reached target paths.target. Apr 12 21:17:01.199610 systemd[2167]: Reached target sockets.target. Apr 12 21:17:01.199621 systemd[2167]: Reached target timers.target. Apr 12 21:17:01.199630 systemd[2167]: Reached target basic.target. Apr 12 21:17:01.199668 systemd[2167]: Reached target default.target. Apr 12 21:17:01.199692 systemd[2167]: Startup finished in 68ms. Apr 12 21:17:01.199731 systemd[1]: Started user@500.service. Apr 12 21:17:01.200756 systemd[1]: Started session-1.scope. Apr 12 21:17:01.762539 coreos-metadata[2061]: Apr 12 21:17:01.762 INFO Fetch successful Apr 12 21:17:01.763726 coreos-metadata[2058]: Apr 12 21:17:01.763 INFO Fetch successful Apr 12 21:17:01.800565 systemd[1]: Finished coreos-metadata.service. Apr 12 21:17:01.802260 systemd[1]: Started packet-phone-home.service. Apr 12 21:17:01.802335 unknown[2058]: wrote ssh authorized keys file for user: core Apr 12 21:17:01.809257 curl[2183]: % Total % Received % Xferd Average Speed Time Time Time Current Apr 12 21:17:01.809438 curl[2183]: Dload Upload Total Spent Left Speed Apr 12 21:17:01.814298 systemd[1]: Created slice system-sshd.slice. Apr 12 21:17:01.814780 update-ssh-keys[2184]: Updated "/home/core/.ssh/authorized_keys" Apr 12 21:17:01.815740 systemd[1]: Started sshd@0-147.75.62.222:22-139.178.89.65:59124.service. Apr 12 21:17:01.816313 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 21:17:01.816625 systemd[1]: Reached target multi-user.target. Apr 12 21:17:01.817949 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 21:17:01.823988 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 21:17:01.824136 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 21:17:01.829108 systemd[1]: Startup finished in 3.231s (kernel) + 22.484s (initrd) + 15.110s (userspace) = 40.826s. Apr 12 21:17:01.943926 curl[2183]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Apr 12 21:17:01.945275 systemd[1]: packet-phone-home.service: Deactivated successfully. Apr 12 21:17:02.105637 login[2162]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 21:17:02.108996 systemd-logind[2094]: New session 2 of user core. Apr 12 21:17:02.110148 systemd[1]: Started session-2.scope. Apr 12 21:17:02.298157 sshd[2186]: Accepted publickey for core from 139.178.89.65 port 59124 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:17:02.299191 sshd[2186]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:02.301370 systemd-logind[2094]: New session 3 of user core. Apr 12 21:17:02.302302 systemd[1]: Started session-3.scope. Apr 12 21:17:02.703793 systemd[1]: Started sshd@1-147.75.62.222:22-139.178.89.65:45526.service. Apr 12 21:17:03.177626 sshd[2199]: Accepted publickey for core from 139.178.89.65 port 45526 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:17:03.178605 sshd[2199]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:03.181056 systemd-logind[2094]: New session 4 of user core. Apr 12 21:17:03.182033 systemd[1]: Started session-4.scope. Apr 12 21:17:03.513352 sshd[2199]: pam_unix(sshd:session): session closed for user core Apr 12 21:17:03.515993 systemd[1]: sshd@1-147.75.62.222:22-139.178.89.65:45526.service: Deactivated successfully. Apr 12 21:17:03.516731 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 21:17:03.517213 systemd-logind[2094]: Session 4 logged out. Waiting for processes to exit. Apr 12 21:17:03.517759 systemd-logind[2094]: Removed session 4. Apr 12 21:17:03.585857 systemd[1]: Started sshd@2-147.75.62.222:22-139.178.89.65:45538.service. Apr 12 21:17:04.052358 sshd[2205]: Accepted publickey for core from 139.178.89.65 port 45538 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:17:04.053437 sshd[2205]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:04.055695 systemd-logind[2094]: New session 5 of user core. Apr 12 21:17:04.056632 systemd[1]: Started session-5.scope. Apr 12 21:17:04.382731 sshd[2205]: pam_unix(sshd:session): session closed for user core Apr 12 21:17:04.385025 systemd[1]: sshd@2-147.75.62.222:22-139.178.89.65:45538.service: Deactivated successfully. Apr 12 21:17:04.385610 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 21:17:04.385986 systemd-logind[2094]: Session 5 logged out. Waiting for processes to exit. Apr 12 21:17:04.386433 systemd-logind[2094]: Removed session 5. Apr 12 21:17:04.459020 systemd[1]: Started sshd@3-147.75.62.222:22-139.178.89.65:45540.service. Apr 12 21:17:04.939692 sshd[2211]: Accepted publickey for core from 139.178.89.65 port 45540 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:17:04.940741 sshd[2211]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:04.943036 systemd-logind[2094]: New session 6 of user core. Apr 12 21:17:04.943969 systemd[1]: Started session-6.scope. Apr 12 21:17:05.278285 sshd[2211]: pam_unix(sshd:session): session closed for user core Apr 12 21:17:05.280930 systemd[1]: sshd@3-147.75.62.222:22-139.178.89.65:45540.service: Deactivated successfully. Apr 12 21:17:05.281602 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 21:17:05.282054 systemd-logind[2094]: Session 6 logged out. Waiting for processes to exit. Apr 12 21:17:05.282588 systemd-logind[2094]: Removed session 6. Apr 12 21:17:05.353846 systemd[1]: Started sshd@4-147.75.62.222:22-139.178.89.65:45552.service. Apr 12 21:17:05.833299 sshd[2217]: Accepted publickey for core from 139.178.89.65 port 45552 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:17:05.834394 sshd[2217]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:05.836651 systemd-logind[2094]: New session 7 of user core. Apr 12 21:17:05.837602 systemd[1]: Started session-7.scope. Apr 12 21:17:06.105402 sudo[2220]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 21:17:06.105590 sudo[2220]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 21:17:06.115207 dbus-daemon[2066]: avc: received setenforce notice (enforcing=1) Apr 12 21:17:06.116996 sudo[2220]: pam_unix(sudo:session): session closed for user root Apr 12 21:17:06.191289 sshd[2217]: pam_unix(sshd:session): session closed for user core Apr 12 21:17:06.194310 systemd[1]: sshd@4-147.75.62.222:22-139.178.89.65:45552.service: Deactivated successfully. Apr 12 21:17:06.195096 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 21:17:06.195604 systemd-logind[2094]: Session 7 logged out. Waiting for processes to exit. Apr 12 21:17:06.196245 systemd-logind[2094]: Removed session 7. Apr 12 21:17:06.267835 systemd[1]: Started sshd@5-147.75.62.222:22-139.178.89.65:45556.service. Apr 12 21:17:06.739708 sshd[2224]: Accepted publickey for core from 139.178.89.65 port 45556 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:17:06.740839 sshd[2224]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:06.743153 systemd-logind[2094]: New session 8 of user core. Apr 12 21:17:06.744089 systemd[1]: Started session-8.scope. Apr 12 21:17:07.003048 sudo[2228]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 21:17:07.003250 sudo[2228]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 21:17:07.005336 sudo[2228]: pam_unix(sudo:session): session closed for user root Apr 12 21:17:07.009390 sudo[2227]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 21:17:07.009573 sudo[2227]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 21:17:07.016488 systemd[1]: Stopping audit-rules.service... Apr 12 21:17:07.017000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 21:17:07.017719 auditctl[2231]: No rules Apr 12 21:17:07.017894 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 21:17:07.018045 systemd[1]: Stopped audit-rules.service. Apr 12 21:17:07.019582 systemd[1]: Starting audit-rules.service... Apr 12 21:17:07.023002 kernel: kauditd_printk_skb: 355 callbacks suppressed Apr 12 21:17:07.023166 kernel: audit: type=1305 audit(1712956627.017:165): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 21:17:07.034873 augenrules[2248]: No rules Apr 12 21:17:07.035412 systemd[1]: Finished audit-rules.service. Apr 12 21:17:07.036066 sudo[2227]: pam_unix(sudo:session): session closed for user root Apr 12 21:17:07.017000 audit[2231]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd9e46140 a2=420 a3=0 items=0 ppid=1 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:07.068565 kernel: audit: type=1300 audit(1712956627.017:165): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd9e46140 a2=420 a3=0 items=0 ppid=1 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:07.068786 kernel: audit: type=1327 audit(1712956627.017:165): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 21:17:07.017000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 21:17:07.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:07.099834 kernel: audit: type=1131 audit(1712956627.018:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:07.099878 kernel: audit: type=1130 audit(1712956627.035:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:07.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:07.108705 sshd[2224]: pam_unix(sshd:session): session closed for user core Apr 12 21:17:07.110756 systemd[1]: sshd@5-147.75.62.222:22-139.178.89.65:45556.service: Deactivated successfully. Apr 12 21:17:07.111380 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 21:17:07.111794 systemd-logind[2094]: Session 8 logged out. Waiting for processes to exit. Apr 12 21:17:07.112397 systemd-logind[2094]: Removed session 8. Apr 12 21:17:07.036000 audit[2227]: USER_END pid=2227 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:17:07.147415 kernel: audit: type=1106 audit(1712956627.036:168): pid=2227 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:17:07.147491 kernel: audit: type=1104 audit(1712956627.036:169): pid=2227 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:17:07.036000 audit[2227]: CRED_DISP pid=2227 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:17:07.109000 audit[2224]: USER_END pid=2224 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:07.185368 systemd[1]: Started sshd@6-147.75.62.222:22-139.178.89.65:45562.service. Apr 12 21:17:07.217138 kernel: audit: type=1106 audit(1712956627.109:170): pid=2224 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:07.217206 kernel: audit: type=1104 audit(1712956627.109:171): pid=2224 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:07.109000 audit[2224]: CRED_DISP pid=2224 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:07.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-147.75.62.222:22-139.178.89.65:45556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:07.301816 kernel: audit: type=1131 audit(1712956627.110:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-147.75.62.222:22-139.178.89.65:45556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:07.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.75.62.222:22-139.178.89.65:45562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:07.652000 audit[2254]: USER_ACCT pid=2254 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:07.652805 sshd[2254]: Accepted publickey for core from 139.178.89.65 port 45562 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 21:17:07.653000 audit[2254]: CRED_ACQ pid=2254 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:07.653000 audit[2254]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc575a30 a2=3 a3=1 items=0 ppid=1 pid=2254 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:07.653000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 21:17:07.653576 sshd[2254]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 21:17:07.655853 systemd-logind[2094]: New session 9 of user core. Apr 12 21:17:07.656797 systemd[1]: Started session-9.scope. Apr 12 21:17:07.659000 audit[2254]: USER_START pid=2254 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:07.660000 audit[2256]: CRED_ACQ pid=2256 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:07.912000 audit[2257]: USER_ACCT pid=2257 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:17:07.912445 sudo[2257]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 21:17:07.912000 audit[2257]: CRED_REFR pid=2257 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:17:07.912641 sudo[2257]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 21:17:07.913000 audit[2257]: USER_START pid=2257 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:17:08.528769 systemd[1]: Reloading. Apr 12 21:17:08.557340 /usr/lib/systemd/system-generators/torcx-generator[2289]: time="2024-04-12T21:17:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 21:17:08.557363 /usr/lib/systemd/system-generators/torcx-generator[2289]: time="2024-04-12T21:17:08Z" level=info msg="torcx already run" Apr 12 21:17:08.625830 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 21:17:08.625842 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 21:17:08.640320 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 21:17:08.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.700000 audit: BPF prog-id=34 op=LOAD Apr 12 21:17:08.700000 audit: BPF prog-id=23 op=UNLOAD Apr 12 21:17:08.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.700000 audit: BPF prog-id=35 op=LOAD Apr 12 21:17:08.700000 audit: BPF prog-id=18 op=UNLOAD Apr 12 21:17:08.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.701000 audit: BPF prog-id=36 op=LOAD Apr 12 21:17:08.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.701000 audit: BPF prog-id=37 op=LOAD Apr 12 21:17:08.701000 audit: BPF prog-id=19 op=UNLOAD Apr 12 21:17:08.701000 audit: BPF prog-id=20 op=UNLOAD Apr 12 21:17:08.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.702000 audit: BPF prog-id=38 op=LOAD Apr 12 21:17:08.702000 audit: BPF prog-id=27 op=UNLOAD Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit: BPF prog-id=39 op=LOAD Apr 12 21:17:08.703000 audit: BPF prog-id=24 op=UNLOAD Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit: BPF prog-id=40 op=LOAD Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.703000 audit: BPF prog-id=41 op=LOAD Apr 12 21:17:08.703000 audit: BPF prog-id=25 op=UNLOAD Apr 12 21:17:08.703000 audit: BPF prog-id=26 op=UNLOAD Apr 12 21:17:08.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.705000 audit: BPF prog-id=42 op=LOAD Apr 12 21:17:08.705000 audit: BPF prog-id=32 op=UNLOAD Apr 12 21:17:08.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.706000 audit: BPF prog-id=43 op=LOAD Apr 12 21:17:08.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.706000 audit: BPF prog-id=44 op=LOAD Apr 12 21:17:08.706000 audit: BPF prog-id=21 op=UNLOAD Apr 12 21:17:08.706000 audit: BPF prog-id=22 op=UNLOAD Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit: BPF prog-id=45 op=LOAD Apr 12 21:17:08.708000 audit: BPF prog-id=29 op=UNLOAD Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit: BPF prog-id=46 op=LOAD Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.708000 audit: BPF prog-id=47 op=LOAD Apr 12 21:17:08.709000 audit: BPF prog-id=30 op=UNLOAD Apr 12 21:17:08.709000 audit: BPF prog-id=31 op=UNLOAD Apr 12 21:17:08.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:08.709000 audit: BPF prog-id=48 op=LOAD Apr 12 21:17:08.709000 audit: BPF prog-id=28 op=UNLOAD Apr 12 21:17:08.715619 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 21:17:08.721397 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 21:17:08.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:08.721922 systemd[1]: Reached target network-online.target. Apr 12 21:17:08.723425 systemd[1]: Started kubelet.service. Apr 12 21:17:08.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:08.789304 kubelet[2344]: E0412 21:17:08.789217 2344 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 21:17:08.791172 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 21:17:08.791289 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 21:17:08.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 21:17:08.955277 systemd[1]: Stopped kubelet.service. Apr 12 21:17:08.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:08.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:08.967709 systemd[1]: Reloading. Apr 12 21:17:09.010636 /usr/lib/systemd/system-generators/torcx-generator[2464]: time="2024-04-12T21:17:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 21:17:09.010659 /usr/lib/systemd/system-generators/torcx-generator[2464]: time="2024-04-12T21:17:09Z" level=info msg="torcx already run" Apr 12 21:17:09.079042 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 21:17:09.079054 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 21:17:09.093456 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 21:17:09.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.153000 audit: BPF prog-id=49 op=LOAD Apr 12 21:17:09.153000 audit: BPF prog-id=34 op=UNLOAD Apr 12 21:17:09.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.154000 audit: BPF prog-id=50 op=LOAD Apr 12 21:17:09.154000 audit: BPF prog-id=35 op=UNLOAD Apr 12 21:17:09.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.154000 audit: BPF prog-id=51 op=LOAD Apr 12 21:17:09.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.154000 audit: BPF prog-id=52 op=LOAD Apr 12 21:17:09.154000 audit: BPF prog-id=36 op=UNLOAD Apr 12 21:17:09.154000 audit: BPF prog-id=37 op=UNLOAD Apr 12 21:17:09.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.155000 audit: BPF prog-id=53 op=LOAD Apr 12 21:17:09.155000 audit: BPF prog-id=38 op=UNLOAD Apr 12 21:17:09.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.156000 audit: BPF prog-id=54 op=LOAD Apr 12 21:17:09.156000 audit: BPF prog-id=39 op=UNLOAD Apr 12 21:17:09.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.157000 audit: BPF prog-id=55 op=LOAD Apr 12 21:17:09.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.157000 audit: BPF prog-id=56 op=LOAD Apr 12 21:17:09.157000 audit: BPF prog-id=40 op=UNLOAD Apr 12 21:17:09.157000 audit: BPF prog-id=41 op=UNLOAD Apr 12 21:17:09.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.158000 audit: BPF prog-id=57 op=LOAD Apr 12 21:17:09.158000 audit: BPF prog-id=42 op=UNLOAD Apr 12 21:17:09.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.159000 audit: BPF prog-id=58 op=LOAD Apr 12 21:17:09.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.159000 audit: BPF prog-id=59 op=LOAD Apr 12 21:17:09.159000 audit: BPF prog-id=43 op=UNLOAD Apr 12 21:17:09.159000 audit: BPF prog-id=44 op=UNLOAD Apr 12 21:17:09.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.161000 audit: BPF prog-id=60 op=LOAD Apr 12 21:17:09.161000 audit: BPF prog-id=45 op=UNLOAD Apr 12 21:17:09.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.162000 audit: BPF prog-id=61 op=LOAD Apr 12 21:17:09.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.162000 audit: BPF prog-id=62 op=LOAD Apr 12 21:17:09.162000 audit: BPF prog-id=46 op=UNLOAD Apr 12 21:17:09.162000 audit: BPF prog-id=47 op=UNLOAD Apr 12 21:17:09.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.162000 audit: BPF prog-id=63 op=LOAD Apr 12 21:17:09.162000 audit: BPF prog-id=48 op=UNLOAD Apr 12 21:17:09.172497 systemd[1]: Started kubelet.service. Apr 12 21:17:09.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:09.208361 kubelet[2519]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 21:17:09.208361 kubelet[2519]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 21:17:09.208361 kubelet[2519]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 21:17:09.208626 kubelet[2519]: I0412 21:17:09.208406 2519 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 21:17:09.900250 kubelet[2519]: I0412 21:17:09.900227 2519 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 21:17:09.900250 kubelet[2519]: I0412 21:17:09.900251 2519 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 21:17:09.900435 kubelet[2519]: I0412 21:17:09.900427 2519 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 21:17:09.904495 kubelet[2519]: I0412 21:17:09.904477 2519 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 21:17:09.914421 kubelet[2519]: W0412 21:17:09.914408 2519 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 21:17:09.921362 kubelet[2519]: I0412 21:17:09.921349 2519 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 21:17:09.921558 kubelet[2519]: I0412 21:17:09.921549 2519 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 21:17:09.921698 kubelet[2519]: I0412 21:17:09.921686 2519 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 21:17:09.921766 kubelet[2519]: I0412 21:17:09.921707 2519 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 21:17:09.921766 kubelet[2519]: I0412 21:17:09.921716 2519 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 21:17:09.921822 kubelet[2519]: I0412 21:17:09.921814 2519 state_mem.go:36] "Initialized new in-memory state store" Apr 12 21:17:09.922029 kubelet[2519]: I0412 21:17:09.922022 2519 kubelet.go:393] "Attempting to sync node with API server" Apr 12 21:17:09.922054 kubelet[2519]: I0412 21:17:09.922042 2519 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 21:17:09.922075 kubelet[2519]: I0412 21:17:09.922057 2519 kubelet.go:309] "Adding apiserver pod source" Apr 12 21:17:09.922102 kubelet[2519]: I0412 21:17:09.922074 2519 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 21:17:09.922102 kubelet[2519]: E0412 21:17:09.922088 2519 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:09.922140 kubelet[2519]: E0412 21:17:09.922128 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:09.922819 kubelet[2519]: I0412 21:17:09.922807 2519 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 21:17:09.923188 kubelet[2519]: W0412 21:17:09.923178 2519 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 21:17:09.923847 kubelet[2519]: I0412 21:17:09.923838 2519 server.go:1232] "Started kubelet" Apr 12 21:17:09.923889 kubelet[2519]: I0412 21:17:09.923882 2519 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 21:17:09.923933 kubelet[2519]: I0412 21:17:09.923923 2519 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 21:17:09.924919 kubelet[2519]: E0412 21:17:09.924899 2519 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 21:17:09.924941 kubelet[2519]: E0412 21:17:09.924931 2519 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 21:17:09.925021 kubelet[2519]: I0412 21:17:09.925006 2519 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 21:17:09.926000 audit[2519]: AVC avc: denied { mac_admin } for pid=2519 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.926000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 21:17:09.926000 audit[2519]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400158ad80 a1=4000079ce0 a2=400158ac30 a3=25 items=0 ppid=1 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:09.926000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 21:17:09.926000 audit[2519]: AVC avc: denied { mac_admin } for pid=2519 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.926000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 21:17:09.926000 audit[2519]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000878ec0 a1=4000079cf8 a2=400158ae10 a3=25 items=0 ppid=1 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:09.926000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 21:17:09.926418 kubelet[2519]: I0412 21:17:09.926186 2519 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 21:17:09.926418 kubelet[2519]: I0412 21:17:09.926217 2519 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 21:17:09.926418 kubelet[2519]: I0412 21:17:09.926271 2519 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 21:17:09.926418 kubelet[2519]: I0412 21:17:09.926353 2519 server.go:462] "Adding debug handlers to kubelet server" Apr 12 21:17:09.926418 kubelet[2519]: I0412 21:17:09.926397 2519 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 21:17:09.926517 kubelet[2519]: E0412 21:17:09.926452 2519 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.26.37.129\" not found" Apr 12 21:17:09.926517 kubelet[2519]: I0412 21:17:09.926488 2519 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 21:17:09.926561 kubelet[2519]: I0412 21:17:09.926528 2519 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 21:17:09.931279 kubelet[2519]: E0412 21:17:09.931265 2519 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.26.37.129\" not found" node="10.26.37.129" Apr 12 21:17:09.946203 kubelet[2519]: I0412 21:17:09.946086 2519 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 21:17:09.946203 kubelet[2519]: I0412 21:17:09.946103 2519 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 21:17:09.946203 kubelet[2519]: I0412 21:17:09.946119 2519 state_mem.go:36] "Initialized new in-memory state store" Apr 12 21:17:09.946767 kubelet[2519]: I0412 21:17:09.946755 2519 policy_none.go:49] "None policy: Start" Apr 12 21:17:09.947111 kubelet[2519]: I0412 21:17:09.947099 2519 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 21:17:09.947134 kubelet[2519]: I0412 21:17:09.947120 2519 state_mem.go:35] "Initializing new in-memory state store" Apr 12 21:17:09.948000 audit[2549]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2549 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:09.948000 audit[2549]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd2c82980 a2=0 a3=1 items=0 ppid=2519 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:09.948000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 21:17:09.949000 audit[2552]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2552 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:09.949000 audit[2552]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=fffffa0c5150 a2=0 a3=1 items=0 ppid=2519 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:09.949000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 21:17:09.952026 systemd[1]: Created slice kubepods.slice. Apr 12 21:17:09.955360 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 21:17:09.957641 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 21:17:09.977591 kubelet[2519]: I0412 21:17:09.977570 2519 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 21:17:09.977000 audit[2519]: AVC avc: denied { mac_admin } for pid=2519 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:09.977000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 21:17:09.977000 audit[2519]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4001842270 a1=40018b8120 a2=4001842240 a3=25 items=0 ppid=1 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:09.977000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 21:17:09.977778 kubelet[2519]: I0412 21:17:09.977638 2519 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 21:17:09.977829 kubelet[2519]: I0412 21:17:09.977818 2519 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 21:17:09.978117 kubelet[2519]: E0412 21:17:09.978105 2519 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.26.37.129\" not found" Apr 12 21:17:09.951000 audit[2555]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2555 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:09.951000 audit[2555]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd5086940 a2=0 a3=1 items=0 ppid=2519 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:09.951000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 21:17:09.981000 audit[2560]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2560 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:09.981000 audit[2560]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc42d4420 a2=0 a3=1 items=0 ppid=2519 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:09.981000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 21:17:10.014000 audit[2568]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2568 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:10.014000 audit[2568]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd0431820 a2=0 a3=1 items=0 ppid=2519 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:10.014000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 21:17:10.015151 kubelet[2519]: I0412 21:17:10.015135 2519 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 21:17:10.015000 audit[2569]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2569 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:10.015000 audit[2569]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcdfe1c30 a2=0 a3=1 items=0 ppid=2519 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:10.015000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 21:17:10.015974 kubelet[2519]: I0412 21:17:10.015966 2519 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 21:17:10.016000 kubelet[2519]: I0412 21:17:10.015987 2519 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 21:17:10.016021 kubelet[2519]: I0412 21:17:10.016003 2519 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 21:17:10.016050 kubelet[2519]: E0412 21:17:10.016043 2519 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Apr 12 21:17:10.016000 audit[2570]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2570 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:10.016000 audit[2570]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdcca87d0 a2=0 a3=1 items=0 ppid=2519 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:10.016000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 21:17:10.016000 audit[2571]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=2571 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:10.016000 audit[2571]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc9942bd0 a2=0 a3=1 items=0 ppid=2519 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:10.016000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 21:17:10.016000 audit[2572]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=2572 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:10.016000 audit[2572]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd4708840 a2=0 a3=1 items=0 ppid=2519 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:10.016000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 21:17:10.017000 audit[2573]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=2573 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:10.017000 audit[2573]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffde85add0 a2=0 a3=1 items=0 ppid=2519 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:10.017000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 21:17:10.017000 audit[2574]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=2574 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:10.017000 audit[2574]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc5d7bf60 a2=0 a3=1 items=0 ppid=2519 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:10.017000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 21:17:10.018000 audit[2575]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2575 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:10.018000 audit[2575]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcea5c340 a2=0 a3=1 items=0 ppid=2519 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:10.018000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 21:17:10.027086 kubelet[2519]: I0412 21:17:10.027072 2519 kubelet_node_status.go:70] "Attempting to register node" node="10.26.37.129" Apr 12 21:17:10.029455 kubelet[2519]: I0412 21:17:10.029442 2519 kubelet_node_status.go:73] "Successfully registered node" node="10.26.37.129" Apr 12 21:17:10.034299 kubelet[2519]: I0412 21:17:10.034283 2519 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Apr 12 21:17:10.034551 env[2103]: time="2024-04-12T21:17:10.034516000Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 21:17:10.034758 kubelet[2519]: I0412 21:17:10.034667 2519 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Apr 12 21:17:10.692387 sudo[2257]: pam_unix(sudo:session): session closed for user root Apr 12 21:17:10.692000 audit[2257]: USER_END pid=2257 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:17:10.692000 audit[2257]: CRED_DISP pid=2257 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 21:17:10.766383 sshd[2254]: pam_unix(sshd:session): session closed for user core Apr 12 21:17:10.767000 audit[2254]: USER_END pid=2254 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:10.767000 audit[2254]: CRED_DISP pid=2254 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 21:17:10.768926 systemd[1]: sshd@6-147.75.62.222:22-139.178.89.65:45562.service: Deactivated successfully. Apr 12 21:17:10.