Apr 12 19:48:35.710498 kernel: Booting Linux on physical CPU 0x0000120000 [0x413fd0c1] Apr 12 19:48:35.710518 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Apr 12 17:21:24 -00 2024 Apr 12 19:48:35.710526 kernel: efi: EFI v2.70 by American Megatrends Apr 12 19:48:35.710532 kernel: efi: ACPI 2.0=0xec080000 SMBIOS 3.0=0xf0a1ff98 ESRT=0xea465818 RNG=0xebf10018 MEMRESERVE=0xe463af98 Apr 12 19:48:35.710537 kernel: random: crng init done Apr 12 19:48:35.710542 kernel: esrt: Reserving ESRT space from 0x00000000ea465818 to 0x00000000ea465878. Apr 12 19:48:35.710548 kernel: ACPI: Early table checksum verification disabled Apr 12 19:48:35.710554 kernel: ACPI: RSDP 0x00000000EC080000 000024 (v02 Ampere) Apr 12 19:48:35.710560 kernel: ACPI: XSDT 0x00000000EC070000 0000A4 (v01 Ampere Altra 00000000 AMI 01000013) Apr 12 19:48:35.710566 kernel: ACPI: FACP 0x00000000EC050000 000114 (v06 Ampere Altra 00000000 INTL 20190509) Apr 12 19:48:35.710571 kernel: ACPI: DSDT 0x00000000EBFF0000 019B57 (v02 Ampere Jade 00000001 INTL 20200717) Apr 12 19:48:35.710576 kernel: ACPI: DBG2 0x00000000EC060000 00005C (v00 Ampere Altra 00000000 INTL 20190509) Apr 12 19:48:35.710581 kernel: ACPI: GTDT 0x00000000EC040000 000110 (v03 Ampere Altra 00000000 INTL 20190509) Apr 12 19:48:35.710587 kernel: ACPI: SSDT 0x00000000EC030000 00002D (v02 Ampere Altra 00000001 INTL 20190509) Apr 12 19:48:35.710595 kernel: ACPI: FIDT 0x00000000EBFE0000 00009C (v01 ALASKA A M I 01072009 AMI 00010013) Apr 12 19:48:35.710600 kernel: ACPI: SPCR 0x00000000EBFD0000 000050 (v02 ALASKA A M I 01072009 AMI 0005000F) Apr 12 19:48:35.710606 kernel: ACPI: BGRT 0x00000000EBFC0000 000038 (v01 ALASKA A M I 01072009 AMI 00010013) Apr 12 19:48:35.710612 kernel: ACPI: MCFG 0x00000000EBFB0000 0000AC (v01 Ampere Altra 00000001 AMP. 01000013) Apr 12 19:48:35.710618 kernel: ACPI: IORT 0x00000000EBFA0000 000610 (v00 Ampere Altra 00000000 AMP. 01000013) Apr 12 19:48:35.710623 kernel: ACPI: PPTT 0x00000000EBF80000 006E60 (v02 Ampere Altra 00000000 AMP. 01000013) Apr 12 19:48:35.710629 kernel: ACPI: SLIT 0x00000000EBF70000 00002D (v01 Ampere Altra 00000000 AMP. 01000013) Apr 12 19:48:35.710634 kernel: ACPI: SRAT 0x00000000EBF60000 0006D0 (v03 Ampere Altra 00000000 AMP. 01000013) Apr 12 19:48:35.710640 kernel: ACPI: APIC 0x00000000EBF90000 0019F4 (v05 Ampere Altra 00000003 AMI 01000013) Apr 12 19:48:35.710647 kernel: ACPI: PCCT 0x00000000EBF40000 000576 (v02 Ampere Altra 00000003 AMP. 01000013) Apr 12 19:48:35.710653 kernel: ACPI: WSMT 0x00000000EBF30000 000028 (v01 ALASKA A M I 01072009 AMI 00010013) Apr 12 19:48:35.710658 kernel: ACPI: FPDT 0x00000000EBF20000 000044 (v01 ALASKA A M I 01072009 AMI 01000013) Apr 12 19:48:35.710664 kernel: ACPI: SPCR: console: pl011,mmio32,0x100002600000,115200 Apr 12 19:48:35.710670 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x88300000-0x883fffff] Apr 12 19:48:35.710675 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x90000000-0xffffffff] Apr 12 19:48:35.710681 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0x8007fffffff] Apr 12 19:48:35.710687 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80100000000-0x83fffffffff] Apr 12 19:48:35.710692 kernel: NUMA: NODE_DATA [mem 0x83fdffd0900-0x83fdffd5fff] Apr 12 19:48:35.710698 kernel: Zone ranges: Apr 12 19:48:35.710703 kernel: DMA [mem 0x0000000088300000-0x00000000ffffffff] Apr 12 19:48:35.710709 kernel: DMA32 empty Apr 12 19:48:35.710716 kernel: Normal [mem 0x0000000100000000-0x0000083fffffffff] Apr 12 19:48:35.710721 kernel: Movable zone start for each node Apr 12 19:48:35.710727 kernel: Early memory node ranges Apr 12 19:48:35.710733 kernel: node 0: [mem 0x0000000088300000-0x00000000883fffff] Apr 12 19:48:35.710738 kernel: node 0: [mem 0x0000000090000000-0x0000000091ffffff] Apr 12 19:48:35.710747 kernel: node 0: [mem 0x0000000092000000-0x0000000093ffffff] Apr 12 19:48:35.710753 kernel: node 0: [mem 0x0000000094000000-0x00000000eba36fff] Apr 12 19:48:35.710760 kernel: node 0: [mem 0x00000000eba37000-0x00000000ebeadfff] Apr 12 19:48:35.710766 kernel: node 0: [mem 0x00000000ebeae000-0x00000000ebeaefff] Apr 12 19:48:35.710772 kernel: node 0: [mem 0x00000000ebeaf000-0x00000000ebeccfff] Apr 12 19:48:35.710778 kernel: node 0: [mem 0x00000000ebecd000-0x00000000ebecdfff] Apr 12 19:48:35.710784 kernel: node 0: [mem 0x00000000ebece000-0x00000000ebecffff] Apr 12 19:48:35.710790 kernel: node 0: [mem 0x00000000ebed0000-0x00000000ec0effff] Apr 12 19:48:35.710796 kernel: node 0: [mem 0x00000000ec0f0000-0x00000000ec0fffff] Apr 12 19:48:35.710801 kernel: node 0: [mem 0x00000000ec100000-0x00000000ee54ffff] Apr 12 19:48:35.710807 kernel: node 0: [mem 0x00000000ee550000-0x00000000f765ffff] Apr 