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.75.62.222:22-139.178.89.65:45562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 21:17:10.769624 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 21:17:10.770107 systemd-logind[2094]: Session 9 logged out. Waiting for processes to exit. Apr 12 21:17:10.770591 systemd-logind[2094]: Removed session 9. Apr 12 21:17:10.901738 kubelet[2519]: I0412 21:17:10.901672 2519 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Apr 12 21:17:10.902265 kubelet[2519]: W0412 21:17:10.901986 2519 reflector.go:458] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.CSIDriver ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:150: Unexpected watch close - watch lasted less than a second and no items received Apr 12 21:17:10.902265 kubelet[2519]: W0412 21:17:10.902068 2519 reflector.go:458] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:150: Unexpected watch close - watch lasted less than a second and no items received Apr 12 21:17:10.902265 kubelet[2519]: W0412 21:17:10.902058 2519 reflector.go:458] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.Service ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:150: Unexpected watch close - watch lasted less than a second and no items received Apr 12 21:17:10.922349 kubelet[2519]: E0412 21:17:10.922319 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:10.922349 kubelet[2519]: I0412 21:17:10.922341 2519 apiserver.go:52] "Watching apiserver" Apr 12 21:17:10.924395 kubelet[2519]: I0412 21:17:10.924380 2519 topology_manager.go:215] "Topology Admit Handler" podUID="2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5" podNamespace="calico-system" podName="calico-node-5rr5s" Apr 12 21:17:10.924485 kubelet[2519]: I0412 21:17:10.924477 2519 topology_manager.go:215] "Topology Admit Handler" podUID="e30db219-8f66-413d-8015-bd3fe6999f3e" podNamespace="calico-system" podName="csi-node-driver-qszbs" Apr 12 21:17:10.924526 kubelet[2519]: I0412 21:17:10.924518 2519 topology_manager.go:215] "Topology Admit Handler" podUID="58765c20-aadd-4923-bbe9-69b32169c416" podNamespace="kube-system" podName="kube-proxy-vxpzh" Apr 12 21:17:10.924731 kubelet[2519]: E0412 21:17:10.924715 2519 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qszbs" podUID="e30db219-8f66-413d-8015-bd3fe6999f3e" Apr 12 21:17:10.926891 kubelet[2519]: I0412 21:17:10.926877 2519 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 21:17:10.928005 systemd[1]: Created slice kubepods-besteffort-pod2b0afe7a_ca03_44dc_a3e2_e1d7f87753b5.slice. Apr 12 21:17:10.931667 kubelet[2519]: I0412 21:17:10.931652 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5-lib-modules\") pod \"calico-node-5rr5s\" (UID: \"2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5\") " pod="calico-system/calico-node-5rr5s" Apr 12 21:17:10.931697 kubelet[2519]: I0412 21:17:10.931685 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5-cni-net-dir\") pod \"calico-node-5rr5s\" (UID: \"2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5\") " pod="calico-system/calico-node-5rr5s" Apr 12 21:17:10.931719 kubelet[2519]: I0412 21:17:10.931709 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e30db219-8f66-413d-8015-bd3fe6999f3e-registration-dir\") pod \"csi-node-driver-qszbs\" (UID: \"e30db219-8f66-413d-8015-bd3fe6999f3e\") " pod="calico-system/csi-node-driver-qszbs" Apr 12 21:17:10.931778 kubelet[2519]: I0412 21:17:10.931760 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/58765c20-aadd-4923-bbe9-69b32169c416-lib-modules\") pod \"kube-proxy-vxpzh\" (UID: \"58765c20-aadd-4923-bbe9-69b32169c416\") " pod="kube-system/kube-proxy-vxpzh" Apr 12 21:17:10.931808 kubelet[2519]: I0412 21:17:10.931801 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w6kqr\" (UniqueName: \"kubernetes.io/projected/58765c20-aadd-4923-bbe9-69b32169c416-kube-api-access-w6kqr\") pod \"kube-proxy-vxpzh\" (UID: \"58765c20-aadd-4923-bbe9-69b32169c416\") " pod="kube-system/kube-proxy-vxpzh" Apr 12 21:17:10.931881 kubelet[2519]: I0412 21:17:10.931860 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5-policysync\") pod \"calico-node-5rr5s\" (UID: \"2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5\") " pod="calico-system/calico-node-5rr5s" Apr 12 21:17:10.931912 kubelet[2519]: I0412 21:17:10.931905 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e30db219-8f66-413d-8015-bd3fe6999f3e-varrun\") pod \"csi-node-driver-qszbs\" (UID: \"e30db219-8f66-413d-8015-bd3fe6999f3e\") " pod="calico-system/csi-node-driver-qszbs" Apr 12 21:17:10.931943 kubelet[2519]: I0412 21:17:10.931936 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/58765c20-aadd-4923-bbe9-69b32169c416-xtables-lock\") pod \"kube-proxy-vxpzh\" (UID: \"58765c20-aadd-4923-bbe9-69b32169c416\") " pod="kube-system/kube-proxy-vxpzh" Apr 12 21:17:10.931975 kubelet[2519]: I0412 21:17:10.931969 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5-xtables-lock\") pod \"calico-node-5rr5s\" (UID: \"2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5\") " pod="calico-system/calico-node-5rr5s" Apr 12 21:17:10.932000 kubelet[2519]: I0412 21:17:10.931997 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5-tigera-ca-bundle\") pod \"calico-node-5rr5s\" (UID: \"2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5\") " pod="calico-system/calico-node-5rr5s" Apr 12 21:17:10.932022 kubelet[2519]: I0412 21:17:10.932016 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8fvpc\" (UniqueName: \"kubernetes.io/projected/2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5-kube-api-access-8fvpc\") pod \"calico-node-5rr5s\" (UID: \"2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5\") " pod="calico-system/calico-node-5rr5s" Apr 12 21:17:10.932053 kubelet[2519]: I0412 21:17:10.932045 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e30db219-8f66-413d-8015-bd3fe6999f3e-socket-dir\") pod \"csi-node-driver-qszbs\" (UID: \"e30db219-8f66-413d-8015-bd3fe6999f3e\") " pod="calico-system/csi-node-driver-qszbs" Apr 12 21:17:10.932107 kubelet[2519]: I0412 21:17:10.932092 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bq4mw\" (UniqueName: \"kubernetes.io/projected/e30db219-8f66-413d-8015-bd3fe6999f3e-kube-api-access-bq4mw\") pod \"csi-node-driver-qszbs\" (UID: \"e30db219-8f66-413d-8015-bd3fe6999f3e\") " pod="calico-system/csi-node-driver-qszbs" Apr 12 21:17:10.932129 kubelet[2519]: I0412 21:17:10.932124 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/58765c20-aadd-4923-bbe9-69b32169c416-kube-proxy\") pod \"kube-proxy-vxpzh\" (UID: \"58765c20-aadd-4923-bbe9-69b32169c416\") " pod="kube-system/kube-proxy-vxpzh" Apr 12 21:17:10.932161 kubelet[2519]: I0412 21:17:10.932154 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e30db219-8f66-413d-8015-bd3fe6999f3e-kubelet-dir\") pod \"csi-node-driver-qszbs\" (UID: \"e30db219-8f66-413d-8015-bd3fe6999f3e\") " pod="calico-system/csi-node-driver-qszbs" Apr 12 21:17:10.932198 kubelet[2519]: I0412 21:17:10.932191 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5-node-certs\") pod \"calico-node-5rr5s\" (UID: \"2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5\") " pod="calico-system/calico-node-5rr5s" Apr 12 21:17:10.932220 kubelet[2519]: I0412 21:17:10.932213 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5-var-run-calico\") pod \"calico-node-5rr5s\" (UID: \"2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5\") " pod="calico-system/calico-node-5rr5s" Apr 12 21:17:10.932241 kubelet[2519]: I0412 21:17:10.932232 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5-var-lib-calico\") pod \"calico-node-5rr5s\" (UID: \"2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5\") " pod="calico-system/calico-node-5rr5s" Apr 12 21:17:10.932265 kubelet[2519]: I0412 21:17:10.932261 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5-cni-bin-dir\") pod \"calico-node-5rr5s\" (UID: \"2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5\") " pod="calico-system/calico-node-5rr5s" Apr 12 21:17:10.932298 kubelet[2519]: I0412 21:17:10.932291 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5-cni-log-dir\") pod \"calico-node-5rr5s\" (UID: \"2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5\") " pod="calico-system/calico-node-5rr5s" Apr 12 21:17:10.932323 kubelet[2519]: I0412 21:17:10.932316 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5-flexvol-driver-host\") pod \"calico-node-5rr5s\" (UID: \"2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5\") " pod="calico-system/calico-node-5rr5s" Apr 12 21:17:10.942620 systemd[1]: Created slice kubepods-besteffort-pod58765c20_aadd_4923_bbe9_69b32169c416.slice. Apr 12 21:17:11.036021 kubelet[2519]: E0412 21:17:11.035999 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.036062 kubelet[2519]: W0412 21:17:11.036020 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.036062 kubelet[2519]: E0412 21:17:11.036051 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.036285 kubelet[2519]: E0412 21:17:11.036276 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.036308 kubelet[2519]: W0412 21:17:11.036286 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.036308 kubelet[2519]: E0412 21:17:11.036301 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.036490 kubelet[2519]: E0412 21:17:11.036481 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.036511 kubelet[2519]: W0412 21:17:11.036490 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.036543 kubelet[2519]: E0412 21:17:11.036522 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.036685 kubelet[2519]: E0412 21:17:11.036677 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.036707 kubelet[2519]: W0412 21:17:11.036685 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.036740 kubelet[2519]: E0412 21:17:11.036719 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.036858 kubelet[2519]: E0412 21:17:11.036851 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.036880 kubelet[2519]: W0412 21:17:11.036859 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.036880 kubelet[2519]: E0412 21:17:11.036872 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.037074 kubelet[2519]: E0412 21:17:11.037066 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.037095 kubelet[2519]: W0412 21:17:11.037075 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.037095 kubelet[2519]: E0412 21:17:11.037087 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.037290 kubelet[2519]: E0412 21:17:11.037275 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.037312 kubelet[2519]: W0412 21:17:11.037292 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.037333 kubelet[2519]: E0412 21:17:11.037313 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.037501 kubelet[2519]: E0412 21:17:11.037492 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.037522 kubelet[2519]: W0412 21:17:11.037501 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.037522 kubelet[2519]: E0412 21:17:11.037514 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.037699 kubelet[2519]: E0412 21:17:11.037691 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.037720 kubelet[2519]: W0412 21:17:11.037698 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.037741 kubelet[2519]: E0412 21:17:11.037720 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.037881 kubelet[2519]: E0412 21:17:11.037873 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.037909 kubelet[2519]: W0412 21:17:11.037881 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.037909 kubelet[2519]: E0412 21:17:11.037902 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.038059 kubelet[2519]: E0412 21:17:11.038051 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.038082 kubelet[2519]: W0412 21:17:11.038059 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.038082 kubelet[2519]: E0412 21:17:11.038079 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.038225 kubelet[2519]: E0412 21:17:11.038217 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.038251 kubelet[2519]: W0412 21:17:11.038225 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.038273 kubelet[2519]: E0412 21:17:11.038250 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.038413 kubelet[2519]: E0412 21:17:11.038405 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.038434 kubelet[2519]: W0412 21:17:11.038412 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.038434 kubelet[2519]: E0412 21:17:11.038426 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.038606 kubelet[2519]: E0412 21:17:11.038598 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.038630 kubelet[2519]: W0412 21:17:11.038606 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.038630 kubelet[2519]: E0412 21:17:11.038618 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.038787 kubelet[2519]: E0412 21:17:11.038779 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.038809 kubelet[2519]: W0412 21:17:11.038787 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.038809 kubelet[2519]: E0412 21:17:11.038805 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.039009 kubelet[2519]: E0412 21:17:11.039000 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.039033 kubelet[2519]: W0412 21:17:11.039009 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.039033 kubelet[2519]: E0412 21:17:11.039022 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.039239 kubelet[2519]: E0412 21:17:11.039227 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.039263 kubelet[2519]: W0412 21:17:11.039241 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.039263 kubelet[2519]: E0412 21:17:11.039258 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.039430 kubelet[2519]: E0412 21:17:11.039422 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.039455 kubelet[2519]: W0412 21:17:11.039430 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.039476 kubelet[2519]: E0412 21:17:11.039458 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.039647 kubelet[2519]: E0412 21:17:11.039640 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.039672 kubelet[2519]: W0412 21:17:11.039647 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.039693 kubelet[2519]: E0412 21:17:11.039683 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.039816 kubelet[2519]: E0412 21:17:11.039808 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.039883 kubelet[2519]: W0412 21:17:11.039816 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.039883 kubelet[2519]: E0412 21:17:11.039853 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.039989 kubelet[2519]: E0412 21:17:11.039982 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.039989 kubelet[2519]: W0412 21:17:11.039989 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.040030 kubelet[2519]: E0412 21:17:11.040003 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.040208 kubelet[2519]: E0412 21:17:11.040200 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.040237 kubelet[2519]: W0412 21:17:11.040209 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.040237 kubelet[2519]: E0412 21:17:11.040222 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.040492 kubelet[2519]: E0412 21:17:11.040480 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.040515 kubelet[2519]: W0412 21:17:11.040494 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.040515 kubelet[2519]: E0412 21:17:11.040510 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.040714 kubelet[2519]: E0412 21:17:11.040706 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.040739 kubelet[2519]: W0412 21:17:11.040715 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.040739 kubelet[2519]: E0412 21:17:11.040725 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.042550 kubelet[2519]: E0412 21:17:11.042537 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.042573 kubelet[2519]: W0412 21:17:11.042552 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.042573 kubelet[2519]: E0412 21:17:11.042570 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.044227 kubelet[2519]: E0412 21:17:11.044213 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.044250 kubelet[2519]: W0412 21:17:11.044228 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.044250 kubelet[2519]: E0412 21:17:11.044244 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.049377 kubelet[2519]: E0412 21:17:11.049364 2519 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 21:17:11.049404 kubelet[2519]: W0412 21:17:11.049377 2519 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 21:17:11.049404 kubelet[2519]: E0412 21:17:11.049393 2519 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 21:17:11.241971 env[2103]: time="2024-04-12T21:17:11.241899480Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5rr5s,Uid:2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5,Namespace:calico-system,Attempt:0,}" Apr 12 21:17:11.245447 env[2103]: time="2024-04-12T21:17:11.245415600Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vxpzh,Uid:58765c20-aadd-4923-bbe9-69b32169c416,Namespace:kube-system,Attempt:0,}" Apr 12 21:17:11.545388 env[2103]: time="2024-04-12T21:17:11.545299920Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:11.546239 env[2103]: time="2024-04-12T21:17:11.546215240Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:11.547549 env[2103]: time="2024-04-12T21:17:11.547524520Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:11.549395 env[2103]: time="2024-04-12T21:17:11.549380400Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:11.550006 env[2103]: time="2024-04-12T21:17:11.549983960Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:11.552251 env[2103]: time="2024-04-12T21:17:11.552234680Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:11.553431 env[2103]: time="2024-04-12T21:17:11.553411840Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:11.555475 env[2103]: time="2024-04-12T21:17:11.555457520Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:11.566178 env[2103]: time="2024-04-12T21:17:11.566134120Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:17:11.566208 env[2103]: time="2024-04-12T21:17:11.566172480Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:17:11.566208 env[2103]: time="2024-04-12T21:17:11.566182720Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:17:11.566392 env[2103]: time="2024-04-12T21:17:11.566362680Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a081680775a956c4a6f4485d100d373d6c1fe57fcb052fb8a25bd895b2cd9f4b pid=2643 runtime=io.containerd.runc.v2 Apr 12 21:17:11.567138 env[2103]: time="2024-04-12T21:17:11.567101280Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:17:11.567159 env[2103]: time="2024-04-12T21:17:11.567135640Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:17:11.567159 env[2103]: time="2024-04-12T21:17:11.567146320Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:17:11.567271 env[2103]: time="2024-04-12T21:17:11.567253520Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fe2ebf90ee90560e945da2532f9b0184d7829b3c6f305cd9ffa934c149c4d005 pid=2648 runtime=io.containerd.runc.v2 Apr 12 21:17:11.580660 systemd[1]: Started cri-containerd-a081680775a956c4a6f4485d100d373d6c1fe57fcb052fb8a25bd895b2cd9f4b.scope. Apr 12 21:17:11.581927 systemd[1]: Started cri-containerd-fe2ebf90ee90560e945da2532f9b0184d7829b3c6f305cd9ffa934c149c4d005.scope. Apr 12 21:17:11.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.596000 audit: BPF prog-id=64 op=LOAD Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2648 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:11.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665326562663930656539303536306539343564613235333266396230 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2648 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:11.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665326562663930656539303536306539343564613235333266396230 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit: BPF prog-id=65 op=LOAD Apr 12 21:17:11.597000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2648 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:11.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665326562663930656539303536306539343564613235333266396230 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit: BPF prog-id=66 op=LOAD Apr 12 21:17:11.597000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2648 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:11.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665326562663930656539303536306539343564613235333266396230 Apr 12 21:17:11.597000 audit: BPF prog-id=66 op=UNLOAD Apr 12 21:17:11.597000 audit: BPF prog-id=65 op=UNLOAD Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit: BPF prog-id=67 op=LOAD Apr 12 21:17:11.597000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2648 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:11.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665326562663930656539303536306539343564613235333266396230 Apr 12 21:17:11.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.597000 audit: BPF prog-id=68 op=LOAD Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2643 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:11.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130383136383037373561393536633461366634343835643130306433 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2643 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:11.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130383136383037373561393536633461366634343835643130306433 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit: BPF prog-id=69 op=LOAD Apr 12 21:17:11.598000 audit[2661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2643 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:11.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130383136383037373561393536633461366634343835643130306433 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit: BPF prog-id=70 op=LOAD Apr 12 21:17:11.598000 audit[2661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2643 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:11.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130383136383037373561393536633461366634343835643130306433 Apr 12 21:17:11.598000 audit: BPF prog-id=70 op=UNLOAD Apr 12 21:17:11.598000 audit: BPF prog-id=69 op=UNLOAD Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:11.598000 audit: BPF prog-id=71 op=LOAD Apr 12 21:17:11.598000 audit[2661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2643 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:11.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130383136383037373561393536633461366634343835643130306433 Apr 12 21:17:11.605119 env[2103]: time="2024-04-12T21:17:11.605082160Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5rr5s,Uid:2b0afe7a-ca03-44dc-a3e2-e1d7f87753b5,Namespace:calico-system,Attempt:0,} returns sandbox id \"fe2ebf90ee90560e945da2532f9b0184d7829b3c6f305cd9ffa934c149c4d005\"" Apr 12 21:17:11.606673 env[2103]: time="2024-04-12T21:17:11.606646600Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 21:17:11.606798 env[2103]: time="2024-04-12T21:17:11.606772800Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vxpzh,Uid:58765c20-aadd-4923-bbe9-69b32169c416,Namespace:kube-system,Attempt:0,} returns sandbox id \"a081680775a956c4a6f4485d100d373d6c1fe57fcb052fb8a25bd895b2cd9f4b\"" Apr 12 21:17:11.923214 kubelet[2519]: E0412 21:17:11.923154 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:12.041212 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3781008998.mount: Deactivated successfully. Apr 12 21:17:12.070810 env[2103]: time="2024-04-12T21:17:12.070777760Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:12.071422 env[2103]: time="2024-04-12T21:17:12.071397920Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:12.072540 env[2103]: time="2024-04-12T21:17:12.072513080Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:12.073400 env[2103]: time="2024-04-12T21:17:12.073378400Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:12.073850 env[2103]: time="2024-04-12T21:17:12.073824240Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607\"" Apr 12 21:17:12.074370 env[2103]: time="2024-04-12T21:17:12.074350160Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\"" Apr 12 21:17:12.075484 env[2103]: time="2024-04-12T21:17:12.075459920Z" level=info msg="CreateContainer within sandbox \"fe2ebf90ee90560e945da2532f9b0184d7829b3c6f305cd9ffa934c149c4d005\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 21:17:12.083327 env[2103]: time="2024-04-12T21:17:12.083295400Z" level=info msg="CreateContainer within sandbox \"fe2ebf90ee90560e945da2532f9b0184d7829b3c6f305cd9ffa934c149c4d005\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"1ee3dd91d17784d98e0673aaf214ad6a628dff2ad8f41f2fdff57cf1ba4acd2c\"" Apr 12 21:17:12.083859 env[2103]: time="2024-04-12T21:17:12.083832920Z" level=info msg="StartContainer for \"1ee3dd91d17784d98e0673aaf214ad6a628dff2ad8f41f2fdff57cf1ba4acd2c\"" Apr 12 21:17:12.097762 systemd[1]: Started cri-containerd-1ee3dd91d17784d98e0673aaf214ad6a628dff2ad8f41f2fdff57cf1ba4acd2c.scope. Apr 12 21:17:12.113000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.124151 kernel: kauditd_printk_skb: 528 callbacks suppressed Apr 12 21:17:12.124199 kernel: audit: type=1400 audit(1712956632.113:588): avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.113000 audit[2724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2648 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:12.218722 kernel: audit: type=1300 audit(1712956632.113:588): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2648 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:12.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165653364643931643137373834643938653036373361616632313461 Apr 12 21:17:12.271298 kernel: audit: type=1327 audit(1712956632.113:588): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165653364643931643137373834643938653036373361616632313461 Apr 12 21:17:12.271398 kernel: audit: type=1400 audit(1712956632.113:589): avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.113000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.278688 env[2103]: time="2024-04-12T21:17:12.278655680Z" level=info msg="StartContainer for \"1ee3dd91d17784d98e0673aaf214ad6a628dff2ad8f41f2fdff57cf1ba4acd2c\" returns successfully" Apr 12 21:17:12.113000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.348152 kernel: audit: type=1400 audit(1712956632.113:589): avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.348218 kernel: audit: type=1400 audit(1712956632.113:589): avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.113000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.348525 systemd[1]: cri-containerd-1ee3dd91d17784d98e0673aaf214ad6a628dff2ad8f41f2fdff57cf1ba4acd2c.scope: Deactivated successfully. Apr 12 21:17:12.386736 kernel: audit: type=1400 audit(1712956632.113:589): avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.113000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.113000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.425791 env[2103]: time="2024-04-12T21:17:12.425653000Z" level=info msg="shim disconnected" id=1ee3dd91d17784d98e0673aaf214ad6a628dff2ad8f41f2fdff57cf1ba4acd2c Apr 12 21:17:12.425791 env[2103]: time="2024-04-12T21:17:12.425690600Z" level=warning msg="cleaning up after shim disconnected" id=1ee3dd91d17784d98e0673aaf214ad6a628dff2ad8f41f2fdff57cf1ba4acd2c namespace=k8s.io Apr 12 21:17:12.425791 env[2103]: time="2024-04-12T21:17:12.425699320Z" level=info msg="cleaning up dead shim" Apr 12 21:17:12.432979 env[2103]: time="2024-04-12T21:17:12.432960560Z" level=warning msg="cleanup warnings time=\"2024-04-12T21:17:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2770 runtime=io.containerd.runc.v2\n" Apr 12 21:17:12.463980 kernel: audit: type=1400 audit(1712956632.113:589): avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.464111 kernel: audit: type=1400 audit(1712956632.113:589): avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.113000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.113000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.540544 kernel: audit: type=1400 audit(1712956632.113:589): avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.113000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.113000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.113000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.113000 audit: BPF prog-id=72 op=LOAD Apr 12 21:17:12.113000 audit[2724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2648 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:12.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165653364643931643137373834643938653036373361616632313461 Apr 12 21:17:12.124000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.124000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.124000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.124000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.124000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.124000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.124000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.124000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.124000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.124000 audit: BPF prog-id=73 op=LOAD Apr 12 21:17:12.124000 audit[2724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2648 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:12.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165653364643931643137373834643938653036373361616632313461 Apr 12 21:17:12.162000 audit: BPF prog-id=73 op=UNLOAD Apr 12 21:17:12.162000 audit: BPF prog-id=72 op=UNLOAD Apr 12 21:17:12.162000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.162000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.162000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.162000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.162000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.162000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.162000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.162000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.162000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.162000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:12.162000 audit: BPF prog-id=74 op=LOAD Apr 12 21:17:12.162000 audit[2724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2648 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:12.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165653364643931643137373834643938653036373361616632313461 Apr 12 21:17:12.544000 audit: BPF prog-id=74 op=UNLOAD Apr 12 21:17:12.923932 kubelet[2519]: E0412 21:17:12.923861 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:13.016330 kubelet[2519]: E0412 21:17:13.016308 2519 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qszbs" podUID="e30db219-8f66-413d-8015-bd3fe6999f3e" Apr 12 21:17:13.039665 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1ee3dd91d17784d98e0673aaf214ad6a628dff2ad8f41f2fdff57cf1ba4acd2c-rootfs.mount: Deactivated successfully. Apr 12 21:17:13.211918 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1648497711.mount: Deactivated successfully. Apr 12 21:17:13.863284 env[2103]: time="2024-04-12T21:17:13.863250480Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:13.863864 env[2103]: time="2024-04-12T21:17:13.863838640Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:837f825eec6c170d5e5bbfbd7bb0a4afac97759d0f0c57b80e4712d417fd690b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:13.864805 env[2103]: time="2024-04-12T21:17:13.864788520Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:13.868040 env[2103]: time="2024-04-12T21:17:13.868005480Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9e9dd46799712c58e1a49f973374ffa9ad4e5a6175896e5d805a8738bf5c5865,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:13.868749 env[2103]: time="2024-04-12T21:17:13.868717360Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\" returns image reference \"sha256:837f825eec6c170d5e5bbfbd7bb0a4afac97759d0f0c57b80e4712d417fd690b\"" Apr 12 21:17:13.869136 env[2103]: time="2024-04-12T21:17:13.869117320Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 21:17:13.870176 env[2103]: time="2024-04-12T21:17:13.870149960Z" level=info msg="CreateContainer within sandbox \"a081680775a956c4a6f4485d100d373d6c1fe57fcb052fb8a25bd895b2cd9f4b\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 21:17:13.876590 env[2103]: time="2024-04-12T21:17:13.876556080Z" level=info msg="CreateContainer within sandbox \"a081680775a956c4a6f4485d100d373d6c1fe57fcb052fb8a25bd895b2cd9f4b\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"0850b265feb2f3dda82c64485ad29549edc3c7c980dcdad7e8f692e607719007\"" Apr 12 21:17:13.876942 env[2103]: time="2024-04-12T21:17:13.876915720Z" level=info msg="StartContainer for \"0850b265feb2f3dda82c64485ad29549edc3c7c980dcdad7e8f692e607719007\"" Apr 12 21:17:13.889923 systemd[1]: Started cri-containerd-0850b265feb2f3dda82c64485ad29549edc3c7c980dcdad7e8f692e607719007.scope. Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2643 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:13.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038353062323635666562326633646461383263363434383561643239 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit: BPF prog-id=75 op=LOAD Apr 12 21:17:13.906000 audit[2808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2643 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:13.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038353062323635666562326633646461383263363434383561643239 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit: BPF prog-id=76 op=LOAD Apr 12 21:17:13.906000 audit[2808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2643 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:13.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038353062323635666562326633646461383263363434383561643239 Apr 12 21:17:13.906000 audit: BPF prog-id=76 op=UNLOAD Apr 12 21:17:13.906000 audit: BPF prog-id=75 op=UNLOAD Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:13.906000 audit: BPF prog-id=77 op=LOAD Apr 12 21:17:13.906000 audit[2808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2643 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:13.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038353062323635666562326633646461383263363434383561643239 Apr 12 21:17:13.914989 env[2103]: time="2024-04-12T21:17:13.914954040Z" level=info msg="StartContainer for \"0850b265feb2f3dda82c64485ad29549edc3c7c980dcdad7e8f692e607719007\" returns successfully" Apr 12 21:17:13.924096 kubelet[2519]: E0412 21:17:13.924077 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:14.000000 audit[2877]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2877 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.000000 audit[2877]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffca1495f0 a2=0 a3=1 items=0 ppid=2819 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.000000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 21:17:14.000000 audit[2878]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2878 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.000000 audit[2878]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff739cef0 a2=0 a3=1 items=0 ppid=2819 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.000000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 21:17:14.001000 audit[2879]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2879 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.001000 audit[2879]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe0edbea0 a2=0 a3=1 items=0 ppid=2819 pid=2879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.001000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 21:17:14.001000 audit[2880]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=2880 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.001000 audit[2880]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffef718c80 a2=0 a3=1 items=0 ppid=2819 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.001000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 21:17:14.001000 audit[2881]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=2881 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.001000 audit[2881]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc3417110 a2=0 a3=1 items=0 ppid=2819 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.001000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 21:17:14.002000 audit[2882]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2882 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.002000 audit[2882]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffa260b30 a2=0 a3=1 items=0 ppid=2819 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.002000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 21:17:14.029717 kubelet[2519]: I0412 21:17:14.029700 2519 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-vxpzh" podStartSLOduration=2.76809988 podCreationTimestamp="2024-04-12 21:17:09 +0000 UTC" firstStartedPulling="2024-04-12 21:17:11.6073708 +0000 UTC m=+2.431391601" lastFinishedPulling="2024-04-12 21:17:13.8689276 +0000 UTC m=+4.692948401" observedRunningTime="2024-04-12 21:17:14.02962556 +0000 UTC m=+4.853646321" watchObservedRunningTime="2024-04-12 21:17:14.02965668 +0000 UTC m=+4.853677441" Apr 12 21:17:14.102000 audit[2883]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2883 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.102000 audit[2883]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffcf9315c0 a2=0 a3=1 items=0 ppid=2819 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.102000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 21:17:14.104000 audit[2885]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2885 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.104000 audit[2885]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffdc652f90 a2=0 a3=1 items=0 ppid=2819 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.104000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 21:17:14.106000 audit[2888]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2888 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.106000 audit[2888]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff38d6800 a2=0 a3=1 items=0 ppid=2819 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 21:17:14.107000 audit[2889]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2889 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.107000 audit[2889]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd75d6a30 a2=0 a3=1 items=0 ppid=2819 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 21:17:14.109000 audit[2891]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2891 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.109000 audit[2891]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc40189b0 a2=0 a3=1 items=0 ppid=2819 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 21:17:14.110000 audit[2892]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2892 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.110000 audit[2892]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc4e64c50 a2=0 a3=1 items=0 ppid=2819 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.110000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 21:17:14.112000 audit[2894]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2894 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.112000 audit[2894]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd2964eb0 a2=0 a3=1 items=0 ppid=2819 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 21:17:14.115000 audit[2897]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2897 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.115000 audit[2897]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe8102940 a2=0 a3=1 items=0 ppid=2819 pid=2897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.115000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 21:17:14.116000 audit[2898]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2898 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.116000 audit[2898]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe7f801c0 a2=0 a3=1 items=0 ppid=2819 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 21:17:14.118000 audit[2900]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2900 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.118000 audit[2900]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe984e250 a2=0 a3=1 items=0 ppid=2819 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.118000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 21:17:14.118000 audit[2901]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2901 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.118000 audit[2901]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff8300e20 a2=0 a3=1 items=0 ppid=2819 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.118000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 21:17:14.120000 audit[2903]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2903 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.120000 audit[2903]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd1693560 a2=0 a3=1 items=0 ppid=2819 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.120000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 21:17:14.123000 audit[2906]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2906 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.123000 audit[2906]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd5da3c20 a2=0 a3=1 items=0 ppid=2819 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.123000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 21:17:14.126000 audit[2909]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2909 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.126000 audit[2909]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe7189fb0 a2=0 a3=1 items=0 ppid=2819 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.126000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 21:17:14.127000 audit[2910]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2910 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.127000 audit[2910]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff15b76b0 a2=0 a3=1 items=0 ppid=2819 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 21:17:14.129000 audit[2916]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.129000 audit[2916]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffde0a0f80 a2=0 a3=1 items=0 ppid=2819 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.129000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 21:17:14.161000 audit[2921]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.161000 audit[2921]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe630b400 a2=0 a3=1 items=0 ppid=2819 pid=2921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.161000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 21:17:14.162000 audit[2922]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2922 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.162000 audit[2922]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffcd367d0 a2=0 a3=1 items=0 ppid=2819 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.162000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 21:17:14.164000 audit[2924]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2924 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 21:17:14.164000 audit[2924]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe220ff50 a2=0 a3=1 items=0 ppid=2819 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.164000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 21:17:14.174244 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3003127712.mount: Deactivated successfully. Apr 12 21:17:14.174000 audit[2930]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=2930 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:17:14.174000 audit[2930]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd639d570 a2=0 a3=1 items=0 ppid=2819 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.174000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:17:14.204000 audit[2930]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=2930 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:17:14.204000 audit[2930]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30940 a0=3 a1=ffffd639d570 a2=0 a3=1 items=0 ppid=2819 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.204000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:17:14.223000 audit[2938]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2938 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.223000 audit[2938]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffde2a2e0 a2=0 a3=1 items=0 ppid=2819 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 21:17:14.226000 audit[2940]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2940 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.226000 audit[2940]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcdc0d2c0 a2=0 a3=1 items=0 ppid=2819 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.226000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 21:17:14.229000 audit[2943]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2943 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.229000 audit[2943]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffcd13720 a2=0 a3=1 items=0 ppid=2819 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.229000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 21:17:14.231000 audit[2944]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2944 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.231000 audit[2944]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe2bb7220 a2=0 a3=1 items=0 ppid=2819 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 21:17:14.232000 audit[2946]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2946 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.232000 audit[2946]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc972da60 a2=0 a3=1 items=0 ppid=2819 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.232000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 21:17:14.233000 audit[2947]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2947 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.233000 audit[2947]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff72289e0 a2=0 a3=1 items=0 ppid=2819 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.233000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 21:17:14.235000 audit[2949]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2949 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.235000 audit[2949]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcc33ac90 a2=0 a3=1 items=0 ppid=2819 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.235000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 21:17:14.238000 audit[2952]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2952 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.238000 audit[2952]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffe15afff0 a2=0 a3=1 items=0 ppid=2819 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 21:17:14.239000 audit[2953]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2953 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.239000 audit[2953]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff1769820 a2=0 a3=1 items=0 ppid=2819 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.239000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 21:17:14.241000 audit[2955]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2955 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.241000 audit[2955]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe2b193c0 a2=0 a3=1 items=0 ppid=2819 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.241000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 21:17:14.242000 audit[2956]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2956 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.242000 audit[2956]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd2c51410 a2=0 a3=1 items=0 ppid=2819 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.242000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 21:17:14.244000 audit[2958]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2958 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.244000 audit[2958]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe7df9930 a2=0 a3=1 items=0 ppid=2819 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.244000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 21:17:14.247000 audit[2961]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2961 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.247000 audit[2961]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd803ee60 a2=0 a3=1 items=0 ppid=2819 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.247000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 21:17:14.250000 audit[2964]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2964 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.250000 audit[2964]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc5b8d140 a2=0 a3=1 items=0 ppid=2819 pid=2964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.250000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 21:17:14.251000 audit[2965]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2965 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.251000 audit[2965]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd6f27c60 a2=0 a3=1 items=0 ppid=2819 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.251000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 21:17:14.253000 audit[2967]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2967 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.253000 audit[2967]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd5fa9ce0 a2=0 a3=1 items=0 ppid=2819 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.253000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 21:17:14.256000 audit[2970]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2970 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.256000 audit[2970]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe094f8a0 a2=0 a3=1 items=0 ppid=2819 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.256000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 21:17:14.257000 audit[2971]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2971 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.257000 audit[2971]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcf1900e0 a2=0 a3=1 items=0 ppid=2819 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.257000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 21:17:14.259000 audit[2973]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2973 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.259000 audit[2973]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc4b742f0 a2=0 a3=1 items=0 ppid=2819 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.259000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 21:17:14.260000 audit[2974]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2974 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.260000 audit[2974]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffea92d10 a2=0 a3=1 items=0 ppid=2819 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.260000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 21:17:14.262000 audit[2976]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2976 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.262000 audit[2976]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffac47200 a2=0 a3=1 items=0 ppid=2819 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.262000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 21:17:14.264000 audit[2979]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2979 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 21:17:14.264000 audit[2979]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffebecfc70 a2=0 a3=1 items=0 ppid=2819 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.264000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 21:17:14.267000 audit[2981]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2981 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 21:17:14.267000 audit[2981]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffe81a2570 a2=0 a3=1 items=0 ppid=2819 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.267000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:17:14.267000 audit[2981]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2981 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 21:17:14.267000 audit[2981]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffe81a2570 a2=0 a3=1 items=0 ppid=2819 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:14.267000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:17:14.924366 kubelet[2519]: E0412 21:17:14.924343 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:15.017062 kubelet[2519]: E0412 21:17:15.017039 2519 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qszbs" podUID="e30db219-8f66-413d-8015-bd3fe6999f3e" Apr 12 21:17:15.924760 kubelet[2519]: E0412 21:17:15.924728 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:16.073760 env[2103]: time="2024-04-12T21:17:16.073719640Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:16.074383 env[2103]: time="2024-04-12T21:17:16.074356120Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:16.075470 env[2103]: time="2024-04-12T21:17:16.075451400Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:16.076519 env[2103]: time="2024-04-12T21:17:16.076499720Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:16.077013 env[2103]: time="2024-04-12T21:17:16.076993840Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a\"" Apr 12 21:17:16.078431 env[2103]: time="2024-04-12T21:17:16.078401320Z" level=info msg="CreateContainer within sandbox \"fe2ebf90ee90560e945da2532f9b0184d7829b3c6f305cd9ffa934c149c4d005\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 21:17:16.083997 env[2103]: time="2024-04-12T21:17:16.083962880Z" level=info msg="CreateContainer within sandbox \"fe2ebf90ee90560e945da2532f9b0184d7829b3c6f305cd9ffa934c149c4d005\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"61ecbef35ea7daa2d9701ca4056df6fb3c3b0597c04aac17b57b7add1e341306\"" Apr 12 21:17:16.084374 env[2103]: time="2024-04-12T21:17:16.084349160Z" level=info msg="StartContainer for \"61ecbef35ea7daa2d9701ca4056df6fb3c3b0597c04aac17b57b7add1e341306\"" Apr 12 21:17:16.098867 systemd[1]: Started cri-containerd-61ecbef35ea7daa2d9701ca4056df6fb3c3b0597c04aac17b57b7add1e341306.scope. Apr 12 21:17:16.113000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.113000 audit[2997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2648 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:16.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631656362656633356561376461613264393730316361343035366466 Apr 12 21:17:16.113000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.113000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.113000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.113000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.113000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.113000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.113000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.113000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.113000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.113000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.113000 audit: BPF prog-id=78 op=LOAD Apr 12 21:17:16.113000 audit[2997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2648 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:16.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631656362656633356561376461613264393730316361343035366466 Apr 12 21:17:16.113000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.113000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.113000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.113000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.113000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.113000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.113000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.113000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.113000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.113000 audit: BPF prog-id=79 op=LOAD Apr 12 21:17:16.113000 audit[2997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2648 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:16.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631656362656633356561376461613264393730316361343035366466 Apr 12 21:17:16.114000 audit: BPF prog-id=79 op=UNLOAD Apr 12 21:17:16.114000 audit: BPF prog-id=78 op=UNLOAD Apr 12 21:17:16.114000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.114000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.114000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.114000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.114000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.114000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.114000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.114000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.114000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.114000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:16.114000 audit: BPF prog-id=80 op=LOAD Apr 12 21:17:16.114000 audit[2997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2648 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:16.