12 19:48:35.710815 kernel: node 0: [mem 0x00000000f7660000-0x00000000f784ffff] Apr 12 19:48:35.710821 kernel: node 0: [mem 0x00000000f7850000-0x00000000f7fdffff] Apr 12 19:48:35.710827 kernel: node 0: [mem 0x00000000f7fe0000-0x00000000ffc8efff] Apr 12 19:48:35.710833 kernel: node 0: [mem 0x00000000ffc8f000-0x00000000ffc8ffff] Apr 12 19:48:35.710838 kernel: node 0: [mem 0x00000000ffc90000-0x00000000ffffffff] Apr 12 19:48:35.710844 kernel: node 0: [mem 0x0000080000000000-0x000008007fffffff] Apr 12 19:48:35.710850 kernel: node 0: [mem 0x0000080100000000-0x0000083fffffffff] Apr 12 19:48:35.710856 kernel: Initmem setup node 0 [mem 0x0000000088300000-0x0000083fffffffff] Apr 12 19:48:35.710862 kernel: On node 0, zone DMA: 768 pages in unavailable ranges Apr 12 19:48:35.710868 kernel: On node 0, zone DMA: 31744 pages in unavailable ranges Apr 12 19:48:35.710874 kernel: psci: probing for conduit method from ACPI. Apr 12 19:48:35.710880 kernel: psci: PSCIv1.1 detected in firmware. Apr 12 19:48:35.710887 kernel: psci: Using standard PSCI v0.2 function IDs Apr 12 19:48:35.710893 kernel: psci: MIGRATE_INFO_TYPE not supported. Apr 12 19:48:35.710899 kernel: psci: SMC Calling Convention v1.2 Apr 12 19:48:35.710905 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node 0 Apr 12 19:48:35.710911 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x100 -> Node 0 Apr 12 19:48:35.710917 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x10000 -> Node 0 Apr 12 19:48:35.710924 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x10100 -> Node 0 Apr 12 19:48:35.710929 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x20000 -> Node 0 Apr 12 19:48:35.710935 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x20100 -> Node 0 Apr 12 19:48:35.710941 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x30000 -> Node 0 Apr 12 19:48:35.710947 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x30100 -> Node 0 Apr 12 19:48:35.710953 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x40000 -> Node 0 Apr 12 19:48:35.710960 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x40100 -> Node 0 Apr 12 19:48:35.710966 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x50000 -> Node 0 Apr 12 19:48:35.710972 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x50100 -> Node 0 Apr 12 19:48:35.710978 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x60000 -> Node 0 Apr 12 19:48:35.710984 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x60100 -> Node 0 Apr 12 19:48:35.710990 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x70000 -> Node 0 Apr 12 19:48:35.710996 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x70100 -> Node 0 Apr 12 19:48:35.711002 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x80000 -> Node 0 Apr 12 19:48:35.711008 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x80100 -> Node 0 Apr 12 19:48:35.711013 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x90000 -> Node 0 Apr 12 19:48:35.711019 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x90100 -> Node 0 Apr 12 19:48:35.711025 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xa0000 -> Node 0 Apr 12 19:48:35.711033 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xa0100 -> Node 0 Apr 12 19:48:35.711039 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xb0000 -> Node 0 Apr 12 19:48:35.711048 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xb0100 -> Node 0 Apr 12 19:48:35.711054 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xc0000 -> Node 0 Apr 12 19:48:35.711060 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xc0100 -> Node 0 Apr 12 19:48:35.711066 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xd0000 -> Node 0 Apr 12 19:48:35.711072 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xd0100 -> Node 0 Apr 12 19:48:35.711078 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xe0000 -> Node 0 Apr 12 19:48:35.711084 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xe0100 -> Node 0 Apr 12 19:48:35.711090 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xf0000 -> Node 0 Apr 12 19:48:35.711095 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0xf0100 -> Node 0 Apr 12 19:48:35.711103 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x100000 -> Node 0 Apr 12 19:48:35.711109 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x100100 -> Node 0 Apr 12 19:48:35.711115 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x110000 -> Node 0 Apr 12 19:48:35.711121 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x110100 -> Node 0 Apr 12 19:48:35.711127 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x120000 -> Node 0 Apr 12 19:48:35.711133 