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631656362656633356561376461613264393730316361343035366466 Apr 12 21:17:16.122092 env[2103]: time="2024-04-12T21:17:16.122054280Z" level=info msg="StartContainer for \"61ecbef35ea7daa2d9701ca4056df6fb3c3b0597c04aac17b57b7add1e341306\" returns successfully" Apr 12 21:17:16.413662 env[2103]: time="2024-04-12T21:17:16.413412400Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 21:17:16.415090 systemd[1]: cri-containerd-61ecbef35ea7daa2d9701ca4056df6fb3c3b0597c04aac17b57b7add1e341306.scope: Deactivated successfully. Apr 12 21:17:16.433000 audit: BPF prog-id=80 op=UNLOAD Apr 12 21:17:16.509856 kubelet[2519]: I0412 21:17:16.509832 2519 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 21:17:16.644386 env[2103]: time="2024-04-12T21:17:16.644343360Z" level=info msg="shim disconnected" id=61ecbef35ea7daa2d9701ca4056df6fb3c3b0597c04aac17b57b7add1e341306 Apr 12 21:17:16.644469 env[2103]: time="2024-04-12T21:17:16.644388280Z" level=warning msg="cleaning up after shim disconnected" id=61ecbef35ea7daa2d9701ca4056df6fb3c3b0597c04aac17b57b7add1e341306 namespace=k8s.io Apr 12 21:17:16.644469 env[2103]: time="2024-04-12T21:17:16.644398160Z" level=info msg="cleaning up dead shim" Apr 12 21:17:16.650085 env[2103]: time="2024-04-12T21:17:16.650055160Z" level=warning msg="cleanup warnings time=\"2024-04-12T21:17:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3065 runtime=io.containerd.runc.v2\n" Apr 12 21:17:16.925386 kubelet[2519]: E0412 21:17:16.925360 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:17.020728 systemd[1]: Created slice kubepods-besteffort-pode30db219_8f66_413d_8015_bd3fe6999f3e.slice. Apr 12 21:17:17.022234 env[2103]: time="2024-04-12T21:17:17.022206520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qszbs,Uid:e30db219-8f66-413d-8015-bd3fe6999f3e,Namespace:calico-system,Attempt:0,}" Apr 12 21:17:17.030110 env[2103]: time="2024-04-12T21:17:17.030075640Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 21:17:17.083549 env[2103]: time="2024-04-12T21:17:17.083493280Z" level=error msg="Failed to destroy network for sandbox \"c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:17:17.083893 env[2103]: time="2024-04-12T21:17:17.083864080Z" level=error msg="encountered an error cleaning up failed sandbox \"c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:17:17.083934 env[2103]: time="2024-04-12T21:17:17.083914560Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qszbs,Uid:e30db219-8f66-413d-8015-bd3fe6999f3e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:17:17.084121 kubelet[2519]: E0412 21:17:17.084104 2519 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:17:17.084170 kubelet[2519]: E0412 21:17:17.084160 2519 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qszbs" Apr 12 21:17:17.084200 kubelet[2519]: E0412 21:17:17.084181 2519 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qszbs" Apr 12 21:17:17.084240 kubelet[2519]: E0412 21:17:17.084229 2519 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-qszbs_calico-system(e30db219-8f66-413d-8015-bd3fe6999f3e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-qszbs_calico-system(e30db219-8f66-413d-8015-bd3fe6999f3e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qszbs" podUID="e30db219-8f66-413d-8015-bd3fe6999f3e" Apr 12 21:17:17.084710 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-61ecbef35ea7daa2d9701ca4056df6fb3c3b0597c04aac17b57b7add1e341306-rootfs.mount: Deactivated successfully. Apr 12 21:17:17.086159 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567-shm.mount: Deactivated successfully. Apr 12 21:17:17.925500 kubelet[2519]: E0412 21:17:17.925472 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:18.030943 kubelet[2519]: I0412 21:17:18.030926 2519 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567" Apr 12 21:17:18.031427 env[2103]: time="2024-04-12T21:17:18.031401520Z" level=info msg="StopPodSandbox for \"c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567\"" Apr 12 21:17:18.053528 env[2103]: time="2024-04-12T21:17:18.053485240Z" level=error msg="StopPodSandbox for \"c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567\" failed" error="failed to destroy network for sandbox \"c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:17:18.053710 kubelet[2519]: E0412 21:17:18.053692 2519 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567" Apr 12 21:17:18.053760 kubelet[2519]: E0412 21:17:18.053753 2519 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567"} Apr 12 21:17:18.053794 kubelet[2519]: E0412 21:17:18.053788 2519 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e30db219-8f66-413d-8015-bd3fe6999f3e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 21:17:18.053841 kubelet[2519]: E0412 21:17:18.053817 2519 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e30db219-8f66-413d-8015-bd3fe6999f3e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qszbs" podUID="e30db219-8f66-413d-8015-bd3fe6999f3e" Apr 12 21:17:18.925909 kubelet[2519]: E0412 21:17:18.925882 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:19.086485 kubelet[2519]: I0412 21:17:19.086457 2519 topology_manager.go:215] "Topology Admit Handler" podUID="6cdb886c-a763-4c51-a1eb-1f71e9591053" podNamespace="default" podName="nginx-deployment-6d5f899847-ggm4x" Apr 12 21:17:19.090528 systemd[1]: Created slice kubepods-besteffort-pod6cdb886c_a763_4c51_a1eb_1f71e9591053.slice. Apr 12 21:17:19.186261 kubelet[2519]: I0412 21:17:19.186197 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4r9gj\" (UniqueName: \"kubernetes.io/projected/6cdb886c-a763-4c51-a1eb-1f71e9591053-kube-api-access-4r9gj\") pod \"nginx-deployment-6d5f899847-ggm4x\" (UID: \"6cdb886c-a763-4c51-a1eb-1f71e9591053\") " pod="default/nginx-deployment-6d5f899847-ggm4x" Apr 12 21:17:19.393185 env[2103]: time="2024-04-12T21:17:19.393141040Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-ggm4x,Uid:6cdb886c-a763-4c51-a1eb-1f71e9591053,Namespace:default,Attempt:0,}" Apr 12 21:17:19.440724 env[2103]: time="2024-04-12T21:17:19.440673480Z" level=error msg="Failed to destroy network for sandbox \"e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:17:19.441078 env[2103]: time="2024-04-12T21:17:19.441048080Z" level=error msg="encountered an error cleaning up failed sandbox \"e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:17:19.441131 env[2103]: time="2024-04-12T21:17:19.441096240Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-ggm4x,Uid:6cdb886c-a763-4c51-a1eb-1f71e9591053,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:17:19.441281 kubelet[2519]: E0412 21:17:19.441266 2519 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:17:19.441332 kubelet[2519]: E0412 21:17:19.441309 2519 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-ggm4x" Apr 12 21:17:19.441358 kubelet[2519]: E0412 21:17:19.441341 2519 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-ggm4x" Apr 12 21:17:19.441401 kubelet[2519]: E0412 21:17:19.441393 2519 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-ggm4x_default(6cdb886c-a763-4c51-a1eb-1f71e9591053)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-ggm4x_default(6cdb886c-a763-4c51-a1eb-1f71e9591053)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-ggm4x" podUID="6cdb886c-a763-4c51-a1eb-1f71e9591053" Apr 12 21:17:19.441934 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe-shm.mount: Deactivated successfully. Apr 12 21:17:19.926836 kubelet[2519]: E0412 21:17:19.926730 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:20.034095 kubelet[2519]: I0412 21:17:20.034069 2519 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe" Apr 12 21:17:20.034449 env[2103]: time="2024-04-12T21:17:20.034417920Z" level=info msg="StopPodSandbox for \"e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe\"" Apr 12 21:17:20.056151 env[2103]: time="2024-04-12T21:17:20.056078600Z" level=error msg="StopPodSandbox for \"e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe\" failed" error="failed to destroy network for sandbox \"e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 21:17:20.056284 kubelet[2519]: E0412 21:17:20.056268 2519 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe" Apr 12 21:17:20.056345 kubelet[2519]: E0412 21:17:20.056303 2519 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe"} Apr 12 21:17:20.056345 kubelet[2519]: E0412 21:17:20.056335 2519 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6cdb886c-a763-4c51-a1eb-1f71e9591053\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 21:17:20.056455 kubelet[2519]: E0412 21:17:20.056361 2519 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6cdb886c-a763-4c51-a1eb-1f71e9591053\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-ggm4x" podUID="6cdb886c-a763-4c51-a1eb-1f71e9591053" Apr 12 21:17:20.881565 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4112314118.mount: Deactivated successfully. Apr 12 21:17:20.908839 env[2103]: time="2024-04-12T21:17:20.908803360Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:20.909485 env[2103]: time="2024-04-12T21:17:20.909458760Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:20.910657 env[2103]: time="2024-04-12T21:17:20.910637360Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:20.911663 env[2103]: time="2024-04-12T21:17:20.911643640Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:20.912325 env[2103]: time="2024-04-12T21:17:20.912298040Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d\"" Apr 12 21:17:20.918375 env[2103]: time="2024-04-12T21:17:20.918351720Z" level=info msg="CreateContainer within sandbox \"fe2ebf90ee90560e945da2532f9b0184d7829b3c6f305cd9ffa934c149c4d005\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 21:17:20.925271 env[2103]: time="2024-04-12T21:17:20.925238440Z" level=info msg="CreateContainer within sandbox \"fe2ebf90ee90560e945da2532f9b0184d7829b3c6f305cd9ffa934c149c4d005\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"48f8d65af0c200ed7ea5c172f7601e92ff5c5bbbcae8764539996a6ed3704263\"" Apr 12 21:17:20.925548 env[2103]: time="2024-04-12T21:17:20.925527640Z" level=info msg="StartContainer for \"48f8d65af0c200ed7ea5c172f7601e92ff5c5bbbcae8764539996a6ed3704263\"" Apr 12 21:17:20.927724 kubelet[2519]: E0412 21:17:20.927710 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:20.938776 systemd[1]: Started cri-containerd-48f8d65af0c200ed7ea5c172f7601e92ff5c5bbbcae8764539996a6ed3704263.scope. Apr 12 21:17:20.956000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:20.967769 kernel: kauditd_printk_skb: 274 callbacks suppressed Apr 12 21:17:20.967955 kernel: audit: type=1400 audit(1712956640.956:659): avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:20.956000 audit[3294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2648 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:21.060480 kernel: audit: type=1300 audit(1712956640.956:659): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2648 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:21.060560 kernel: audit: type=1327 audit(1712956640.956:659): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438663864363561663063323030656437656135633137326637363031 Apr 12 21:17:20.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438663864363561663063323030656437656135633137326637363031 Apr 12 21:17:20.956000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:21.120598 env[2103]: time="2024-04-12T21:17:21.120567520Z" level=info msg="StartContainer for \"48f8d65af0c200ed7ea5c172f7601e92ff5c5bbbcae8764539996a6ed3704263\" returns successfully" Apr 12 21:17:21.150475 kernel: audit: type=1400 audit(1712956640.956:660): avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:21.150582 kernel: audit: type=1400 audit(1712956640.956:660): avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:20.956000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:20.956000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:21.226309 kernel: audit: type=1400 audit(1712956640.956:660): avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:21.226345 kernel: audit: type=1400 audit(1712956640.956:660): avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:20.956000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:20.956000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:21.302957 kernel: audit: type=1400 audit(1712956640.956:660): avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:21.302991 kernel: audit: type=1400 audit(1712956640.956:660): avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:20.956000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:21.341125 kernel: audit: type=1400 audit(1712956640.956:660): avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:20.956000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:20.956000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:20.956000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:20.956000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:20.956000 audit: BPF prog-id=81 op=LOAD Apr 12 21:17:20.956000 audit[3294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2648 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:20.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438663864363561663063323030656437656135633137326637363031 Apr 12 21:17:20.967000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:20.967000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:20.967000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:20.967000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:20.967000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:20.967000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:20.967000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:20.967000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:20.967000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:20.967000 audit: BPF prog-id=82 op=LOAD Apr 12 21:17:20.967000 audit[3294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2648 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:20.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438663864363561663063323030656437656135633137326637363031 Apr 12 21:17:21.005000 audit: BPF prog-id=82 op=UNLOAD Apr 12 21:17:21.005000 audit: BPF prog-id=81 op=UNLOAD Apr 12 21:17:21.005000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:21.005000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:21.005000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:21.005000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:21.005000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:21.005000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:21.005000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:21.005000 audit[3294]: AVC avc: denied { perfmon } for pid=3294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:21.005000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:21.005000 audit[3294]: AVC avc: denied { bpf } for pid=3294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:21.005000 audit: BPF prog-id=83 op=LOAD Apr 12 21:17:21.005000 audit[3294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2648 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:21.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438663864363561663063323030656437656135633137326637363031 Apr 12 21:17:21.434242 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 21:17:21.434287 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 21:17:21.928117 kubelet[2519]: E0412 21:17:21.928079 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:22.052151 kubelet[2519]: I0412 21:17:22.052127 2519 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-5rr5s" podStartSLOduration=3.74573388 podCreationTimestamp="2024-04-12 21:17:09 +0000 UTC" firstStartedPulling="2024-04-12 21:17:11.606114 +0000 UTC m=+2.430134801" lastFinishedPulling="2024-04-12 21:17:20.91247168 +0000 UTC m=+11.736492481" observedRunningTime="2024-04-12 21:17:22.05197472 +0000 UTC m=+12.875995521" watchObservedRunningTime="2024-04-12 21:17:22.05209156 +0000 UTC m=+12.876112321" Apr 12 21:17:22.611000 audit[3417]: AVC avc: denied { write } for pid=3417 comm="tee" name="fd" dev="proc" ino=91143 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 21:17:22.611000 audit[3418]: AVC avc: denied { write } for pid=3418 comm="tee" name="fd" dev="proc" ino=60442 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 21:17:22.611000 audit[3417]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdbf9096e a2=241 a3=1b6 items=1 ppid=3381 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.611000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 21:17:22.611000 audit[3421]: AVC avc: denied { write } for pid=3421 comm="tee" name="fd" dev="proc" ino=39960 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 21:17:22.611000 audit[3416]: AVC avc: denied { write } for pid=3416 comm="tee" name="fd" dev="proc" ino=59425 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 21:17:22.611000 audit: PATH item=0 name="/dev/fd/63" inode=18831 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:17:22.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 21:17:22.611000 audit[3418]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff26d997d a2=241 a3=1b6 items=1 ppid=3382 pid=3418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.611000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 21:17:22.611000 audit[3421]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff2e0b97d a2=241 a3=1b6 items=1 ppid=3388 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.611000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 21:17:22.611000 audit[3416]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc4d6397f a2=241 a3=1b6 items=1 ppid=3384 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.611000 audit: PATH item=0 name="/dev/fd/63" inode=24662 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:17:22.611000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 21:17:22.611000 audit: PATH item=0 name="/dev/fd/63" inode=21565 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:17:22.611000 audit: PATH item=0 name="/dev/fd/63" inode=34910 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:17:22.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 21:17:22.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 21:17:22.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 21:17:22.611000 audit[3426]: AVC avc: denied { write } for pid=3426 comm="tee" name="fd" dev="proc" ino=57370 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 21:17:22.611000 audit[3426]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff29e996d a2=241 a3=1b6 items=1 ppid=3387 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.611000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 21:17:22.611000 audit: PATH item=0 name="/dev/fd/63" inode=45156 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:17:22.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 21:17:22.611000 audit[3427]: AVC avc: denied { write } for pid=3427 comm="tee" name="fd" dev="proc" ino=40995 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 21:17:22.611000 audit[3427]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc913397d a2=241 a3=1b6 items=1 ppid=3385 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.611000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 21:17:22.611000 audit: PATH item=0 name="/dev/fd/63" inode=28707 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:17:22.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 21:17:22.611000 audit[3435]: AVC avc: denied { write } for pid=3435 comm="tee" name="fd" dev="proc" ino=67608 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 21:17:22.611000 audit[3435]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe33f597e a2=241 a3=1b6 items=1 ppid=3383 pid=3435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.611000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 21:17:22.611000 audit: PATH item=0 name="/dev/fd/63" inode=27790 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:17:22.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 21:17:22.697053 kernel: Initializing XFRM netlink socket Apr 12 21:17:22.776566 systemd-timesyncd[2043]: Network configuration changed, trying to establish connection. Apr 12 21:17:22.778000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.778000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.778000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.778000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.778000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.778000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.778000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.778000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.778000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.778000 audit: BPF prog-id=84 op=LOAD Apr 12 21:17:22.778000 audit[3582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc5dc1508 a2=70 a3=ffffc5dc1578 items=0 ppid=3395 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.778000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:17:22.779000 audit: BPF prog-id=84 op=UNLOAD Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit: BPF prog-id=85 op=LOAD Apr 12 21:17:22.779000 audit[3582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc5dc1508 a2=70 a3=4b243c items=0 ppid=3395 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.779000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:17:22.779000 audit: BPF prog-id=85 op=UNLOAD Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit[3582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc5dc14c0 a2=70 a3=ffffc5dc1530 items=0 ppid=3395 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.779000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit: BPF prog-id=86 op=LOAD Apr 12 21:17:22.779000 audit[3582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffc5dc14a8 a2=70 a3=ffffc5dc1518 items=0 ppid=3395 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.779000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:17:22.779000 audit: BPF prog-id=86 op=UNLOAD Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit[3582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc5dc1578 a2=70 a3=0 items=0 ppid=3395 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.779000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit[3582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc5dc1568 a2=70 a3=0 items=0 ppid=3395 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.779000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:17:22.779000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.779000 audit[3582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc5dc14d8 a2=70 a3=0 items=0 ppid=3395 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.779000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:17:22.780000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.780000 audit[3582]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffc5dc15b0 a2=70 a3=32f6d9ef items=0 ppid=3395 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.780000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:17:22.780000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.780000 audit[3582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc5dc15b0 a2=70 a3=32f6d9ef items=0 ppid=3395 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.780000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:17:22.780000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.780000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.780000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.780000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.780000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.780000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.780000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.780000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.780000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.780000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.780000 audit: BPF prog-id=87 op=LOAD Apr 12 21:17:22.780000 audit[3582]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc5dc14d8 a2=70 a3=32f6da09 items=0 ppid=3395 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.780000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 21:17:22.782000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.782000 audit[3586]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff7850a48 a2=70 a3=fffff7850ab8 items=0 ppid=3395 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.782000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 21:17:22.782000 audit[3586]: AVC avc: denied { bpf } for pid=3586 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:22.782000 audit[3586]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff7850918 a2=70 a3=fffff7850988 items=0 ppid=3395 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.782000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 21:17:22.804000 audit: BPF prog-id=87 op=UNLOAD Apr 12 21:17:22.848000 audit[3771]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=3771 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:17:22.848000 audit[3771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffe62a34b0 a2=0 a3=ffff84dc7fa8 items=0 ppid=3395 pid=3771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.848000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:17:22.851000 audit[3772]: NETFILTER_CFG table=raw:66 family=2 entries=19 op=nft_register_chain pid=3772 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:17:22.851000 audit[3772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=ffffcc66ddd0 a2=0 a3=ffffa694efa8 items=0 ppid=3395 pid=3772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.851000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:17:22.855000 audit[3776]: NETFILTER_CFG table=nat:67 family=2 entries=15 op=nft_register_chain pid=3776 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:17:22.855000 audit[3776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffc84cf300 a2=0 a3=ffffa0b5cfa8 items=0 ppid=3395 pid=3776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.855000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:17:22.855000 audit[3773]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=3773 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:17:22.855000 audit[3773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffdde79990 a2=0 a3=ffffa38bcfa8 items=0 ppid=3395 pid=3773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:22.855000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:17:22.929264 kubelet[2519]: E0412 21:17:22.929186 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:22.269673 systemd-resolved[2040]: Clock change detected. Flushing caches. Apr 12 21:17:22.304585 systemd-journald[1894]: Time jumped backwards, rotating. Apr 12 21:17:22.269885 systemd-timesyncd[2043]: Contacted time server [2607:f1c0:1800:7b::1]:123 (2.flatcar.pool.ntp.org). Apr 12 21:17:22.269936 systemd-timesyncd[2043]: Initial clock synchronization to Fri 2024-04-12 21:17:22.269607 UTC. Apr 12 21:17:22.312990 kubelet[2519]: I0412 21:17:22.312973 2519 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 21:17:22.977637 systemd-networkd[1922]: vxlan.calico: Link UP Apr 12 21:17:22.977642 systemd-networkd[1922]: vxlan.calico: Gained carrier Apr 12 21:17:23.201578 kubelet[2519]: E0412 21:17:23.201542 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:24.202177 kubelet[2519]: E0412 21:17:24.202135 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:25.010019 systemd-networkd[1922]: vxlan.calico: Gained IPv6LL Apr 12 21:17:25.202914 kubelet[2519]: E0412 21:17:25.202878 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:26.204660 kubelet[2519]: E0412 21:17:26.204593 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:27.205361 kubelet[2519]: E0412 21:17:27.205321 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:28.206262 kubelet[2519]: E0412 21:17:28.206220 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:29.194283 kubelet[2519]: E0412 21:17:29.194242 2519 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:29.206870 kubelet[2519]: E0412 21:17:29.206849 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:29.288754 env[2103]: time="2024-04-12T21:17:29.288714066Z" level=info msg="StopPodSandbox for \"c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567\"" Apr 12 21:17:29.374651 env[2103]: 2024-04-12 21:17:29.329 [INFO][3816] k8s.go 585: Cleaning up netns ContainerID="c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567" Apr 12 21:17:29.374651 env[2103]: 2024-04-12 21:17:29.329 [INFO][3816] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567" iface="eth0" netns="/var/run/netns/cni-352f8b39-d619-331c-5ba9-3774f230ce4b" Apr 12 21:17:29.374651 env[2103]: 2024-04-12 21:17:29.329 [INFO][3816] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567" iface="eth0" netns="/var/run/netns/cni-352f8b39-d619-331c-5ba9-3774f230ce4b" Apr 12 21:17:29.374651 env[2103]: 2024-04-12 21:17:29.329 [INFO][3816] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567" iface="eth0" netns="/var/run/netns/cni-352f8b39-d619-331c-5ba9-3774f230ce4b" Apr 12 21:17:29.374651 env[2103]: 2024-04-12 21:17:29.329 [INFO][3816] k8s.go 592: Releasing IP address(es) ContainerID="c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567" Apr 12 21:17:29.374651 env[2103]: 2024-04-12 21:17:29.329 [INFO][3816] utils.go 188: Calico CNI releasing IP address ContainerID="c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567" Apr 12 21:17:29.374651 env[2103]: 2024-04-12 21:17:29.360 [INFO][3828] ipam_plugin.go 415: Releasing address using handleID ContainerID="c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567" HandleID="k8s-pod-network.c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567" Workload="10.26.37.129-k8s-csi--node--driver--qszbs-eth0" Apr 12 21:17:29.374651 env[2103]: 2024-04-12 21:17:29.360 [INFO][3828] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:17:29.374651 env[2103]: 2024-04-12 21:17:29.360 [INFO][3828] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:17:29.374905 env[2103]: 2024-04-12 21:17:29.371 [WARNING][3828] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567" HandleID="k8s-pod-network.c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567" Workload="10.26.37.129-k8s-csi--node--driver--qszbs-eth0" Apr 12 21:17:29.374905 env[2103]: 2024-04-12 21:17:29.371 [INFO][3828] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567" HandleID="k8s-pod-network.c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567" Workload="10.26.37.129-k8s-csi--node--driver--qszbs-eth0" Apr 