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x120100 -> Node 0 Apr 12 19:48:35.711139 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x130000 -> Node 0 Apr 12 19:48:35.711145 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x130100 -> Node 0 Apr 12 19:48:35.711151 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x140000 -> Node 0 Apr 12 19:48:35.711156 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x140100 -> Node 0 Apr 12 19:48:35.711162 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x150000 -> Node 0 Apr 12 19:48:35.711168 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x150100 -> Node 0 Apr 12 19:48:35.711175 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x160000 -> Node 0 Apr 12 19:48:35.711181 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x160100 -> Node 0 Apr 12 19:48:35.711187 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x170000 -> Node 0 Apr 12 19:48:35.711193 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x170100 -> Node 0 Apr 12 19:48:35.711199 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x180000 -> Node 0 Apr 12 19:48:35.711205 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x180100 -> Node 0 Apr 12 19:48:35.711211 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x190000 -> Node 0 Apr 12 19:48:35.711217 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x190100 -> Node 0 Apr 12 19:48:35.711228 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1a0000 -> Node 0 Apr 12 19:48:35.711234 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1a0100 -> Node 0 Apr 12 19:48:35.711242 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1b0000 -> Node 0 Apr 12 19:48:35.711248 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1b0100 -> Node 0 Apr 12 19:48:35.711255 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1c0000 -> Node 0 Apr 12 19:48:35.711261 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1c0100 -> Node 0 Apr 12 19:48:35.711267 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1d0000 -> Node 0 Apr 12 19:48:35.711274 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1d0100 -> Node 0 Apr 12 19:48:35.711281 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1e0000 -> Node 0 Apr 12 19:48:35.711287 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1e0100 -> Node 0 Apr 12 19:48:35.711294 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1f0000 -> Node 0 Apr 12 19:48:35.711300 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1f0100 -> Node 0 Apr 12 19:48:35.711306 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x200000 -> Node 0 Apr 12 19:48:35.711313 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x200100 -> Node 0 Apr 12 19:48:35.711319 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x210000 -> Node 0 Apr 12 19:48:35.711325 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x210100 -> Node 0 Apr 12 19:48:35.711331 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x220000 -> Node 0 Apr 12 19:48:35.711338 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x220100 -> Node 0 Apr 12 19:48:35.711344 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x230000 -> Node 0 Apr 12 19:48:35.711351 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x230100 -> Node 0 Apr 12 19:48:35.711358 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x240000 -> Node 0 Apr 12 19:48:35.711364 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x240100 -> Node 0 Apr 12 19:48:35.711370 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x250000 -> Node 0 Apr 12 19:48:35.711377 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x250100 -> Node 0 Apr 12 19:48:35.711383 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x260000 -> Node 0 Apr 12 19:48:35.711389 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x260100 -> Node 0 Apr 12 19:48:35.711396 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x270000 -> Node 0 Apr 12 19:48:35.711402 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x270100 -> Node 0 Apr 12 19:48:35.711408 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Apr 12 19:48:35.711415 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Apr 12 19:48:35.711421 kernel: pcpu-alloc: [0] 00 [0] 01 [0] 02 [0] 03 [0] 04 [0] 05 [0] 06 [0] 07 Apr 12 19:48:35.711429 kernel: pcpu-alloc: [0] 08 [0] 09 [0] 10 [0] 11 [0] 12 [0] 13 [0] 14 [0] 15 Apr 12 19:48:35.711435 kernel: pcpu-alloc: [0] 16 [0] 17 [0] 18 [0] 19 [0] 20 [0] 21 [0] 22 [0] 23 Apr 12 19:48:35.711442 kernel: pcpu-alloc: [0] 24 [0] 25 [0] 26 [0] 27 [0] 28 [0] 29 [0] 30 [0] 31 Apr 12 19:48:35.711448 kernel: pcpu-alloc: [0] 32 [0] 33 [0] 34 [0] 35 [0] 36 [0] 37 [0] 38 [0] 39 Apr 12 19:48:35.711454 kernel: pcpu-alloc: [0] 40 [0] 41 [0] 42 [0] 43 [0] 44 [0] 45 [0] 46 [0] 47 Apr 12 19:48:35.711460 kernel: pcpu-alloc: [0] 48 [0] 49 [0] 50 [0] 51 [0] 52 [0] 53 [0] 54 [0] 55 Apr 12 19:48:35.711467 kernel: pcpu-alloc: [0] 56 [0] 57 [0] 58 [0] 59 [0] 60 [0] 61 [0] 62 [0] 63 Apr 12 19:48:35.711473 kernel: pcpu-alloc: [0] 64 [0] 65 [0] 66 [0] 67 [0] 68 [0] 69 [0] 70 [0] 71 Apr 12 19:48:35.711479 kernel: pcpu-alloc: [0] 72 [0] 73 [0] 74 [0] 75 [0] 76 [0] 77 [0] 78 [0] 79 Apr 12 19:48:35.711486 kernel: Detected PIPT I-cache on CPU0 Apr 12 19:48:35.711492 kernel: CPU features: detected: GIC system register CPU interface Apr 12 19:48:35.711500 kernel: CPU features: detected: Virtualization Host Extensions Apr 12 19:48:35.711506 kernel: CPU features: detected: Hardware dirty bit management Apr 12 19:48:35.711512 kernel: CPU features: detected: Spectre-v4 Apr 12 19:48:35.711519 kernel: CPU features: detected: Spectre-BHB Apr 12 19:48:35.711525 kernel: CPU features: kernel page table isolation forced ON by KASLR Apr 12 19:48:35.711532 kernel: CPU features: detected: Kernel page table isolation (KPTI) Apr 12 19:48:35.711538 kernel: CPU features: detected: ARM erratum 1418040 Apr 12 19:48:35.711544 kernel: alternatives: patching kernel code Apr 12 19:48:35.711551 kernel: Built 1 zonelists, mobility grouping on. Total pages: 65996028 Apr 12 19:48:35.711557 kernel: Policy zone: Normal Apr 12 19:48:35.711564 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected acpi=force flatcar.oem.id=packet flatcar.autologin verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 19:48:35.711572 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 19:48:35.711579 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Apr 12 19:48:35.711585 kernel: printk: log_buf_len total cpu_extra contributions: 323584 bytes Apr 12 19:48:35.711591 kernel: printk: log_buf_len min size: 262144 bytes Apr 12 19:48:35.711598 kernel: printk: log_buf_len: 1048576 bytes Apr 12 19:48:35.711604 kernel: printk: early log buf free: 249888(95%) Apr 12 19:48:35.711610 kernel: Dentry cache hash table entries: 16777216 (order: 15, 134217728 bytes, linear) Apr 12 19:48:35.711617 kernel: Inode-cache hash table entries: 8388608 (order: 14, 67108864 bytes, linear) Apr 12 19:48:35.711623 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 19:48:35.711629 kernel: software IO TLB: mapped [mem 0x00000000fbc8f000-0x00000000ffc8f000] (64MB) Apr 12 19:48:35.711636 kernel: Memory: 262927136K/268174336K available (9792K kernel code, 2092K rwdata, 7568K rodata, 36352K init, 777K bss, 5247200K reserved, 0K cma-reserved) Apr 12 19:48:35.711644 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=80, Nodes=1 Apr 12 19:48:35.711651 kernel: trace event string verifier disabled Apr 12 19:48:35.711657 kernel: rcu: Preemptible hierarchical RCU implementation. Apr 12 19:48:35.711664 kernel: rcu: RCU event tracing is enabled. Apr 12 19:48:35.711670 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=80. Apr 12 19:48:35.711677 kernel: Trampoline variant of Tasks RCU enabled. Apr 12 19:48:35.711683 kernel: Tracing variant of Tasks RCU enabled. Apr 12 19:48:35.711690 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 19:48:35.711696 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=80 Apr 12 19:48:35.711702 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Apr 12 19:48:35.711709 kernel: GICv3: GIC: Using split EOI/Deactivate mode Apr 12 19:48:35.711716 kernel: GICv3: 672 SPIs implemented Apr 12 19:48:35.711723 kernel: GICv3: 0 Extended SPIs implemented Apr 12 19:48:35.711729 kernel: GICv3: Distributor has no Range Selector support Apr 12 19:48:35.711735 kernel: Root IRQ handler: gic_handle_irq Apr 12 19:48:35.711741 kernel: GICv3: 16 PPIs implemented Apr 12 19:48:35.711748 kernel: GICv3: CPU0: found redistributor 120000 region 0:0x00001001005c0000 Apr 12 19:48:35.711754 kernel: SRAT: PXM 0 -> ITS 0 -> Node 0 Apr 12 19:48:35.711760 kernel: SRAT: PXM 0 -> ITS 1 -> Node 0 Apr 12 19:48:35.711766 kernel: SRAT: PXM 0 -> ITS 2 -> Node 0 Apr 12 19:48:35.711773 kernel: SRAT: PXM 0 -> ITS 3 -> Node 0 Apr 12 19:48:35.711779 kernel: SRAT: PXM 0 -> ITS 4 -> Node 0 Apr 12 19:48:35.711785 kernel: SRAT: PXM 0 -> ITS 5 -> Node 0 Apr 12 19:48:35.711791 kernel: SRAT: PXM 0 -> ITS 6 -> Node 0 Apr 12 19:48:35.711798 kernel: SRAT: PXM 0 -> ITS 7 -> Node 0 Apr 12 19:48:35.711805 kernel: ITS [mem 0x100100040000-0x10010005ffff] Apr 12 19:48:35.711811 kernel: ITS@0x0000100100040000: allocated 8192 Devices @80000200000 (indirect, esz 8, psz 64K, shr 1) Apr 12 19:48:35.711818 kernel: ITS@0x0000100100040000: allocated 32768 Interrupt Collections @80000210000 (flat, esz 2, psz 64K, shr 1) Apr 12 19:48:35.711824 kernel: ITS [mem 0x100100060000-0x10010007ffff] Apr 12 19:48:35.711831 kernel: ITS@0x0000100100060000: allocated 8192 Devices @80000230000 (indirect, esz 8, psz 64K, shr 1) Apr 12 19:48:35.711837 kernel: ITS@0x0000100100060000: allocated 32768 Interrupt Collections @80000240000 (flat, esz 2, psz 64K, shr 1) Apr 12 19:48:35.711844 kernel: ITS [mem 0x100100080000-0x10010009ffff] Apr 12 19:48:35.711850 kernel: ITS@0x0000100100080000: allocated 8192 Devices @80000260000 (indirect, esz 8, psz 64K, shr 1) Apr 12 19:48:35.711857 kernel: ITS@0x0000100100080000: allocated 32768 Interrupt Collections @80000270000 (flat, esz 2, psz 64K, shr 1) Apr 12 19:48:35.711863 kernel: ITS [mem 0x1001000a0000-0x1001000bffff] Apr 12 19:48:35.711871 kernel: ITS@0x00001001000a0000: allocated 8192 Devices @80000290000 (indirect, esz 8, psz 64K, shr 1) Apr 12 19:48:35.711878 kernel: ITS@0x00001001000a0000: allocated 32768 Interrupt Collections @800002a0000 (flat, esz 2, psz 64K, shr 1) Apr 12 19:48:35.711884 kernel: ITS [mem 0x1001000c0000-0x1001000dffff] Apr 12 19:48:35.711890 kernel: ITS@0x00001001000c0000: allocated 8192 Devices @800002c0000 (indirect, esz 8, psz 64K, shr 1) Apr 12 19:48:35.711897 kernel: ITS@0x00001001000c0000: allocated 32768 Interrupt Collections @800002d0000 (flat, esz 2, psz 64K, shr 1) Apr 12 19:48:35.711903 kernel: ITS [mem 0x1001000e0000-0x1001000fffff] Apr 12 19:48:35.711909 kernel: ITS@0x00001001000e0000: allocated 8192 Devices @80000300000 (indirect, esz 8, psz 64K, shr 1) Apr 12 19:48:35.711916 kernel: ITS@0x00001001000e0000: allocated 32768 Interrupt Collections @80000310000 (flat, esz 2, psz 64K, shr 1) Apr 12 19:48:35.711922 kernel: ITS [mem 0x100100100000-0x10010011ffff] Apr 12 19:48:35.711929 kernel: ITS@0x0000100100100000: allocated 8192 Devices @80000330000 (indirect, esz 8, psz 64K, shr 1) Apr 12 19:48:35.711935 kernel: ITS@0x0000100100100000: allocated 32768 Interrupt Collections @80000340000 (flat, esz 2, psz 64K, shr 1) Apr 12 19:48:35.711943 kernel: ITS [mem 0x100100120000-0x10010013ffff] Apr 12 19:48:35.711949 kernel: ITS@0x0000100100120000: allocated 8192 Devices @80000360000 (indirect, esz 8, psz 64K, shr 1) Apr 12 19:48:35.711956 kernel: ITS@0x0000100100120000: allocated 32768 Interrupt Collections @80000370000 (flat, esz 2, psz 64K, shr 1) Apr 12 19:48:35.711962 kernel: GICv3: using LPI property table @0x0000080000380000 Apr 12 19:48:35.711968 kernel: GICv3: CPU0: using allocated LPI pending table @0x0000080000390000 Apr 12 19:48:35.711975 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.711981 kernel: ACPI GTDT: found 1 memory-mapped timer block(s). Apr 12 19:48:35.711987 kernel: arch_timer: cp15 and mmio timer(s) running at 25.00MHz (phys/phys). Apr 12 19:48:35.711994 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Apr 12 19:48:35.712001 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Apr 12 19:48:35.712007 kernel: Console: colour dummy device 80x25 Apr 12 19:48:35.712015 kernel: printk: console [tty0] enabled Apr 12 19:48:35.712021 kernel: ACPI: Core revision 20210730 Apr 12 19:48:35.712028 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Apr 12 19:48:35.712035 kernel: pid_max: default: 81920 minimum: 640 Apr 12 19:48:35.712043 kernel: LSM: Security Framework initializing Apr 12 19:48:35.712050 kernel: SELinux: Initializing. Apr 12 19:48:35.712056 kernel: Mount-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 19:48:35.712063 kernel: Mountpoint-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 19:48:35.712070 kernel: rcu: Hierarchical SRCU implementation. Apr 12 19:48:35.712077 kernel: Platform MSI: ITS@0x100100040000 domain created Apr 12 19:48:35.712084 kernel: Platform MSI: ITS@0x100100060000 domain created Apr 12 19:48:35.712090 kernel: Platform MSI: ITS@0x100100080000 domain created Apr 12 19:48:35.712097 kernel: Platform MSI: ITS@0x1001000a0000 domain created Apr 12 19:48:35.712103 kernel: Platform MSI: ITS@0x1001000c0000 domain created Apr 12 19:48:35.712110 kernel: Platform MSI: ITS@0x1001000e0000 domain created Apr 12 19:48:35.712116 kernel: Platform MSI: ITS@0x100100100000 domain created Apr 12 19:48:35.712122 kernel: Platform MSI: ITS@0x100100120000 domain created Apr 12 19:48:35.712129 kernel: PCI/MSI: ITS@0x100100040000 domain created Apr 12 19:48:35.712136 kernel: PCI/MSI: ITS@0x100100060000 domain created Apr 12 19:48:35.712143 kernel: PCI/MSI: ITS@0x100100080000 domain created Apr 12 19:48:35.712149 kernel: PCI/MSI: ITS@0x1001000a0000 domain created Apr 12 19:48:35.712156 kernel: PCI/MSI: ITS@0x1001000c0000 domain created Apr 12 19:48:35.712162 kernel: PCI/MSI: ITS@0x1001000e0000 domain created Apr 12 19:48:35.712169 kernel: PCI/MSI: ITS@0x100100100000 domain created Apr 12 19:48:35.712175 kernel: PCI/MSI: ITS@0x100100120000 domain created Apr 12 19:48:35.712182 kernel: Remapping and enabling EFI services. Apr 12 19:48:35.712188 kernel: smp: Bringing up secondary CPUs ... Apr 12 19:48:35.712195 kernel: Detected PIPT I-cache on CPU1 Apr 12 19:48:35.712202 kernel: GICv3: CPU1: found redistributor 1a0000 region 0:0x00001001007c0000 Apr 12 19:48:35.712209 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000800003a0000 Apr 12 19:48:35.712215 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712222 kernel: CPU1: Booted secondary processor 0x00001a0000 [0x413fd0c1] Apr 12 19:48:35.712228 kernel: Detected PIPT I-cache on CPU2 Apr 12 19:48:35.712235 kernel: GICv3: CPU2: found redistributor 140000 region 0:0x0000100100640000 Apr 12 19:48:35.712241 kernel: GICv3: CPU2: using allocated LPI pending table @0x00000800003b0000 Apr 12 19:48:35.712248 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712254 kernel: CPU2: Booted secondary processor 0x0000140000 [0x413fd0c1] Apr 12 19:48:35.712262 kernel: Detected PIPT I-cache on CPU3 Apr 12 19:48:35.712269 kernel: GICv3: CPU3: found redistributor 1c0000 region 0:0x0000100100840000 Apr 12 19:48:35.712275 kernel: GICv3: CPU3: using allocated LPI pending table @0x00000800003c0000 Apr 12 19:48:35.712282 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712288 kernel: CPU3: Booted secondary processor 0x00001c0000 [0x413fd0c1] Apr 12 19:48:35.712295 kernel: Detected PIPT I-cache on CPU4 Apr 12 19:48:35.712301 kernel: GICv3: CPU4: found redistributor 100000 region 0:0x0000100100540000 Apr 12 19:48:35.712308 kernel: GICv3: CPU4: using allocated LPI pending table @0x00000800003d0000 Apr 12 19:48:35.712314 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712321 kernel: CPU4: Booted secondary processor 0x0000100000 [0x413fd0c1] Apr 12 19:48:35.712328 kernel: Detected PIPT I-cache on CPU5 Apr 12 19:48:35.712335 kernel: GICv3: CPU5: found redistributor 180000 region 0:0x0000100100740000 Apr 12 19:48:35.712342 kernel: GICv3: CPU5: using allocated LPI pending table @0x00000800003e0000 Apr 12 19:48:35.712348 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712355 kernel: CPU5: Booted secondary processor 0x0000180000 [0x413fd0c1] Apr 12 19:48:35.712361 kernel: Detected PIPT I-cache on CPU6 Apr 12 19:48:35.712368 kernel: GICv3: CPU6: found redistributor 160000 region 0:0x00001001006c0000 Apr 12 19:48:35.712375 kernel: GICv3: CPU6: using allocated LPI pending table @0x00000800003f0000 Apr 12 19:48:35.712381 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712388 kernel: CPU6: Booted secondary processor 0x0000160000 [0x413fd0c1] Apr 12 19:48:35.712395 kernel: Detected PIPT I-cache on CPU7 Apr 12 19:48:35.712401 kernel: GICv3: CPU7: found redistributor 1e0000 region 0:0x00001001008c0000 Apr 12 19:48:35.712408 kernel: GICv3: CPU7: using allocated LPI pending table @0x0000080000800000 Apr 12 19:48:35.712414 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712421 kernel: CPU7: Booted secondary processor 0x00001e0000 [0x413fd0c1] Apr 12 19:48:35.712427 kernel: Detected PIPT I-cache on CPU8 Apr 12 19:48:35.712434 kernel: GICv3: CPU8: found redistributor a0000 region 0:0x00001001003c0000 Apr 12 19:48:35.712440 kernel: GICv3: CPU8: using allocated LPI pending table @0x0000080000810000 Apr 12 19:48:35.712447 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712454 kernel: CPU8: Booted secondary processor 0x00000a0000 [0x413fd0c1] Apr 12 19:48:35.712461 kernel: Detected PIPT I-cache on CPU9 Apr 12 19:48:35.712467 kernel: GICv3: CPU9: found redistributor 220000 region 0:0x00001001009c0000 Apr 12 19:48:35.712474 kernel: GICv3: CPU9: using allocated LPI pending table @0x0000080000820000 Apr 12 19:48:35.712480 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712486 kernel: CPU9: Booted secondary processor 0x0000220000 [0x413fd0c1] Apr 12 19:48:35.712493 kernel: Detected PIPT I-cache on CPU10 Apr 12 19:48:35.712500 kernel: GICv3: CPU10: found redistributor c0000 region 0:0x0000100100440000 Apr 12 19:48:35.712506 kernel: GICv3: CPU10: using allocated LPI pending table @0x0000080000830000 Apr 12 19:48:35.712514 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712521 kernel: CPU10: Booted secondary processor 0x00000c0000 [0x413fd0c1] Apr 12 19:48:35.712527 kernel: Detected PIPT I-cache on CPU11 Apr 12 19:48:35.712534 kernel: GICv3: CPU11: found redistributor 240000 region 0:0x0000100100a40000 Apr 12 19:48:35.712540 kernel: GICv3: CPU11: using allocated LPI pending table @0x0000080000840000 Apr 12 19:48:35.712547 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712553 kernel: CPU11: Booted