12 21:17:29.374905 env[2103]: 2024-04-12 21:17:29.372 [INFO][3828] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:17:29.374905 env[2103]: 2024-04-12 21:17:29.373 [INFO][3816] k8s.go 598: Teardown processing complete. ContainerID="c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567" Apr 12 21:17:29.374905 env[2103]: time="2024-04-12T21:17:29.374796746Z" level=info msg="TearDown network for sandbox \"c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567\" successfully" Apr 12 21:17:29.374905 env[2103]: time="2024-04-12T21:17:29.374823386Z" level=info msg="StopPodSandbox for \"c21102d6cb0f257c020d6514768abf6fee6f02cc4321d95d6059cd80358ee567\" returns successfully" Apr 12 21:17:29.375331 env[2103]: time="2024-04-12T21:17:29.375307666Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qszbs,Uid:e30db219-8f66-413d-8015-bd3fe6999f3e,Namespace:calico-system,Attempt:1,}" Apr 12 21:17:29.375907 systemd[1]: run-netns-cni\x2d352f8b39\x2dd619\x2d331c\x2d5ba9\x2d3774f230ce4b.mount: Deactivated successfully. Apr 12 21:17:29.461678 systemd-networkd[1922]: caliab9289b0af5: Link UP Apr 12 21:17:29.487029 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 21:17:29.487067 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliab9289b0af5: link becomes ready Apr 12 21:17:29.487117 systemd-networkd[1922]: caliab9289b0af5: Gained carrier Apr 12 21:17:29.495498 env[2103]: 2024-04-12 21:17:29.406 [INFO][3840] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.26.37.129-k8s-csi--node--driver--qszbs-eth0 csi-node-driver- calico-system e30db219-8f66-413d-8015-bd3fe6999f3e 3833 0 2024-04-12 21:17:09 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.26.37.129 csi-node-driver-qszbs eth0 default [] [] [kns.calico-system ksa.calico-system.default] caliab9289b0af5 [] []}} ContainerID="3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171" Namespace="calico-system" Pod="csi-node-driver-qszbs" WorkloadEndpoint="10.26.37.129-k8s-csi--node--driver--qszbs-" Apr 12 21:17:29.495498 env[2103]: 2024-04-12 21:17:29.407 [INFO][3840] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171" Namespace="calico-system" Pod="csi-node-driver-qszbs" WorkloadEndpoint="10.26.37.129-k8s-csi--node--driver--qszbs-eth0" Apr 12 21:17:29.495498 env[2103]: 2024-04-12 21:17:29.429 [INFO][3860] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171" HandleID="k8s-pod-network.3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171" Workload="10.26.37.129-k8s-csi--node--driver--qszbs-eth0" Apr 12 21:17:29.495608 env[2103]: 2024-04-12 21:17:29.441 [INFO][3860] ipam_plugin.go 268: Auto assigning IP ContainerID="3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171" HandleID="k8s-pod-network.3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171" Workload="10.26.37.129-k8s-csi--node--driver--qszbs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000a07620), Attrs:map[string]string{"namespace":"calico-system", "node":"10.26.37.129", "pod":"csi-node-driver-qszbs", "timestamp":"2024-04-12 21:17:29.429001426 +0000 UTC"}, Hostname:"10.26.37.129", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 21:17:29.495608 env[2103]: 2024-04-12 21:17:29.441 [INFO][3860] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:17:29.495608 env[2103]: 2024-04-12 21:17:29.441 [INFO][3860] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:17:29.495608 env[2103]: 2024-04-12 21:17:29.441 [INFO][3860] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.26.37.129' Apr 12 21:17:29.495608 env[2103]: 2024-04-12 21:17:29.442 [INFO][3860] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171" host="10.26.37.129" Apr 12 21:17:29.495608 env[2103]: 2024-04-12 21:17:29.445 [INFO][3860] ipam.go 372: Looking up existing affinities for host host="10.26.37.129" Apr 12 21:17:29.495608 env[2103]: 2024-04-12 21:17:29.448 [INFO][3860] ipam.go 489: Trying affinity for 192.168.125.64/26 host="10.26.37.129" Apr 12 21:17:29.495608 env[2103]: 2024-04-12 21:17:29.449 [INFO][3860] ipam.go 155: Attempting to load block cidr=192.168.125.64/26 host="10.26.37.129" Apr 12 21:17:29.495608 env[2103]: 2024-04-12 21:17:29.451 [INFO][3860] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.64/26 host="10.26.37.129" Apr 12 21:17:29.495608 env[2103]: 2024-04-12 21:17:29.451 [INFO][3860] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.64/26 handle="k8s-pod-network.3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171" host="10.26.37.129" Apr 12 21:17:29.495786 env[2103]: 2024-04-12 21:17:29.452 [INFO][3860] ipam.go 1682: Creating new handle: k8s-pod-network.3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171 Apr 12 21:17:29.495786 env[2103]: 2024-04-12 21:17:29.454 [INFO][3860] ipam.go 1203: Writing block in order to claim IPs block=192.168.125.64/26 handle="k8s-pod-network.3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171" host="10.26.37.129" Apr 12 21:17:29.495786 env[2103]: 2024-04-12 21:17:29.458 [INFO][3860] ipam.go 1216: Successfully claimed IPs: [192.168.125.65/26] block=192.168.125.64/26 handle="k8s-pod-network.3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171" host="10.26.37.129" Apr 12 21:17:29.495786 env[2103]: 2024-04-12 21:17:29.458 [INFO][3860] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.65/26] handle="k8s-pod-network.3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171" host="10.26.37.129" Apr 12 21:17:29.495786 env[2103]: 2024-04-12 21:17:29.458 [INFO][3860] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:17:29.495786 env[2103]: 2024-04-12 21:17:29.458 [INFO][3860] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.125.65/26] IPv6=[] ContainerID="3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171" HandleID="k8s-pod-network.3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171" Workload="10.26.37.129-k8s-csi--node--driver--qszbs-eth0" Apr 12 21:17:29.495938 env[2103]: 2024-04-12 21:17:29.459 [INFO][3840] k8s.go 385: Populated endpoint ContainerID="3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171" Namespace="calico-system" Pod="csi-node-driver-qszbs" WorkloadEndpoint="10.26.37.129-k8s-csi--node--driver--qszbs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.26.37.129-k8s-csi--node--driver--qszbs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e30db219-8f66-413d-8015-bd3fe6999f3e", ResourceVersion:"3833", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 17, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.26.37.129", ContainerID:"", Pod:"csi-node-driver-qszbs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliab9289b0af5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:17:29.495938 env[2103]: 2024-04-12 21:17:29.459 [INFO][3840] k8s.go 386: Calico CNI using IPs: [192.168.125.65/32] ContainerID="3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171" Namespace="calico-system" Pod="csi-node-driver-qszbs" WorkloadEndpoint="10.26.37.129-k8s-csi--node--driver--qszbs-eth0" Apr 12 21:17:29.496012 env[2103]: 2024-04-12 21:17:29.460 [INFO][3840] dataplane_linux.go 68: Setting the host side veth name to caliab9289b0af5 ContainerID="3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171" Namespace="calico-system" Pod="csi-node-driver-qszbs" WorkloadEndpoint="10.26.37.129-k8s-csi--node--driver--qszbs-eth0" Apr 12 21:17:29.496012 env[2103]: 2024-04-12 21:17:29.487 [INFO][3840] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171" Namespace="calico-system" Pod="csi-node-driver-qszbs" WorkloadEndpoint="10.26.37.129-k8s-csi--node--driver--qszbs-eth0" Apr 12 21:17:29.496053 env[2103]: 2024-04-12 21:17:29.487 [INFO][3840] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171" Namespace="calico-system" Pod="csi-node-driver-qszbs" WorkloadEndpoint="10.26.37.129-k8s-csi--node--driver--qszbs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.26.37.129-k8s-csi--node--driver--qszbs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e30db219-8f66-413d-8015-bd3fe6999f3e", ResourceVersion:"3833", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 17, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.26.37.129", ContainerID:"3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171", Pod:"csi-node-driver-qszbs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliab9289b0af5", MAC:"ea:80:34:fc:b6:9a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:17:29.496097 env[2103]: 2024-04-12 21:17:29.493 [INFO][3840] k8s.go 498: Wrote updated endpoint to datastore ContainerID="3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171" Namespace="calico-system" Pod="csi-node-driver-qszbs" WorkloadEndpoint="10.26.37.129-k8s-csi--node--driver--qszbs-eth0" Apr 12 21:17:29.504435 env[2103]: time="2024-04-12T21:17:29.504389626Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:17:29.504435 env[2103]: time="2024-04-12T21:17:29.504426626Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:17:29.504485 env[2103]: time="2024-04-12T21:17:29.504436546Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:17:29.504586 env[2103]: time="2024-04-12T21:17:29.504559906Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171 pid=3904 runtime=io.containerd.runc.v2 Apr 12 21:17:29.503000 audit[3905]: NETFILTER_CFG table=filter:69 family=2 entries=36 op=nft_register_chain pid=3905 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:17:29.515677 systemd[1]: Started cri-containerd-3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171.scope. Apr 12 21:17:29.516000 kernel: kauditd_printk_skb: 157 callbacks suppressed Apr 12 21:17:29.516021 kernel: audit: type=1325 audit(1712956649.503:692): table=filter:69 family=2 entries=36 op=nft_register_chain pid=3905 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:17:29.503000 audit[3905]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20404 a0=3 a1=ffffeb75f070 a2=0 a3=ffffa1d83fa8 items=0 ppid=3395 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:29.599135 kernel: audit: type=1300 audit(1712956649.503:692): arch=c00000b7 syscall=211 success=yes exit=20404 a0=3 a1=ffffeb75f070 a2=0 a3=ffffa1d83fa8 items=0 ppid=3395 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:29.599200 kernel: audit: type=1327 audit(1712956649.503:692): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:17:29.503000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:17:29.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.671772 kernel: audit: type=1400 audit(1712956649.569:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.671849 kernel: audit: type=1400 audit(1712956649.569:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.746039 kernel: audit: type=1400 audit(1712956649.569:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.746075 kernel: audit: type=1400 audit(1712956649.569:696): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.821089 kernel: audit: type=1400 audit(1712956649.569:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.821132 kernel: audit: type=1400 audit(1712956649.569:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.828070 env[2103]: time="2024-04-12T21:17:29.828043386Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qszbs,Uid:e30db219-8f66-413d-8015-bd3fe6999f3e,Namespace:calico-system,Attempt:1,} returns sandbox id \"3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171\"" Apr 12 21:17:29.829144 env[2103]: time="2024-04-12T21:17:29.829120746Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 21:17:29.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.896299 kernel: audit: type=1400 audit(1712956649.569:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.598000 audit: BPF prog-id=88 op=LOAD Apr 12 21:17:29.598000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.598000 audit[3915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3904 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:29.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338373862323330383566666362616263343964306261356436643731 Apr 12 21:17:29.598000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.598000 audit[3915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3904 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:29.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338373862323330383566666362616263343964306261356436643731 Apr 12 21:17:29.598000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.598000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.598000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.598000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.598000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.598000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.598000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.598000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.598000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.598000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.598000 audit: BPF prog-id=89 op=LOAD Apr 12 21:17:29.598000 audit[3915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3904 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:29.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338373862323330383566666362616263343964306261356436643731 Apr 12 21:17:29.633000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.633000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.633000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.633000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.633000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.633000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.633000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.633000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.633000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.633000 audit: BPF prog-id=90 op=LOAD Apr 12 21:17:29.633000 audit[3915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3904 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:29.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338373862323330383566666362616263343964306261356436643731 Apr 12 21:17:29.671000 audit: BPF prog-id=90 op=UNLOAD Apr 12 21:17:29.671000 audit: BPF prog-id=89 op=UNLOAD Apr 12 21:17:29.671000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.671000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.671000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.671000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.671000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.671000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.671000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.671000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.671000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.671000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:29.671000 audit: BPF prog-id=91 op=LOAD Apr 12 21:17:29.671000 audit[3915]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3904 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:29.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338373862323330383566666362616263343964306261356436643731 Apr 12 21:17:30.208147 kubelet[2519]: E0412 21:17:30.208082 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:30.280083 env[2103]: time="2024-04-12T21:17:30.280047706Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:30.280641 env[2103]: time="2024-04-12T21:17:30.280619226Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:30.281489 env[2103]: time="2024-04-12T21:17:30.281472866Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:30.282282 env[2103]: time="2024-04-12T21:17:30.282267786Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:30.282702 env[2103]: time="2024-04-12T21:17:30.282678186Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db\"" Apr 12 21:17:30.284046 env[2103]: time="2024-04-12T21:17:30.284021946Z" level=info msg="CreateContainer within sandbox \"3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 21:17:30.289716 env[2103]: time="2024-04-12T21:17:30.289680666Z" level=info msg="CreateContainer within sandbox \"3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"811368febd8837a142496424a829d976439e6dc9b3057faf71abf335b35d6aae\"" Apr 12 21:17:30.290264 env[2103]: time="2024-04-12T21:17:30.290235026Z" level=info msg="StartContainer for \"811368febd8837a142496424a829d976439e6dc9b3057faf71abf335b35d6aae\"" Apr 12 21:17:30.303109 systemd[1]: Started cri-containerd-811368febd8837a142496424a829d976439e6dc9b3057faf71abf335b35d6aae.scope. Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3904 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:30.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831313336386665626438383337613134323439363432346138323964 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit: BPF prog-id=92 op=LOAD Apr 12 21:17:30.318000 audit[3945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3904 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:30.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831313336386665626438383337613134323439363432346138323964 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit: BPF prog-id=93 op=LOAD Apr 12 21:17:30.318000 audit[3945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3904 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:30.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831313336386665626438383337613134323439363432346138323964 Apr 12 21:17:30.318000 audit: BPF prog-id=93 op=UNLOAD Apr 12 21:17:30.318000 audit: BPF prog-id=92 op=UNLOAD Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.318000 audit: BPF prog-id=94 op=LOAD Apr 12 21:17:30.318000 audit[3945]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3904 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:30.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831313336386665626438383337613134323439363432346138323964 Apr 12 21:17:30.332163 env[2103]: time="2024-04-12T21:17:30.332130626Z" level=info msg="StartContainer for \"811368febd8837a142496424a829d976439e6dc9b3057faf71abf335b35d6aae\" returns successfully" Apr 12 21:17:30.332955 env[2103]: time="2024-04-12T21:17:30.332932826Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 21:17:30.772485 env[2103]: time="2024-04-12T21:17:30.772445906Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:30.773111 env[2103]: time="2024-04-12T21:17:30.773086346Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:30.774064 env[2103]: time="2024-04-12T21:17:30.774049506Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:30.774945 env[2103]: time="2024-04-12T21:17:30.774928346Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:30.775369 env[2103]: time="2024-04-12T21:17:30.775340666Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146\"" Apr 12 21:17:30.776901 env[2103]: time="2024-04-12T21:17:30.776879706Z" level=info msg="CreateContainer within sandbox \"3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 21:17:30.782519 env[2103]: time="2024-04-12T21:17:30.782490306Z" level=info msg="CreateContainer within sandbox \"3878b23085ffcbabc49d0ba5d6d71e2fc798451df5970a0baa8cf3220ed82171\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"af496ff9b0cc7df26e24918cb5f22e3aad5975b7b54b8d38625b569e396c5200\"" Apr 12 21:17:30.782875 env[2103]: time="2024-04-12T21:17:30.782849986Z" level=info msg="StartContainer for \"af496ff9b0cc7df26e24918cb5f22e3aad5975b7b54b8d38625b569e396c5200\"" Apr 12 21:17:30.796813 systemd[1]: Started cri-containerd-af496ff9b0cc7df26e24918cb5f22e3aad5975b7b54b8d38625b569e396c5200.scope. Apr 12 21:17:30.810000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.810000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3904 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:30.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166343936666639623063633764663236653234393138636235663232 Apr 12 21:17:30.810000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.810000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.810000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.810000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.810000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.810000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.810000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.810000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.810000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.810000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.810000 audit: BPF prog-id=95 op=LOAD Apr 12 21:17:30.810000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3904 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:30.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166343936666639623063633764663236653234393138636235663232 Apr 12 21:17:30.811000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.811000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.811000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.811000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.811000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.811000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.811000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.811000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.811000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.811000 audit: BPF prog-id=96 op=LOAD Apr 12 21:17:30.811000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3904 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:30.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166343936666639623063633764663236653234393138636235663232 Apr 12 21:17:30.811000 audit: BPF prog-id=96 op=UNLOAD Apr 12 21:17:30.811000 audit: BPF prog-id=95 op=UNLOAD Apr 12 21:17:30.811000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.811000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.811000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.811000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.811000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.811000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.811000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.811000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.811000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.811000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:30.811000 audit: BPF prog-id=97 op=LOAD Apr 12 21:17:30.811000 audit[3981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3904 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:30.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166343936666639623063633764663236653234393138636235663232 Apr 12 21:17:30.820506 env[2103]: time="2024-04-12T21:17:30.820479426Z" level=info msg="StartContainer for \"af496ff9b0cc7df26e24918cb5f22e3aad5975b7b54b8d38625b569e396c5200\" returns successfully" Apr 12 21:17:30.942849 kubelet[2519]: I0412 21:17:30.942802 2519 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 21:17:31.208612 kubelet[2519]: E0412 21:17:31.208546 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:31.262840 kubelet[2519]: I0412 21:17:31.262820 2519 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 21:17:31.262925 kubelet[2519]: I0412 21:17:31.262919 2519 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 21:17:31.343344 kubelet[2519]: I0412 21:17:31.343320 2519 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-qszbs" podStartSLOduration=21.396621866 podCreationTimestamp="2024-04-12 21:17:09 +0000 UTC" firstStartedPulling="2024-04-12 21:17:29.828878866 +0000 UTC m=+21.381097201" lastFinishedPulling="2024-04-12 21:17:30.775542946 +0000 UTC m=+22.327761361" observedRunningTime="2024-04-12 21:17:31.343132586 +0000 UTC m=+22.895351001" watchObservedRunningTime="2024-04-12 21:17:31.343286026 +0000 UTC m=+22.895504401" Apr 12 21:17:31.409994 systemd-networkd[1922]: caliab9289b0af5: Gained IPv6LL Apr 12 21:17:32.209283 kubelet[2519]: E0412 21:17:32.209251 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:33.209890 kubelet[2519]: E0412 21:17:33.209865 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:34.210144 kubelet[2519]: E0412 21:17:34.210123 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:34.288601 env[2103]: time="2024-04-12T21:17:34.288552826Z" level=info msg="StopPodSandbox for \"e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe\"" Apr 12 21:17:34.353892 env[2103]: 2024-04-12 21:17:34.323 [INFO][4094] k8s.go 585: Cleaning up netns ContainerID="e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe" Apr 12 21:17:34.353892 env[2103]: 2024-04-12 21:17:34.323 [INFO][4094] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe" iface="eth0" netns="/var/run/netns/cni-7a1798a8-258c-d67b-2510-53ff7c8d56c2" Apr 12 21:17:34.353892 env[2103]: 2024-04-12 21:17:34.323 [INFO][4094] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe" iface="eth0" netns="/var/run/netns/cni-7a1798a8-258c-d67b-2510-53ff7c8d56c2" Apr 12 21:17:34.353892 env[2103]: 2024-04-12 21:17:34.323 [INFO][4094] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe" iface="eth0" netns="/var/run/netns/cni-7a1798a8-258c-d67b-2510-53ff7c8d56c2" Apr 12 21:17:34.353892 env[2103]: 2024-04-12 21:17:34.323 [INFO][4094] k8s.go 592: Releasing IP address(es) ContainerID="e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe" Apr 12 21:17:34.353892 env[2103]: 2024-04-12 21:17:34.323 [INFO][4094] utils.go 188: Calico CNI releasing IP address ContainerID="e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe" Apr 12 21:17:34.353892 env[2103]: 2024-04-12 21:17:34.341 [INFO][4110] ipam_plugin.go 415: Releasing address using handleID ContainerID="e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe" HandleID="k8s-pod-network.e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe" Workload="10.26.37.129-k8s-nginx--deployment--6d5f899847--ggm4x-eth0" Apr 12 21:17:34.353892 env[2103]: 2024-04-12 21:17:34.341 [INFO][4110] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:17:34.353892 env[2103]: 2024-04-12 21:17:34.341 [INFO][4110] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:17:34.354222 env[2103]: 2024-04-12 21:17:34.349 [WARNING][4110] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe" HandleID="k8s-pod-network.e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe" Workload="10.26.37.129-k8s-nginx--deployment--6d5f899847--ggm4x-eth0" Apr 12 21:17:34.354222 env[2103]: 2024-04-12 21:17:34.349 [INFO][4110] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe" HandleID="k8s-pod-network.e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe" Workload="10.26.37.129-k8s-nginx--deployment--6d5f899847--ggm4x-eth0" Apr 12 21:17:34.354222 env[2103]: 2024-04-12 21:17:34.351 [INFO][4110] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:17:34.354222 env[2103]: 2024-04-12 21:17:34.352 [INFO][4094] k8s.go 598: Teardown processing complete. ContainerID="e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe" Apr 12 21:17:34.354222 env[2103]: time="2024-04-12T21:17:34.354090666Z" level=info msg="TearDown network for sandbox \"e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe\" successfully" Apr 12 21:17:34.354222 env[2103]: time="2024-04-12T21:17:34.354120866Z" level=info msg="StopPodSandbox for \"e22f2998b6b06df8f151f5f839e0b13b378b36fb43f2fbebee47c0a7b11fcdbe\" returns successfully" Apr 12 21:17:34.354572 env[2103]: time="2024-04-12T21:17:34.354547066Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-ggm4x,Uid:6cdb886c-a763-4c51-a1eb-1f71e9591053,Namespace:default,Attempt:1,}" Apr 12 21:17:34.355234 systemd[1]: run-netns-cni\x2d7a1798a8\x2d258c\x2dd67b\x2d2510\x2d53ff7c8d56c2.mount: Deactivated successfully. Apr 12 21:17:34.439468 systemd-networkd[1922]: calia19f1e6a7eb: Link UP Apr 12 21:17:34.464663 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 21:17:34.464722 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia19f1e6a7eb: link becomes ready Apr 12 21:17:34.464806 systemd-networkd[1922]: calia19f1e6a7eb: Gained carrier Apr 12 21:17:34.470086 env[2103]: 2024-04-12 21:17:34.387 [INFO][4130] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.26.37.129-k8s-nginx--deployment--6d5f899847--ggm4x-eth0 nginx-deployment-6d5f899847- default 6cdb886c-a763-4c51-a1eb-1f71e9591053 3865 0 2024-04-12 21:17:18 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.26.37.129 nginx-deployment-6d5f899847-ggm4x eth0 default [] [] [kns.default ksa.default.default] calia19f1e6a7eb [] []}} ContainerID="efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d" Namespace="default" Pod="nginx-deployment-6d5f899847-ggm4x" WorkloadEndpoint="10.26.37.129-k8s-nginx--deployment--6d5f899847--ggm4x-" Apr 12 21:17:34.470086 env[2103]: 2024-04-12 21:17:34.387 [INFO][4130] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d" Namespace="default" Pod="nginx-deployment-6d5f899847-ggm4x" WorkloadEndpoint="10.26.37.129-k8s-nginx--deployment--6d5f899847--ggm4x-eth0" Apr 12 21:17:34.470086 env[2103]: 2024-04-12 21:17:34.409 [INFO][4157] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d" HandleID="k8s-pod-network.efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d" Workload="10.26.37.129-k8s-nginx--deployment--6d5f899847--ggm4x-eth0" Apr 12 21:17:34.470185 env[2103]: 2024-04-12 21:17:34.419 [INFO][4157] ipam_plugin.go 268: Auto assigning IP ContainerID="efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d" HandleID="k8s-pod-network.efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d" Workload="10.26.37.129-k8s-nginx--deployment--6d5f899847--ggm4x-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003c3b50), Attrs:map[string]string{"namespace":"default", "node":"10.26.37.129", "pod":"nginx-deployment-6d5f899847-ggm4x", "timestamp":"2024-04-12 21:17:34.409412106 +0000 UTC"}, Hostname:"10.26.37.129", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 21:17:34.470185 env[2103]: 2024-04-12 21:17:34.419 [INFO][4157] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:17:34.470185 env[2103]: 2024-04-12 21:17:34.419 [INFO][4157] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:17:34.470185 env[2103]: 2024-04-12 21:17:34.419 [INFO][4157] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.26.37.129' Apr 12 21:17:34.470185 env[2103]: 2024-04-12 21:17:34.420 [INFO][4157] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d" host="10.26.37.129" Apr 12 21:17:34.470185 env[2103]: 2024-04-12 