secondary processor 0x0000240000 [0x413fd0c1] Apr 12 19:48:35.712560 kernel: Detected PIPT I-cache on CPU12 Apr 12 19:48:35.712566 kernel: GICv3: CPU12: found redistributor 80000 region 0:0x0000100100340000 Apr 12 19:48:35.712573 kernel: GICv3: CPU12: using allocated LPI pending table @0x0000080000850000 Apr 12 19:48:35.712581 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712587 kernel: CPU12: Booted secondary processor 0x0000080000 [0x413fd0c1] Apr 12 19:48:35.712594 kernel: Detected PIPT I-cache on CPU13 Apr 12 19:48:35.712601 kernel: GICv3: CPU13: found redistributor 200000 region 0:0x0000100100940000 Apr 12 19:48:35.712607 kernel: GICv3: CPU13: using allocated LPI pending table @0x0000080000860000 Apr 12 19:48:35.712614 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712621 kernel: CPU13: Booted secondary processor 0x0000200000 [0x413fd0c1] Apr 12 19:48:35.712627 kernel: Detected PIPT I-cache on CPU14 Apr 12 19:48:35.712634 kernel: GICv3: CPU14: found redistributor e0000 region 0:0x00001001004c0000 Apr 12 19:48:35.712641 kernel: GICv3: CPU14: using allocated LPI pending table @0x0000080000870000 Apr 12 19:48:35.712648 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712654 kernel: CPU14: Booted secondary processor 0x00000e0000 [0x413fd0c1] Apr 12 19:48:35.712661 kernel: Detected PIPT I-cache on CPU15 Apr 12 19:48:35.712667 kernel: GICv3: CPU15: found redistributor 260000 region 0:0x0000100100ac0000 Apr 12 19:48:35.712674 kernel: GICv3: CPU15: using allocated LPI pending table @0x0000080000880000 Apr 12 19:48:35.712680 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712686 kernel: CPU15: Booted secondary processor 0x0000260000 [0x413fd0c1] Apr 12 19:48:35.712693 kernel: Detected PIPT I-cache on CPU16 Apr 12 19:48:35.712701 kernel: GICv3: CPU16: found redistributor 20000 region 0:0x00001001001c0000 Apr 12 19:48:35.712708 kernel: GICv3: CPU16: using allocated LPI pending table @0x0000080000890000 Apr 12 19:48:35.712714 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712721 kernel: CPU16: Booted secondary processor 0x0000020000 [0x413fd0c1] Apr 12 19:48:35.712727 kernel: Detected PIPT I-cache on CPU17 Apr 12 19:48:35.712734 kernel: GICv3: CPU17: found redistributor 40000 region 0:0x0000100100240000 Apr 12 19:48:35.712740 kernel: GICv3: CPU17: using allocated LPI pending table @0x00000800008a0000 Apr 12 19:48:35.712747 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712754 kernel: CPU17: Booted secondary processor 0x0000040000 [0x413fd0c1] Apr 12 19:48:35.712760 kernel: Detected PIPT I-cache on CPU18 Apr 12 19:48:35.712775 kernel: GICv3: CPU18: found redistributor 0 region 0:0x0000100100140000 Apr 12 19:48:35.712783 kernel: GICv3: CPU18: using allocated LPI pending table @0x00000800008b0000 Apr 12 19:48:35.712790 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712797 kernel: CPU18: Booted secondary processor 0x0000000000 [0x413fd0c1] Apr 12 19:48:35.712804 kernel: Detected PIPT I-cache on CPU19 Apr 12 19:48:35.712811 kernel: GICv3: CPU19: found redistributor 60000 region 0:0x00001001002c0000 Apr 12 19:48:35.712818 kernel: GICv3: CPU19: using allocated LPI pending table @0x00000800008c0000 Apr 12 19:48:35.712825 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712831 kernel: CPU19: Booted secondary processor 0x0000060000 [0x413fd0c1] Apr 12 19:48:35.712840 kernel: Detected PIPT I-cache on CPU20 Apr 12 19:48:35.712847 kernel: GICv3: CPU20: found redistributor 130000 region 0:0x0000100100600000 Apr 12 19:48:35.712854 kernel: GICv3: CPU20: using allocated LPI pending table @0x00000800008d0000 Apr 12 19:48:35.712861 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712867 kernel: CPU20: Booted secondary processor 0x0000130000 [0x413fd0c1] Apr 12 19:48:35.712874 kernel: Detected PIPT I-cache on CPU21 Apr 12 19:48:35.712882 kernel: GICv3: CPU21: found redistributor 1b0000 region 0:0x0000100100800000 Apr 12 19:48:35.712890 kernel: GICv3: CPU21: using allocated LPI pending table @0x00000800008e0000 Apr 12 19:48:35.712897 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712904 kernel: CPU21: Booted secondary processor 0x00001b0000 [0x413fd0c1] Apr 12 19:48:35.712911 kernel: Detected PIPT I-cache on CPU22 Apr 12 19:48:35.712918 kernel: GICv3: CPU22: found redistributor 150000 region 0:0x0000100100680000 Apr 12 19:48:35.712925 kernel: GICv3: CPU22: using allocated LPI pending table @0x00000800008f0000 Apr 12 19:48:35.712931 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712938 kernel: CPU22: Booted secondary processor 0x0000150000 [0x413fd0c1] Apr 12 19:48:35.712946 kernel: Detected PIPT I-cache on CPU23 Apr 12 19:48:35.712953 kernel: GICv3: CPU23: found