21:17:34.424 [INFO][4157] ipam.go 372: Looking up existing affinities for host host="10.26.37.129" Apr 12 21:17:34.470185 env[2103]: 2024-04-12 21:17:34.427 [INFO][4157] ipam.go 489: Trying affinity for 192.168.125.64/26 host="10.26.37.129" Apr 12 21:17:34.470185 env[2103]: 2024-04-12 21:17:34.428 [INFO][4157] ipam.go 155: Attempting to load block cidr=192.168.125.64/26 host="10.26.37.129" Apr 12 21:17:34.470185 env[2103]: 2024-04-12 21:17:34.430 [INFO][4157] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.64/26 host="10.26.37.129" Apr 12 21:17:34.470185 env[2103]: 2024-04-12 21:17:34.430 [INFO][4157] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.64/26 handle="k8s-pod-network.efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d" host="10.26.37.129" Apr 12 21:17:34.470381 env[2103]: 2024-04-12 21:17:34.431 [INFO][4157] ipam.go 1682: Creating new handle: k8s-pod-network.efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d Apr 12 21:17:34.470381 env[2103]: 2024-04-12 21:17:34.433 [INFO][4157] ipam.go 1203: Writing block in order to claim IPs block=192.168.125.64/26 handle="k8s-pod-network.efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d" host="10.26.37.129" Apr 12 21:17:34.470381 env[2103]: 2024-04-12 21:17:34.436 [INFO][4157] ipam.go 1216: Successfully claimed IPs: [192.168.125.66/26] block=192.168.125.64/26 handle="k8s-pod-network.efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d" host="10.26.37.129" Apr 12 21:17:34.470381 env[2103]: 2024-04-12 21:17:34.437 [INFO][4157] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.66/26] handle="k8s-pod-network.efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d" host="10.26.37.129" Apr 12 21:17:34.470381 env[2103]: 2024-04-12 21:17:34.437 [INFO][4157] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:17:34.470381 env[2103]: 2024-04-12 21:17:34.437 [INFO][4157] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.125.66/26] IPv6=[] ContainerID="efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d" HandleID="k8s-pod-network.efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d" Workload="10.26.37.129-k8s-nginx--deployment--6d5f899847--ggm4x-eth0" Apr 12 21:17:34.470492 env[2103]: 2024-04-12 21:17:34.438 [INFO][4130] k8s.go 385: Populated endpoint ContainerID="efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d" Namespace="default" Pod="nginx-deployment-6d5f899847-ggm4x" WorkloadEndpoint="10.26.37.129-k8s-nginx--deployment--6d5f899847--ggm4x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.26.37.129-k8s-nginx--deployment--6d5f899847--ggm4x-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"6cdb886c-a763-4c51-a1eb-1f71e9591053", ResourceVersion:"3865", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 17, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.26.37.129", ContainerID:"", Pod:"nginx-deployment-6d5f899847-ggm4x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia19f1e6a7eb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:17:34.470492 env[2103]: 2024-04-12 21:17:34.438 [INFO][4130] k8s.go 386: Calico CNI using IPs: [192.168.125.66/32] ContainerID="efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d" Namespace="default" Pod="nginx-deployment-6d5f899847-ggm4x" WorkloadEndpoint="10.26.37.129-k8s-nginx--deployment--6d5f899847--ggm4x-eth0" Apr 12 21:17:34.470555 env[2103]: 2024-04-12 21:17:34.438 [INFO][4130] dataplane_linux.go 68: Setting the host side veth name to calia19f1e6a7eb ContainerID="efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d" Namespace="default" Pod="nginx-deployment-6d5f899847-ggm4x" WorkloadEndpoint="10.26.37.129-k8s-nginx--deployment--6d5f899847--ggm4x-eth0" Apr 12 21:17:34.470555 env[2103]: 2024-04-12 21:17:34.464 [INFO][4130] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d" Namespace="default" Pod="nginx-deployment-6d5f899847-ggm4x" WorkloadEndpoint="10.26.37.129-k8s-nginx--deployment--6d5f899847--ggm4x-eth0" Apr 12 21:17:34.470590 env[2103]: 2024-04-12 21:17:34.465 [INFO][4130] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d" Namespace="default" Pod="nginx-deployment-6d5f899847-ggm4x" WorkloadEndpoint="10.26.37.129-k8s-nginx--deployment--6d5f899847--ggm4x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.26.37.129-k8s-nginx--deployment--6d5f899847--ggm4x-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"6cdb886c-a763-4c51-a1eb-1f71e9591053", ResourceVersion:"3865", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 17, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.26.37.129", ContainerID:"efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d", Pod:"nginx-deployment-6d5f899847-ggm4x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia19f1e6a7eb", MAC:"9e:aa:bd:9e:8f:f5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:17:34.470590 env[2103]: 2024-04-12 21:17:34.468 [INFO][4130] k8s.go 498: Wrote updated endpoint to datastore ContainerID="efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d" Namespace="default" Pod="nginx-deployment-6d5f899847-ggm4x" WorkloadEndpoint="10.26.37.129-k8s-nginx--deployment--6d5f899847--ggm4x-eth0" Apr 12 21:17:34.478000 audit[4194]: NETFILTER_CFG table=filter:70 family=2 entries=40 op=nft_register_chain pid=4194 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:17:34.478000 audit[4194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21560 a0=3 a1=ffffd2e8b880 a2=0 a3=ffff8d305fa8 items=0 ppid=3395 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:34.478000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:17:34.479997 env[2103]: time="2024-04-12T21:17:34.479953826Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:17:34.480030 env[2103]: time="2024-04-12T21:17:34.479991906Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:17:34.480030 env[2103]: time="2024-04-12T21:17:34.480002626Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:17:34.480132 env[2103]: time="2024-04-12T21:17:34.480114186Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d pid=4198 runtime=io.containerd.runc.v2 Apr 12 21:17:34.489655 systemd[1]: Started cri-containerd-efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d.scope. Apr 12 21:17:34.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit: BPF prog-id=98 op=LOAD Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4198 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:34.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566623336346563333831366235303866633061383330383436656139 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4198 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:34.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566623336346563333831366235303866633061383330383436656139 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit: BPF prog-id=99 op=LOAD Apr 12 21:17:34.502000 audit[4207]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4198 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:34.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566623336346563333831366235303866633061383330383436656139 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit: BPF prog-id=100 op=LOAD Apr 12 21:17:34.502000 audit[4207]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4198 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:34.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566623336346563333831366235303866633061383330383436656139 Apr 12 21:17:34.502000 audit: BPF prog-id=100 op=UNLOAD Apr 12 21:17:34.502000 audit: BPF prog-id=99 op=UNLOAD Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:34.502000 audit: BPF prog-id=101 op=LOAD Apr 12 21:17:34.502000 audit[4207]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4198 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:34.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566623336346563333831366235303866633061383330383436656139 Apr 12 21:17:34.517484 env[2103]: time="2024-04-12T21:17:34.517447586Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-ggm4x,Uid:6cdb886c-a763-4c51-a1eb-1f71e9591053,Namespace:default,Attempt:1,} returns sandbox id \"efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d\"" Apr 12 21:17:34.518459 env[2103]: time="2024-04-12T21:17:34.518438666Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 21:17:35.210617 kubelet[2519]: E0412 21:17:35.210591 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:35.859036 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4102802207.mount: Deactivated successfully. Apr 12 21:17:36.211602 kubelet[2519]: E0412 21:17:36.211574 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:36.338040 systemd-networkd[1922]: calia19f1e6a7eb: Gained IPv6LL Apr 12 21:17:36.514185 env[2103]: time="2024-04-12T21:17:36.514110026Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:36.514982 env[2103]: time="2024-04-12T21:17:36.514958826Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:36.516772 env[2103]: time="2024-04-12T21:17:36.516752106Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:36.518069 env[2103]: time="2024-04-12T21:17:36.518053706Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:36.518765 env[2103]: time="2024-04-12T21:17:36.518743546Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56\"" Apr 12 21:17:36.520075 env[2103]: time="2024-04-12T21:17:36.520054026Z" level=info msg="CreateContainer within sandbox \"efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Apr 12 21:17:36.526379 env[2103]: time="2024-04-12T21:17:36.526348346Z" level=info msg="CreateContainer within sandbox \"efb364ec3816b508fc0a830846ea91584c4a81c3befc72a7c6a471631418f29d\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"8c6418563d1b5d4293916fc16cf19661434a0a3c92f9aa3cb26728b8b08ac4fa\"" Apr 12 21:17:36.526917 env[2103]: time="2024-04-12T21:17:36.526864506Z" level=info msg="StartContainer for \"8c6418563d1b5d4293916fc16cf19661434a0a3c92f9aa3cb26728b8b08ac4fa\"" Apr 12 21:17:36.540687 systemd[1]: Started cri-containerd-8c6418563d1b5d4293916fc16cf19661434a0a3c92f9aa3cb26728b8b08ac4fa.scope. Apr 12 21:17:36.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.563328 kernel: kauditd_printk_skb: 196 callbacks suppressed Apr 12 21:17:36.563373 kernel: audit: type=1400 audit(1712956656.551:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.638200 kernel: audit: type=1400 audit(1712956656.551:743): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.638216 kernel: audit: type=1400 audit(1712956656.551:744): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.713509 kernel: audit: type=1400 audit(1712956656.551:745): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.713541 kernel: audit: type=1400 audit(1712956656.551:746): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.788954 kernel: audit: type=1400 audit(1712956656.551:747): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.788990 kernel: audit: type=1400 audit(1712956656.551:748): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.797541 env[2103]: time="2024-04-12T21:17:36.797509066Z" level=info msg="StartContainer for \"8c6418563d1b5d4293916fc16cf19661434a0a3c92f9aa3cb26728b8b08ac4fa\" returns successfully" Apr 12 21:17:36.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.866343 kernel: audit: type=1400 audit(1712956656.551:749): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.866450 kernel: audit: type=1400 audit(1712956656.551:750): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.941090 kernel: audit: type=1400 audit(1712956656.562:751): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.562000 audit: BPF prog-id=102 op=LOAD Apr 12 21:17:36.562000 audit[4242]: AVC avc: denied { bpf } for pid=4242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.562000 audit[4242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4198 pid=4242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:36.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863363431383536336431623564343239333931366663313663663139 Apr 12 21:17:36.562000 audit[4242]: AVC avc: denied { perfmon } for pid=4242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.562000 audit[4242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4198 pid=4242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:36.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863363431383536336431623564343239333931366663313663663139 Apr 12 21:17:36.562000 audit[4242]: AVC avc: denied { bpf } for pid=4242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.562000 audit[4242]: AVC avc: denied { bpf } for pid=4242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.562000 audit[4242]: AVC avc: denied { bpf } for pid=4242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.562000 audit[4242]: AVC avc: denied { perfmon } for pid=4242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.562000 audit[4242]: AVC avc: denied { perfmon } for pid=4242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.562000 audit[4242]: AVC avc: denied { perfmon } for pid=4242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.562000 audit[4242]: AVC avc: denied { perfmon } for pid=4242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.562000 audit[4242]: AVC avc: denied { perfmon } for pid=4242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.562000 audit[4242]: AVC avc: denied { bpf } for pid=4242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.562000 audit[4242]: AVC avc: denied { bpf } for pid=4242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.562000 audit: BPF prog-id=103 op=LOAD Apr 12 21:17:36.562000 audit[4242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4198 pid=4242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:36.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863363431383536336431623564343239333931366663313663663139 Apr 12 21:17:36.599000 audit[4242]: AVC avc: denied { bpf } for pid=4242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.599000 audit[4242]: AVC avc: denied { bpf } for pid=4242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.599000 audit[4242]: AVC avc: denied { perfmon } for pid=4242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.599000 audit[4242]: AVC avc: denied { perfmon } for pid=4242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.599000 audit[4242]: AVC avc: denied { perfmon } for pid=4242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.599000 audit[4242]: AVC avc: denied { perfmon } for pid=4242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.599000 audit[4242]: AVC avc: denied { perfmon } for pid=4242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.599000 audit[4242]: AVC avc: denied { bpf } for pid=4242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.599000 audit[4242]: AVC avc: denied { bpf } for pid=4242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.599000 audit: BPF prog-id=104 op=LOAD Apr 12 21:17:36.599000 audit[4242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4198 pid=4242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:36.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863363431383536336431623564343239333931366663313663663139 Apr 12 21:17:36.637000 audit: BPF prog-id=104 op=UNLOAD Apr 12 21:17:36.637000 audit: BPF prog-id=103 op=UNLOAD Apr 12 21:17:36.637000 audit[4242]: AVC avc: denied { bpf } for pid=4242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.637000 audit[4242]: AVC avc: denied { bpf } for pid=4242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.637000 audit[4242]: AVC avc: denied { bpf } for pid=4242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.637000 audit[4242]: AVC avc: denied { perfmon } for pid=4242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.637000 audit[4242]: AVC avc: denied { perfmon } for pid=4242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.637000 audit[4242]: AVC avc: denied { perfmon } for pid=4242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.637000 audit[4242]: AVC avc: denied { perfmon } for pid=4242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.637000 audit[4242]: AVC avc: denied { perfmon } for pid=4242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.637000 audit[4242]: AVC avc: denied { bpf } for pid=4242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.637000 audit[4242]: AVC avc: denied { bpf } for pid=4242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:36.637000 audit: BPF prog-id=105 op=LOAD Apr 12 21:17:36.637000 audit[4242]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4198 pid=4242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:36.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863363431383536336431623564343239333931366663313663663139 Apr 12 21:17:37.212689 kubelet[2519]: E0412 21:17:37.212637 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:37.351914 kubelet[2519]: I0412 21:17:37.351888 2519 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-ggm4x" podStartSLOduration=17.350694426 podCreationTimestamp="2024-04-12 21:17:18 +0000 UTC" firstStartedPulling="2024-04-12 21:17:34.518238946 +0000 UTC m=+26.070457321" lastFinishedPulling="2024-04-12 21:17:36.518932626 +0000 UTC m=+28.071151001" observedRunningTime="2024-04-12 21:17:37.350359546 +0000 UTC m=+28.902577921" watchObservedRunningTime="2024-04-12 21:17:37.351388106 +0000 UTC m=+28.903606441" Apr 12 21:17:38.215489 kubelet[2519]: E0412 21:17:38.215457 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:38.277145 update_engine[2095]: I0412 21:17:38.277052 2095 update_attempter.cc:509] Updating boot flags... Apr 12 21:17:39.216063 kubelet[2519]: E0412 21:17:39.216038 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:40.216841 kubelet[2519]: E0412 21:17:40.216816 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:41.217301 kubelet[2519]: E0412 21:17:41.217276 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:42.217619 kubelet[2519]: E0412 21:17:42.217597 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:43.218598 kubelet[2519]: E0412 21:17:43.218565 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:44.220244 kubelet[2519]: E0412 21:17:44.220188 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:45.220403 kubelet[2519]: E0412 21:17:45.220337 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:45.349000 audit[4407]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=4407 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:17:45.355218 kubelet[2519]: I0412 21:17:45.354911 2519 topology_manager.go:215] "Topology Admit Handler" podUID="14dd5be4-3607-40f5-bb96-b75988e398dc" podNamespace="default" podName="nfs-server-provisioner-0" Apr 12 21:17:45.358956 systemd[1]: Created slice kubepods-besteffort-pod14dd5be4_3607_40f5_bb96_b75988e398dc.slice. Apr 12 21:17:45.361595 kernel: kauditd_printk_skb: 47 callbacks suppressed Apr 12 21:17:45.361744 kernel: audit: type=1325 audit(1712956665.349:760): table=filter:71 family=2 entries=20 op=nft_register_rule pid=4407 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:17:45.349000 audit[4407]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffe17bf200 a2=0 a3=1 items=0 ppid=2819 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:45.393416 kubelet[2519]: I0412 21:17:45.393401 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/14dd5be4-3607-40f5-bb96-b75988e398dc-data\") pod \"nfs-server-provisioner-0\" (UID: \"14dd5be4-3607-40f5-bb96-b75988e398dc\") " pod="default/nfs-server-provisioner-0" Apr 12 21:17:45.393558 kubelet[2519]: I0412 21:17:45.393439 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5spmx\" (UniqueName: \"kubernetes.io/projected/14dd5be4-3607-40f5-bb96-b75988e398dc-kube-api-access-5spmx\") pod \"nfs-server-provisioner-0\" (UID: \"14dd5be4-3607-40f5-bb96-b75988e398dc\") " pod="default/nfs-server-provisioner-0" Apr 12 21:17:45.444042 kernel: audit: type=1300 audit(1712956665.349:760): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffe17bf200 a2=0 a3=1 items=0 ppid=2819 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:45.444137 kernel: audit: type=1327 audit(1712956665.349:760): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:17:45.349000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:17:45.476000 audit[4407]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=4407 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:17:45.476000 audit[4407]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe17bf200 a2=0 a3=1 items=0 ppid=2819 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:45.560186 kernel: audit: type=1325 audit(1712956665.476:761): table=nat:72 family=2 entries=22 op=nft_register_rule pid=4407 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:17:45.560288 kernel: audit: type=1300 audit(1712956665.476:761): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe17bf200 a2=0 a3=1 items=0 ppid=2819 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:45.560348 kernel: audit: type=1327 audit(1712956665.476:761): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:17:45.476000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:17:45.597000 audit[4412]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=4412 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:17:45.597000 audit[4412]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffcad04cc0 a2=0 a3=1 items=0 ppid=2819 pid=4412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:45.661029 env[2103]: time="2024-04-12T21:17:45.660989226Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:14dd5be4-3607-40f5-bb96-b75988e398dc,Namespace:default,Attempt:0,}" Apr 12 21:17:45.681492 kernel: audit: type=1325 audit(1712956665.597:762): table=filter:73 family=2 entries=32 op=nft_register_rule pid=4412 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:17:45.681615 kernel: audit: type=1300 audit(1712956665.597:762): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffcad04cc0 a2=0 a3=1 items=0 ppid=2819 pid=4412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:45.681647 kernel: audit: type=1327 audit(1712956665.597:762): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:17:45.597000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:17:45.722000 audit[4412]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=4412 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:17:45.722000 audit[4412]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffcad04cc0 a2=0 a3=1 items=0 ppid=2819 pid=4412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:45.722000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:17:45.751841 kernel: audit: type=1325 audit(1712956665.722:763): table=nat:74 family=2 entries=22 op=nft_register_rule pid=4412 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:17:45.753729 systemd-networkd[1922]: cali60e51b789ff: Link UP Apr 12 21:17:45.779378 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 21:17:45.779461 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Apr 12 21:17:45.779642 systemd-networkd[1922]: cali60e51b789ff: Gained carrier Apr 12 21:17:45.786943 env[2103]: 2024-04-12 21:17:45.700 [INFO][4413] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.26.37.129-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 14dd5be4-3607-40f5-bb96-b75988e398dc 3916 0 2024-04-12 21:17:45 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.26.37.129 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.26.37.129-k8s-nfs--server--provisioner--0-" Apr 12 21:17:45.786943 env[2103]: 2024-04-12 21:17:45.700 [INFO][4413] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.26.37.129-k8s-nfs--server--provisioner--0-eth0" Apr 12 21:17:45.786943 env[2103]: 2024-04-12 21:17:45.722 [INFO][4433] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be" HandleID="k8s-pod-network.d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be" Workload="10.26.37.129-k8s-nfs--server--provisioner--0-eth0" Apr 12 21:17:45.787183 env[2103]: 2024-04-12 21:17:45.732 [INFO][4433] ipam_plugin.go 268: Auto assigning IP ContainerID="d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be" HandleID="k8s-pod-network.d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be" Workload="10.26.37.129-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003c3660), Attrs:map[string]string{"namespace":"default", "node":"10.26.37.129", "pod":"nfs-server-provisioner-0", "timestamp":"2024-04-12 21:17:45.722243746 +0000 UTC"}, Hostname:"10.26.37.129", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 21:17:45.787183 env[2103]: 2024-04-12 21:17:45.732 [INFO][4433] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:17:45.787183 env[2103]: 2024-04-12 21:17:45.732 [INFO][4433] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:17:45.787183 env[2103]: 2024-04-12 21:17:45.732 [INFO][4433] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.26.37.129' Apr 12 21:17:45.787183 env[2103]: 2024-04-12 21:17:45.734 [INFO][4433] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be" host="10.26.37.129" Apr 12 21:17:45.787183 env[2103]: 2024-04-12 21:17:45.737 [INFO][4433] ipam.go 372: Looking up existing affinities for host host="10.26.37.129" Apr 12 21:17:45.787183 env[2103]: 2024-04-12 21:17:45.740 [INFO][4433] ipam.go 489: Trying affinity for 192.168.125.64/26 host="10.26.37.129" Apr 12 21:17:45.787183 env[2103]: 2024-04-12 21:17:45.741 [INFO][4433] ipam.go 155: Attempting to load block cidr=192.168.125.64/26 host="10.26.37.129" Apr 12 21:17:45.787183 env[2103]: 2024-04-12 21:17:45.743 [INFO][4433] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.64/26 host="10.26.37.129" Apr 12 21:17:45.787183 env[2103]: 2024-04-12 21:17:45.744 [INFO][4433] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.64/26 handle="k8s-pod-network.d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be" host="10.26.37.129" Apr 12 21:17:45.787375 env[2103]: 2024-04-12 21:17:45.745 [INFO][4433] ipam.go 1682: Creating new handle: k8s-pod-network.d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be Apr 12 21:17:45.787375 env[2103]: 2024-04-12 21:17:45.747 [INFO][4433] ipam.go 1203: Writing block in order to claim IPs block=192.168.125.64/26 handle="k8s-pod-network.d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be" host="10.26.37.129" Apr 12 21:17:45.787375 env[2103]: 2024-04-12 21:17:45.751 [INFO][4433] ipam.go 1216: Successfully claimed IPs: [192.168.125.67/26] block=192.168.125.64/26 handle="k8s-pod-network.d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be" host="10.26.37.129" Apr 12 21:17:45.787375 env[2103]: 2024-04-12 21:17:45.751 [INFO][4433] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.67/26] handle="k8s-pod-network.d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be" host="10.26.37.129" Apr 12 21:17:45.787375 env[2103]: 2024-04-12 21:17:45.751 [INFO][4433] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:17:45.787375 env[2103]: 2024-04-12 21:17:45.751 [INFO][4433] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.125.67/26] IPv6=[] ContainerID="d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be" HandleID="k8s-pod-network.d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be" Workload="10.26.37.129-k8s-nfs--server--provisioner--0-eth0" Apr 12 21:17:45.787487 env[2103]: 2024-04-12 21:17:45.752 [INFO][4413] k8s.go 385: Populated endpoint ContainerID="d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.26.37.129-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.26.37.129-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"14dd5be4-3607-40f5-bb96-b75988e398dc", ResourceVersion:"3916", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 17, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.26.37.129", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.125.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:17:45.787487 env[2103]: 2024-04-12 21:17:45.752 [INFO][4413] k8s.go 386: Calico CNI using IPs: [192.168.125.67/32] ContainerID="d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.26.37.129-k8s-nfs--server--provisioner--0-eth0" Apr 12 21:17:45.787487 env[2103]: 2024-04-12 21:17:45.752 [INFO][4413] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.26.37.129-k8s-nfs--server--provisioner--0-eth0" Apr 12 21:17:45.787487 env[2103]: 2024-04-12 21:17:45.779 [INFO][4413] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.26.37.129-k8s-nfs--server--provisioner--0-eth0" Apr 12 21:17:45.787614 env[2103]: 2024-04-12 21:17:45.779 [INFO][4413] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.26.37.129-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.26.37.129-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"14dd5be4-3607-40f5-bb96-b75988e398dc", ResourceVersion:"3916", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 17, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.26.37.129", ContainerID:"d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.125.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"02:65:8f:e6:d0:21", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:17:45.787614 env[2103]: 2024-04-12 21:17:45.785 [INFO][4413] k8s.go 498: Wrote updated endpoint to datastore ContainerID="d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.26.37.129-k8s-nfs--server--provisioner--0-eth0" Apr 12 21:17:45.796104 env[2103]: time="2024-04-12T21:17:45.796054266Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:17:45.796104 env[2103]: time="2024-04-12T21:17:45.796092626Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:17:45.796145 env[2103]: time="2024-04-12T21:17:45.796102866Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:17:45.796236 env[2103]: time="2024-04-12T21:17:45.796218866Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be pid=4477 runtime=io.containerd.runc.v2 Apr 12 21:17:45.795000 audit[4482]: NETFILTER_CFG table=filter:75 family=2 entries=44 op=nft_register_chain pid=4482 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:17:45.795000 audit[4482]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22672 a0=3 a1=ffffd669a440 a2=0 a3=ffff9e0dcfa8 items=0 ppid=3395 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:45.795000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:17:45.805982 systemd[1]: Started cri-containerd-d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be.scope. Apr 12 21:17:45.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit: BPF prog-id=106 op=LOAD Apr 12 21:17:45.818000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[4487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4477 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:45.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432323433633336396461353831343965643831653833616436616261 Apr 12 21:17:45.818000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[4487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4477 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:45.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432323433633336396461353831343965643831653833616436616261 Apr 12 21:17:45.818000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit: BPF prog-id=107 op=LOAD Apr 12 21:17:45.818000 audit[4487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4477 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:45.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432323433633336396461353831343965643831653833616436616261 Apr 12 21:17:45.818000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.818000 audit: BPF prog-id=108 op=LOAD Apr 12 21:17:45.818000 audit[4487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4477 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:45.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432323433633336396461353831343965643831653833616436616261 Apr 12 21:17:45.819000 audit: BPF prog-id=108 op=UNLOAD Apr 12 21:17:45.819000 audit: BPF prog-id=107 op=UNLOAD Apr 12 21:17:45.819000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.819000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.819000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.819000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.819000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.819000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.819000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.819000 audit[4487]: AVC avc: denied { perfmon } for pid=4487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.819000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.819000 audit[4487]: AVC avc: denied { bpf } for pid=4487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:45.819000 audit: BPF prog-id=109 op=LOAD Apr 12 21:17:45.819000 audit[4487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4477 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:45.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432323433633336396461353831343965643831653833616436616261 Apr 12 21:17:45.834377 env[2103]: time="2024-04-12T21:17:45.834316906Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:14dd5be4-3607-40f5-bb96-b75988e398dc,Namespace:default,Attempt:0,} returns sandbox id \"d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be\"" Apr 12 21:17:45.835509 env[2103]: time="2024-04-12T21:17:45.835485226Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Apr 12 21:17:46.220801 kubelet[2519]: E0412 21:17:46.220778 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:47.154457 systemd-networkd[1922]: cali60e51b789ff: Gained IPv6LL Apr 12 21:17:47.221357 kubelet[2519]: E0412 21:17:47.221338 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:48.221583 kubelet[2519]: E0412 21:17:48.221550 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:49.194516 kubelet[2519]: E0412 21:17:49.194488 2519 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:49.221958 kubelet[2519]: E0412 21:17:49.221942 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:49.363072 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4173593780.mount: Deactivated successfully. Apr 12 21:17:50.222014 kubelet[2519]: E0412 21:17:50.221992 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:50.833852 env[2103]: time="2024-04-12T21:17:50.833804906Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:50.834745 env[2103]: time="2024-04-12T21:17:50.834719066Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:50.838676 env[2103]: time="2024-04-12T21:17:50.838646746Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:50.840596 env[2103]: time="2024-04-12T21:17:50.840561666Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Apr 12 21:17:50.841303 env[2103]: time="2024-04-12T21:17:50.841281706Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:17:50.842964 env[2103]: time="2024-04-12T21:17:50.842931306Z" level=info msg="CreateContainer within sandbox \"d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Apr 12 21:17:50.849601 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount572830460.mount: Deactivated successfully. Apr 12 21:17:50.852877 env[2103]: time="2024-04-12T21:17:50.852846666Z" level=info msg="CreateContainer within sandbox \"d2243c369da58149ed81e83ad6aba9f3d946f710bfb73bac3e67bdf4b35b15be\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"10746b906fb7b376562c620254a479ba806c162813a9b62bb04c80ee25cffa74\"" Apr 12 21:17:50.853170 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount612660008.mount: Deactivated successfully. Apr 12 21:17:50.853225 env[2103]: time="2024-04-12T21:17:50.853198266Z" level=info msg="StartContainer for \"10746b906fb7b376562c620254a479ba806c162813a9b62bb04c80ee25cffa74\"" Apr 12 21:17:50.865419 systemd[1]: Started cri-containerd-10746b906fb7b376562c620254a479ba806c162813a9b62bb04c80ee25cffa74.scope. Apr 12 21:17:50.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.890001 kernel: kauditd_printk_skb: 62 callbacks suppressed Apr 12 21:17:50.890111 kernel: audit: type=1400 audit(1712956670.878:783): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.965004 kernel: audit: type=1400 audit(1712956670.878:784): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.965069 kernel: audit: type=1400 audit(1712956670.878:785): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:51.040799 kernel: audit: type=1400 audit(1712956670.878:786): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:51.040870 kernel: audit: type=1400 audit(1712956670.878:787): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:51.116819 kernel: audit: type=1400 audit(1712956670.878:788): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:51.116891 kernel: audit: type=1400 audit(1712956670.878:789): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:51.124538 env[2103]: time="2024-04-12T21:17:51.124507946Z" level=info msg="StartContainer for \"10746b906fb7b376562c620254a479ba806c162813a9b62bb04c80ee25cffa74\" returns successfully" Apr 12 21:17:50.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:51.192923 kernel: audit: type=1400 audit(1712956670.878:790): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:51.192981 kernel: audit: type=1400 audit(1712956670.878:791): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:51.222247 kubelet[2519]: E0412 21:17:51.222231 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:51.230685 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 21:17:50.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.889000 audit: BPF prog-id=110 op=LOAD Apr 12 21:17:50.889000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.889000 audit[4521]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4477 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:50.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130373436623930366662376233373635363263363230323534613437 Apr 12 21:17:50.889000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.889000 audit[4521]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4477 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:50.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130373436623930366662376233373635363263363230323534613437 Apr 12 21:17:50.889000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.889000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.889000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.889000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.889000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.889000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.889000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.889000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.889000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.889000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.889000 audit: BPF prog-id=111 op=LOAD Apr 12 21:17:50.889000 audit[4521]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4477 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:50.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130373436623930366662376233373635363263363230323534613437 Apr 12 21:17:50.926000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.926000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.926000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.926000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.926000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.926000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.926000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.926000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.926000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.926000 audit: BPF prog-id=112 op=LOAD Apr 12 21:17:50.926000 audit[4521]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4477 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:50.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130373436623930366662376233373635363263363230323534613437 Apr 12 21:17:50.964000 audit: BPF prog-id=112 op=UNLOAD Apr 12 21:17:50.964000 audit: BPF prog-id=111 op=UNLOAD Apr 12 21:17:50.964000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.964000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.964000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.964000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.964000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.964000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.964000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.964000 audit[4521]: AVC avc: denied { perfmon } for pid=4521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.964000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.964000 audit[4521]: AVC avc: denied { bpf } for pid=4521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:17:50.964000 audit: BPF prog-id=113 op=LOAD Apr 12 21:17:50.964000 audit[4521]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4477 pid=4521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:50.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130373436623930366662376233373635363263363230323534613437 Apr 12 21:17:51.186000 audit[4549]: AVC avc: denied { search } for pid=4549 comm="rpcbind" name="crypto" dev="proc" ino=28723 scontext=system_u:system_r:svirt_lxc_net_t:s0:c135,c984 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 21:17:51.186000 audit[4549]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8269f000 a2=0 a3=0 items=0 ppid=4531 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c135,c984 key=(null) Apr 12 21:17:51.186000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Apr 12 21:17:51.219000 audit[4554]: AVC avc: denied { search } for pid=4554 comm="dbus-daemon" name="crypto" dev="proc" ino=28723 scontext=system_u:system_r:svirt_lxc_net_t:s0:c135,c984 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 21:17:51.219000 audit[4554]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9724f000 a2=0 a3=0 items=0 ppid=4531 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c135,c984 key=(null) Apr 12 21:17:51.219000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 21:17:51.222000 audit[4555]: AVC avc: denied { watch } for pid=4555 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c135,c984 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c135,c984 tclass=dir permissive=0 Apr 12 21:17:51.222000 audit[4555]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaab090a0af0 a2=2c8 a3=aaab09081a60 items=0 ppid=4531 pid=4555 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c135,c984 key=(null) Apr 12 21:17:51.222000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 21:17:51.241000 audit[4556]: AVC avc: denied { search } for pid=4556 comm="ganesha.nfsd" name="crypto" dev="proc" ino=28723 scontext=system_u:system_r:svirt_lxc_net_t:s0:c135,c984 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 21:17:51.241000 audit[4556]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffaf67f000 a2=0 a3=0 items=0 ppid=4531 pid=4556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c135,c984 key=(null) Apr 12 21:17:51.241000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 21:17:51.371551 kubelet[2519]: I0412 21:17:51.371501 2519 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.365958106 podCreationTimestamp="2024-04-12 21:17:45 +0000 UTC" firstStartedPulling="2024-04-12 21:17:45.835229546 +0000 UTC m=+37.387447921" lastFinishedPulling="2024-04-12 21:17:50.840740986 +0000 UTC m=+42.392959361" observedRunningTime="2024-04-12 21:17:51.371426026 +0000 UTC m=+42.923644401" watchObservedRunningTime="2024-04-12 21:17:51.371469546 +0000 UTC m=+42.923687921" Apr 12 21:17:51.378000 audit[4574]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=4574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:17:51.378000 audit[4574]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffedd77eb0 a2=0 a3=1 items=0 ppid=2819 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:51.378000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:17:51.394000 audit[4574]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=4574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 21:17:51.394000 audit[4574]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffedd77eb0 a2=0 a3=1 items=0 ppid=2819 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:17:51.394000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 21:17:52.222875 kubelet[2519]: E0412 21:17:52.222841 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:53.223768 kubelet[2519]: E0412 21:17:53.223732 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:54.224031 kubelet[2519]: E0412 21:17:54.224007 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:55.224368 kubelet[2519]: E0412 21:17:55.224334 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:56.224662 kubelet[2519]: E0412 21:17:56.224639 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:57.225533 kubelet[2519]: E0412 21:17:57.225506 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:58.225604 kubelet[2519]: E0412 21:17:58.225573 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:17:59.225882 kubelet[2519]: E0412 21:17:59.225856 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:18:00.226299 kubelet[2519]: E0412 21:18:00.226272 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:18:00.423015 kubelet[2519]: I0412 21:18:00.422991 2519 topology_manager.go:215] "Topology Admit Handler" podUID="a186410c-7159-4fa2-931d-dbcdcd95c84e" podNamespace="default" podName="test-pod-1" Apr 12 21:18:00.427636 systemd[1]: Created slice kubepods-besteffort-poda186410c_7159_4fa2_931d_dbcdcd95c84e.slice. Apr 12 21:18:00.476728 kubelet[2519]: I0412 21:18:00.476672 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-f9156cac-9b81-49c6-80d3-0753a377be29\" (UniqueName: \"kubernetes.io/nfs/a186410c-7159-4fa2-931d-dbcdcd95c84e-pvc-f9156cac-9b81-49c6-80d3-0753a377be29\") pod \"test-pod-1\" (UID: \"a186410c-7159-4fa2-931d-dbcdcd95c84e\") " pod="default/test-pod-1" Apr 12 21:18:00.476728 kubelet[2519]: I0412 21:18:00.476714 2519 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dckv5\" (UniqueName: \"kubernetes.io/projected/a186410c-7159-4fa2-931d-dbcdcd95c84e-kube-api-access-dckv5\") pod \"test-pod-1\" (UID: \"a186410c-7159-4fa2-931d-dbcdcd95c84e\") " pod="default/test-pod-1" Apr 12 21:18:00.586000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:00.599031 kernel: Failed to create system directory netfs Apr 12 21:18:00.599150 kernel: kauditd_printk_skb: 68 callbacks suppressed Apr 12 21:18:00.599190 kernel: audit: type=1400 audit(1712956680.586:807): avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:00.599253 kernel: Failed to create system directory netfs Apr 12 21:18:00.599268 kernel: Failed to create system directory netfs Apr 12 21:18:00.599299 kernel: Failed to create system directory netfs Apr 12 21:18:00.586000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:00.649502 kernel: audit: type=1400 audit(1712956680.586:807): avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:00.586000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:00.720375 kernel: Failed to create system directory fscache Apr 12 21:18:00.720423 kernel: audit: type=1400 audit(1712956680.586:807): avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:00.720455 kernel: Failed to create system directory fscache Apr 12 21:18:00.730718 kernel: audit: type=1400 audit(1712956680.586:807): avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:00.586000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:00.769572 kernel: Failed to create system directory fscache Apr 12 21:18:00.779832 kernel: audit: type=1300 audit(1712956680.586:807): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf364b5e0 a1=12c14 a2=aaaac74be028 a3=aaaaf363c010 items=0 ppid=1470 pid=4601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:00.586000 audit[4601]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf364b5e0 a1=12c14 a2=aaaac74be028 a3=aaaaf363c010 items=0 ppid=1470 pid=4601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:00.828749 kernel: Failed to create system directory fscache Apr 12 21:18:00.828780 kernel: audit: type=1327 audit(1712956680.586:807): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 21:18:00.828832 kernel: audit: type=1400 audit(1712956680.653:808): avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:00.586000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 21:18:00.653000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:00.881701 kernel: Failed to create system directory fscache Apr 12 21:18:00.891906 kernel: audit: type=1400 audit(1712956680.653:808): avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:00.653000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:00.951585 kernel: Failed to create system directory fscache Apr 12 21:18:00.951619 kernel: audit: type=1400 audit(1712956680.653:808): avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:00.653000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.000169 kernel: Failed to create system directory fscache Apr 12 21:18:01.000186 kernel: audit: type=1400 audit(1712956680.653:808): avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:00.653000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:00.653000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:00.653000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:00.653000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:00.653000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.108355 kernel: Failed to create system directory fscache Apr 12 21:18:01.108401 kernel: Failed to create system directory fscache Apr 12 21:18:00.653000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:00.653000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.129251 kernel: Failed to create system directory fscache Apr 12 21:18:01.129279 kernel: Failed to create system directory fscache Apr 12 21:18:00.653000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.139839 kernel: Failed to create system directory fscache Apr 12 21:18:00.653000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:00.653000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.159940 kernel: Failed to create system directory fscache Apr 12 21:18:01.159985 kernel: Failed to create system directory fscache Apr 12 21:18:00.653000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:00.653000 audit[4601]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf385e210 a1=4c344 a2=aaaac74be028 a3=aaaaf363c010 items=0 ppid=1470 pid=4601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:00.653000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 21:18:01.177843 kernel: FS-Cache: Loaded Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.216868 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.216918 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.216944 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.227109 kubelet[2519]: E0412 21:18:01.227092 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:18:01.235267 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.235304 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.253113 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.253163 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.270424 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.270461 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.287137 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.287182 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.303355 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.303389 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.318997 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.319025 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.334037 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.334082 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.348579 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.348608 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.362519 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.362546 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.375991 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.376040 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.388893 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.388905 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.401313 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.401326 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.413143 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.413231 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.424631 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.424663 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.436116 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.436163 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.447597 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.447623 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.459012 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.459025 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.470215 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.470231 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.475842 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.487053 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.487068 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.498254 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.498267 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.509466 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.509483 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.520670 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.520697 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.531868 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.531897 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.543070 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.543095 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.554263 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.554276 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.565452 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.565480 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.576647 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.576673 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.587846 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.587859 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.599050 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.599075 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.610244 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.610276 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.627029 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.627055 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.627095 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.638233 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.638272 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.655036 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.655068 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.655120 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.666226 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.666239 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.677418 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.677431 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.688608 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.688665 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.699797 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.699810 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.710984 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.711032 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.722179 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.722192 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.733369 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.733382 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.744552 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.744565 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.755727 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.755761 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.766900 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.766957 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.778052 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.778065 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.789213 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.789226 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.800380 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.800400 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.811553 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.811567 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.822735 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.822768 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.833897 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.833926 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.845070 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.845113 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.856231 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.856247 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.867402 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.867436 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.878580 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.878630 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.889761 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.889797 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.900937 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.900987 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.912121 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.912135 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.923292 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.923306 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.934473 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.934501 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.945665 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.945679 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.956841 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.956867 kernel: Failed to create system directory sunrpc Apr 12 21:18:01.191000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:01.978823 kernel: RPC: Registered named UNIX socket transport module. Apr 12 21:18:01.978881 kernel: RPC: Registered udp transport module. Apr 12 21:18:01.978931 kernel: RPC: Registered tcp transport module. Apr 12 21:18:01.984292 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Apr 12 21:18:01.191000 audit[4601]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf38aa560 a1=14a344 a2=aaaac74be028 a3=aaaaf363c010 items=6 ppid=1470 pid=4601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:01.191000 audit: CWD cwd="/" Apr 12 21:18:01.191000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:18:01.191000 audit: PATH item=1 name=(null) inode=29829 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:18:01.191000 audit: PATH item=2 name=(null) inode=29829 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:18:01.191000 audit: PATH item=3 name=(null) inode=29830 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:18:01.191000 audit: PATH item=4 name=(null) inode=29829 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:18:01.191000 audit: PATH item=5 name=(null) inode=29831 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 21:18:01.191000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.027889 kernel: Failed to create system directory nfs Apr 12 21:18:02.027910 kernel: Failed to create system directory nfs Apr 12 21:18:02.027950 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.039180 kernel: Failed to create system directory nfs Apr 12 21:18:02.039193 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.050475 kernel: Failed to create system directory nfs Apr 12 21:18:02.050488 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.061774 kernel: Failed to create system directory nfs Apr 12 21:18:02.061788 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.073077 kernel: Failed to create system directory nfs Apr 12 21:18:02.073102 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.084379 kernel: Failed to create system directory nfs Apr 12 21:18:02.084392 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.095683 kernel: Failed to create system directory nfs Apr 12 21:18:02.095698 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.106989 kernel: Failed to create system directory nfs Apr 12 21:18:02.107042 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.118295 kernel: Failed to create system directory nfs Apr 12 21:18:02.118313 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.129605 kernel: Failed to create system directory nfs Apr 12 21:18:02.129633 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.141004 kernel: Failed to create system directory nfs Apr 12 21:18:02.141034 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.152318 kernel: Failed to create system directory nfs Apr 12 21:18:02.152336 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.163632 kernel: Failed to create system directory nfs Apr 12 21:18:02.163657 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.174928 kernel: Failed to create system directory nfs Apr 12 21:18:02.174941 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.186240 kernel: Failed to create system directory nfs Apr 12 21:18:02.186255 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.197560 kernel: Failed to create system directory nfs Apr 12 21:18:02.197592 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.208634 kernel: Failed to create system directory nfs Apr 12 21:18:02.208661 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.219583 kernel: Failed to create system directory nfs Apr 12 21:18:02.219611 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.228168 kubelet[2519]: E0412 21:18:02.228152 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:18:02.230239 kernel: Failed to create system directory nfs Apr 12 21:18:02.230254 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.240887 kernel: Failed to create system directory nfs Apr 12 21:18:02.240902 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.251544 kernel: Failed to create system directory nfs Apr 12 21:18:02.251570 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.262197 kernel: Failed to create system directory nfs Apr 12 21:18:02.262211 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.272852 kernel: Failed to create system directory nfs Apr 12 21:18:02.272867 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.283498 kernel: Failed to create system directory nfs Apr 12 21:18:02.283549 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.294159 kernel: Failed to create system directory nfs Apr 12 21:18:02.294174 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.304812 kernel: Failed to create system directory nfs Apr 12 21:18:02.304842 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.315449 kernel: Failed to create system directory nfs Apr 12 21:18:02.315462 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.326082 kernel: Failed to create system directory nfs Apr 12 21:18:02.326099 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.336724 kernel: Failed to create system directory nfs Apr 12 21:18:02.336750 kernel: Failed to create system directory nfs Apr 12 21:18:02.011000 audit[4601]: AVC avc: denied { confidentiality } for pid=4601 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.011000 audit[4601]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf3a534f0 a1=115814 a2=aaaac74be028 a3=aaaaf363c010 items=0 ppid=1470 pid=4601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:02.011000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 21:18:02.361843 kernel: FS-Cache: Netfs 'nfs' registered for caching Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.398223 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.398245 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.398258 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.409383 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.409400 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.420523 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.420548 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.431667 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.431683 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.442798 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.442824 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.453929 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.453942 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.465064 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.465111 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.476209 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.476237 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.487341 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.487354 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.498482 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.498511 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.509624 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.509654 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.520781 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.520807 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.531937 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.531950 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.543077 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.543110 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.554214 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.554228 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.565357 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.565375 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.576501 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.576514 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.587576 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.587603 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.598414 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.598428 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.614687 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.614716 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.614740 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.625530 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.625543 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.636370 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.636384 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.647211 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.652676 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.652702 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.663518 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.663547 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.674362 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.674377 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.685227 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.685240 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.696071 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.696088 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.706922 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.706947 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.717769 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.717782 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.728613 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.728655 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.739458 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.739471 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.750304 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.750317 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.761148 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.761162 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.771993 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.772006 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.782839 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.782864 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.793674 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.793689 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.804518 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.804578 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.815360 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.815373 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.826197 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.826211 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.837053 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.837089 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.847893 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.847906 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.858732 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.858758 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.869568 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.869582 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.880406 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.880435 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.891237 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.891251 kernel: Failed to create system directory nfs4 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.379000 audit[4637]: AVC avc: denied { confidentiality } for pid=4637 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:02.902076 kernel: Failed to create system directory nfs4 Apr 12 21:18:03.010559 kernel: NFS: Registering the id_resolver key type Apr 12 21:18:03.010619 kernel: Key type id_resolver registered Apr 12 21:18:03.010645 kernel: Key type id_legacy registered Apr 12 21:18:02.379000 audit[4637]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff9dc3b010 a1=19c244 a2=aaaae21ce028 a3=aaaae41a7010 items=0 ppid=1470 pid=4637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:02.379000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.040296 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.040312 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.040330 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.052004 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.052023 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.063702 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.063715 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.075431 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.075445 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.087145 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.087158 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.098864 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.098889 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.110589 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.110633 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.122303 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.122316 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.134020 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.134033 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.145716 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.145729 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.157450 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.157466 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.169176 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.169205 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.024000 audit[4639]: AVC avc: denied { confidentiality } for pid=4639 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 21:18:03.180892 kernel: Failed to create system directory rpcgss Apr 12 21:18:03.024000 audit[4639]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb59b3010 a1=5ef34 a2=aaaabfcbe028 a3=aaaaef27d010 items=0 ppid=1470 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:03.024000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Apr 12 21:18:03.228724 kubelet[2519]: E0412 21:18:03.228689 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:18:03.273130 nfsidmap[4647]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.3-a-03d04c2097' Apr 12 21:18:03.310735 nfsidmap[4648]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.3-a-03d04c2097' Apr 12 21:18:03.318000 audit[2167]: AVC avc: denied { watch_reads } for pid=2167 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3109 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 21:18:03.318000 audit[2167]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaae4dd6040 a2=10 a3=0 items=0 ppid=1 pid=2167 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:03.318000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 21:18:03.318000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3109 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 21:18:03.318000 audit[2167]: AVC avc: denied { watch_reads } for pid=2167 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3109 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 21:18:03.318000 audit[2167]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaae4dd6040 a2=10 a3=0 items=0 ppid=1 pid=2167 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:03.318000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 21:18:03.318000 audit[2167]: AVC avc: denied { watch_reads } for pid=2167 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3109 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 21:18:03.318000 audit[2167]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaae4dd6040 a2=10 a3=0 items=0 ppid=1 pid=2167 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:03.318000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 21:18:03.318000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3109 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 21:18:03.318000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3109 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 21:18:03.430217 env[2103]: time="2024-04-12T21:18:03.430164120Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:a186410c-7159-4fa2-931d-dbcdcd95c84e,Namespace:default,Attempt:0,}" Apr 12 21:18:03.516266 systemd-networkd[1922]: cali5ec59c6bf6e: Link UP Apr 12 21:18:03.532058 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 21:18:03.532092 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Apr 12 21:18:03.532320 systemd-networkd[1922]: cali5ec59c6bf6e: Gained carrier Apr 12 21:18:03.537452 env[2103]: 2024-04-12 21:18:03.463 [INFO][4649] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.26.37.129-k8s-test--pod--1-eth0 default a186410c-7159-4fa2-931d-dbcdcd95c84e 3976 0 2024-04-12 21:17:46 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.26.37.129 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.26.37.129-k8s-test--pod--1-" Apr 12 21:18:03.537452 env[2103]: 2024-04-12 21:18:03.463 [INFO][4649] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.26.37.129-k8s-test--pod--1-eth0" Apr 12 21:18:03.537452 env[2103]: 2024-04-12 21:18:03.486 [INFO][4677] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc" HandleID="k8s-pod-network.f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc" Workload="10.26.37.129-k8s-test--pod--1-eth0" Apr 12 21:18:03.537452 env[2103]: 2024-04-12 21:18:03.495 [INFO][4677] ipam_plugin.go 268: Auto assigning IP ContainerID="f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc" HandleID="k8s-pod-network.f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc" Workload="10.26.37.129-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000b03b20), Attrs:map[string]string{"namespace":"default", "node":"10.26.37.129", "pod":"test-pod-1", "timestamp":"2024-04-12 21:18:03.486016516 +0000 UTC"}, Hostname:"10.26.37.129", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 21:18:03.537452 env[2103]: 2024-04-12 21:18:03.496 [INFO][4677] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 21:18:03.537452 env[2103]: 2024-04-12 21:18:03.496 [INFO][4677] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 21:18:03.537452 env[2103]: 2024-04-12 21:18:03.496 [INFO][4677] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.26.37.129' Apr 12 21:18:03.537452 env[2103]: 2024-04-12 21:18:03.497 [INFO][4677] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc" host="10.26.37.129" Apr 12 21:18:03.537452 env[2103]: 2024-04-12 21:18:03.500 [INFO][4677] ipam.go 372: Looking up existing affinities for host host="10.26.37.129" Apr 12 21:18:03.537452 env[2103]: 2024-04-12 21:18:03.503 [INFO][4677] ipam.go 489: Trying affinity for 192.168.125.64/26 host="10.26.37.129" Apr 12 21:18:03.537452 env[2103]: 2024-04-12 21:18:03.504 [INFO][4677] ipam.go 155: Attempting to load block cidr=192.168.125.64/26 host="10.26.37.129" Apr 12 21:18:03.537452 env[2103]: 2024-04-12 21:18:03.506 [INFO][4677] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.64/26 host="10.26.37.129" Apr 12 21:18:03.537452 env[2103]: 2024-04-12 21:18:03.506 [INFO][4677] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.64/26 handle="k8s-pod-network.f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc" host="10.26.37.129" Apr 12 21:18:03.537452 env[2103]: 2024-04-12 21:18:03.507 [INFO][4677] ipam.go 1682: Creating new handle: k8s-pod-network.f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc Apr 12 21:18:03.537452 env[2103]: 2024-04-12 21:18:03.509 [INFO][4677] ipam.go 1203: Writing block in order to claim IPs block=192.168.125.64/26 handle="k8s-pod-network.f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc" host="10.26.37.129" Apr 12 21:18:03.537452 env[2103]: 2024-04-12 21:18:03.513 [INFO][4677] ipam.go 1216: Successfully claimed IPs: [192.168.125.68/26] block=192.168.125.64/26 handle="k8s-pod-network.f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc" host="10.26.37.129" Apr 12 21:18:03.537452 env[2103]: 2024-04-12 21:18:03.513 [INFO][4677] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.68/26] handle="k8s-pod-network.f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc" host="10.26.37.129" Apr 12 21:18:03.537452 env[2103]: 2024-04-12 21:18:03.513 [INFO][4677] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 21:18:03.537452 env[2103]: 2024-04-12 21:18:03.513 [INFO][4677] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.125.68/26] IPv6=[] ContainerID="f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc" HandleID="k8s-pod-network.f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc" Workload="10.26.37.129-k8s-test--pod--1-eth0" Apr 12 21:18:03.537452 env[2103]: 2024-04-12 21:18:03.514 [INFO][4649] k8s.go 385: Populated endpoint ContainerID="f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.26.37.129-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.26.37.129-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"a186410c-7159-4fa2-931d-dbcdcd95c84e", ResourceVersion:"3976", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 17, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.26.37.129", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:18:03.537452 env[2103]: 2024-04-12 21:18:03.514 [INFO][4649] k8s.go 386: Calico CNI using IPs: [192.168.125.68/32] ContainerID="f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.26.37.129-k8s-test--pod--1-eth0" Apr 12 21:18:03.537908 env[2103]: 2024-04-12 21:18:03.514 [INFO][4649] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.26.37.129-k8s-test--pod--1-eth0" Apr 12 21:18:03.537908 env[2103]: 2024-04-12 21:18:03.532 [INFO][4649] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.26.37.129-k8s-test--pod--1-eth0" Apr 12 21:18:03.537908 env[2103]: 2024-04-12 21:18:03.532 [INFO][4649] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.26.37.129-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.26.37.129-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"a186410c-7159-4fa2-931d-dbcdcd95c84e", ResourceVersion:"3976", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 21, 17, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.26.37.129", ContainerID:"f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"26:51:a1:9a:1b:d4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 21:18:03.537908 env[2103]: 2024-04-12 21:18:03.536 [INFO][4649] k8s.go 498: Wrote updated endpoint to datastore ContainerID="f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.26.37.129-k8s-test--pod--1-eth0" Apr 12 21:18:03.546337 env[2103]: time="2024-04-12T21:18:03.546293296Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 21:18:03.546362 env[2103]: time="2024-04-12T21:18:03.546332294Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 21:18:03.546362 env[2103]: time="2024-04-12T21:18:03.546342734Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 21:18:03.546473 env[2103]: time="2024-04-12T21:18:03.546455647Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc pid=4717 runtime=io.containerd.runc.v2 Apr 12 21:18:03.544000 audit[4718]: NETFILTER_CFG table=filter:78 family=2 entries=34 op=nft_register_chain pid=4718 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 21:18:03.544000 audit[4718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18196 a0=3 a1=fffffb42ac10 a2=0 a3=ffff9d467fa8 items=0 ppid=3395 pid=4718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:03.544000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 21:18:03.555753 systemd[1]: Started cri-containerd-f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc.scope. Apr 12 21:18:03.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.567000 audit: BPF prog-id=114 op=LOAD Apr 12 21:18:03.567000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.567000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4717 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:03.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631643335376232633231353335333762663034306234663232393533 Apr 12 21:18:03.567000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.567000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4717 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:03.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631643335376232633231353335333762663034306234663232393533 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit: BPF prog-id=115 op=LOAD Apr 12 21:18:03.568000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4717 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:03.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631643335376232633231353335333762663034306234663232393533 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit: BPF prog-id=116 op=LOAD Apr 12 21:18:03.568000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4717 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:03.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631643335376232633231353335333762663034306234663232393533 Apr 12 21:18:03.568000 audit: BPF prog-id=116 op=UNLOAD Apr 12 21:18:03.568000 audit: BPF prog-id=115 op=UNLOAD Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { perfmon } for pid=4729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit[4729]: AVC avc: denied { bpf } for pid=4729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.568000 audit: BPF prog-id=117 op=LOAD Apr 12 21:18:03.568000 audit[4729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4717 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:03.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631643335376232633231353335333762663034306234663232393533 Apr 12 21:18:03.583440 env[2103]: time="2024-04-12T21:18:03.583404581Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:a186410c-7159-4fa2-931d-dbcdcd95c84e,Namespace:default,Attempt:0,} returns sandbox id \"f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc\"" Apr 12 21:18:03.584459 env[2103]: time="2024-04-12T21:18:03.584438401Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 21:18:03.668950 env[2103]: time="2024-04-12T21:18:03.668446243Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:18:03.669801 env[2103]: time="2024-04-12T21:18:03.669777606Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:18:03.671196 env[2103]: time="2024-04-12T21:18:03.671175725Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:18:03.672504 env[2103]: time="2024-04-12T21:18:03.672482249Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 21:18:03.673088 env[2103]: time="2024-04-12T21:18:03.673062215Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56\"" Apr 12 21:18:03.674532 env[2103]: time="2024-04-12T21:18:03.674508771Z" level=info msg="CreateContainer within sandbox \"f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc\" for container &ContainerMetadata{Name:test,Attempt:0,}" Apr 12 21:18:03.684136 env[2103]: time="2024-04-12T21:18:03.684107974Z" level=info msg="CreateContainer within sandbox \"f1d357b2c2153537bf040b4f22953dda3f09632ba6c1981a423a3b8b9465fdbc\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"037ef3e2991738bb3f68763cee213e6fd00cbed2bf4ef6ffb6981162b8a16479\"" Apr 12 21:18:03.684445 env[2103]: time="2024-04-12T21:18:03.684417996Z" level=info msg="StartContainer for \"037ef3e2991738bb3f68763cee213e6fd00cbed2bf4ef6ffb6981162b8a16479\"" Apr 12 21:18:03.696698 systemd[1]: Started cri-containerd-037ef3e2991738bb3f68763cee213e6fd00cbed2bf4ef6ffb6981162b8a16479.scope. Apr 12 21:18:03.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.709000 audit: BPF prog-id=118 op=LOAD Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { bpf } for pid=4764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4717 pid=4764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:03.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033376566336532393931373338626233663638373633636565323133 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { perfmon } for pid=4764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4717 pid=4764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:03.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033376566336532393931373338626233663638373633636565323133 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { bpf } for pid=4764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { bpf } for pid=4764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { bpf } for pid=4764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { perfmon } for pid=4764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { perfmon } for pid=4764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { perfmon } for pid=4764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { perfmon } for pid=4764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { perfmon } for pid=4764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { bpf } for pid=4764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { bpf } for pid=4764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit: BPF prog-id=119 op=LOAD Apr 12 21:18:03.710000 audit[4764]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4717 pid=4764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:03.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033376566336532393931373338626233663638373633636565323133 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { bpf } for pid=4764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { bpf } for pid=4764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { perfmon } for pid=4764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { perfmon } for pid=4764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { perfmon } for pid=4764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { perfmon } for pid=4764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { perfmon } for pid=4764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { bpf } for pid=4764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { bpf } for pid=4764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit: BPF prog-id=120 op=LOAD Apr 12 21:18:03.710000 audit[4764]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4717 pid=4764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:03.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033376566336532393931373338626233663638373633636565323133 Apr 12 21:18:03.710000 audit: BPF prog-id=120 op=UNLOAD Apr 12 21:18:03.710000 audit: BPF prog-id=119 op=UNLOAD Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { bpf } for pid=4764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { bpf } for pid=4764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { bpf } for pid=4764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { perfmon } for pid=4764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { perfmon } for pid=4764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { perfmon } for pid=4764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { perfmon } for pid=4764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { perfmon } for pid=4764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { bpf } for pid=4764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit[4764]: AVC avc: denied { bpf } for pid=4764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 21:18:03.710000 audit: BPF prog-id=121 op=LOAD Apr 12 21:18:03.710000 audit[4764]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4717 pid=4764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 21:18:03.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033376566336532393931373338626233663638373633636565323133 Apr 12 21:18:03.724495 env[2103]: time="2024-04-12T21:18:03.724461231Z" level=info msg="StartContainer for \"037ef3e2991738bb3f68763cee213e6fd00cbed2bf4ef6ffb6981162b8a16479\" returns successfully" Apr 12 21:18:04.229000 kubelet[2519]: E0412 21:18:04.228958 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:18:04.389195 kubelet[2519]: I0412 21:18:04.389172 2519 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=18.300151167 podCreationTimestamp="2024-04-12 21:17:46 +0000 UTC" firstStartedPulling="2024-04-12 21:18:03.584221854 +0000 UTC m=+55.136440189" lastFinishedPulling="2024-04-12 21:18:03.673213727 +0000 UTC m=+55.225432102" observedRunningTime="2024-04-12 21:18:04.388834617 +0000 UTC m=+55.941052992" watchObservedRunningTime="2024-04-12 21:18:04.38914308 +0000 UTC m=+55.941361455" Apr 12 21:18:05.230735 kubelet[2519]: E0412 21:18:05.230705 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 21:18:05.458014 systemd-networkd[1922]: cali5ec59c6bf6e: Gained IPv6LL Apr 12 21:18:06.231478 kubelet[2519]: E0412 21:18:06.231440 2519 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"