redistributor 1d0000 region 0:0x0000100100880000 Apr 12 19:48:35.712960 kernel: GICv3: CPU23: using allocated LPI pending table @0x0000080000900000 Apr 12 19:48:35.712967 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.712973 kernel: CPU23: Booted secondary processor 0x00001d0000 [0x413fd0c1] Apr 12 19:48:35.712980 kernel: Detected PIPT I-cache on CPU24 Apr 12 19:48:35.712987 kernel: GICv3: CPU24: found redistributor 110000 region 0:0x0000100100580000 Apr 12 19:48:35.712994 kernel: GICv3: CPU24: using allocated LPI pending table @0x0000080000910000 Apr 12 19:48:35.713001 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713007 kernel: CPU24: Booted secondary processor 0x0000110000 [0x413fd0c1] Apr 12 19:48:35.713015 kernel: Detected PIPT I-cache on CPU25 Apr 12 19:48:35.713022 kernel: GICv3: CPU25: found redistributor 190000 region 0:0x0000100100780000 Apr 12 19:48:35.713029 kernel: GICv3: CPU25: using allocated LPI pending table @0x0000080000920000 Apr 12 19:48:35.713036 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713045 kernel: CPU25: Booted secondary processor 0x0000190000 [0x413fd0c1] Apr 12 19:48:35.713052 kernel: Detected PIPT I-cache on CPU26 Apr 12 19:48:35.713059 kernel: GICv3: CPU26: found redistributor 170000 region 0:0x0000100100700000 Apr 12 19:48:35.713066 kernel: GICv3: CPU26: using allocated LPI pending table @0x0000080000930000 Apr 12 19:48:35.713072 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713080 kernel: CPU26: Booted secondary processor 0x0000170000 [0x413fd0c1] Apr 12 19:48:35.713087 kernel: Detected PIPT I-cache on CPU27 Apr 12 19:48:35.713094 kernel: GICv3: CPU27: found redistributor 1f0000 region 0:0x0000100100900000 Apr 12 19:48:35.713101 kernel: GICv3: CPU27: using allocated LPI pending table @0x0000080000940000 Apr 12 19:48:35.713108 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713115 kernel: CPU27: Booted secondary processor 0x00001f0000 [0x413fd0c1] Apr 12 19:48:35.713121 kernel: Detected PIPT I-cache on CPU28 Apr 12 19:48:35.713128 kernel: GICv3: CPU28: found redistributor b0000 region 0:0x0000100100400000 Apr 12 19:48:35.713135 kernel: GICv3: CPU28: using allocated LPI pending table @0x0000080000950000 Apr 12 19:48:35.713142 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713150 kernel: CPU28: Booted secondary processor 0x00000b0000 [0x413fd0c1] Apr 12 19:48:35.713157 kernel: Detected PIPT I-cache on CPU29 Apr 12 19:48:35.713164 kernel: GICv3: CPU29: found redistributor 230000 region 0:0x0000100100a00000 Apr 12 19:48:35.713171 kernel: GICv3: CPU29: using allocated LPI pending table @0x0000080000960000 Apr 12 19:48:35.713177 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713184 kernel: CPU29: Booted secondary processor 0x0000230000 [0x413fd0c1] Apr 12 19:48:35.713191 kernel: Detected PIPT I-cache on CPU30 Apr 12 19:48:35.713198 kernel: GICv3: CPU30: found redistributor d0000 region 0:0x0000100100480000 Apr 12 19:48:35.713205 kernel: GICv3: CPU30: using allocated LPI pending table @0x0000080000970000 Apr 12 19:48:35.713213 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713220 kernel: CPU30: Booted secondary processor 0x00000d0000 [0x413fd0c1] Apr 12 19:48:35.713226 kernel: Detected PIPT I-cache on CPU31 Apr 12 19:48:35.713233 kernel: GICv3: CPU31: found redistributor 250000 region 0:0x0000100100a80000 Apr 12 19:48:35.713240 kernel: GICv3: CPU31: using allocated LPI pending table @0x0000080000980000 Apr 12 19:48:35.713247 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713254 kernel: CPU31: Booted secondary processor 0x0000250000 [0x413fd0c1] Apr 12 19:48:35.713260 kernel: Detected PIPT I-cache on CPU32 Apr 12 19:48:35.713267 kernel: GICv3: CPU32: found redistributor 90000 region 0:0x0000100100380000 Apr 12 19:48:35.713274 kernel: GICv3: CPU32: using allocated LPI pending table @0x0000080000990000 Apr 12 19:48:35.713282 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713289 kernel: CPU32: Booted secondary processor 0x0000090000 [0x413fd0c1] Apr 12 19:48:35.713296 kernel: Detected PIPT I-cache on CPU33 Apr 12 19:48:35.713302 kernel: GICv3: CPU33: found redistributor 210000 region 0:0x0000100100980000 Apr 12 19:48:35.713309 kernel: GICv3: CPU33: using allocated LPI pending table @0x00000800009a0000 Apr 12 19:48:35.713316 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713323 kernel: CPU33: Booted secondary processor 0x0000210000 [0x413fd0c1] Apr 12 19:48:35.713330 kernel: Detected PIPT I-cache on CPU34 Apr 12 19:48:35.713337 kernel: GICv3: CPU34: found redistributor f0000 region 0:0x0000100100500000 Apr 12 19:48:35.713344 kernel: GICv3: CPU34: using allocated LPI pending table @0x00000800009b0000 Apr 12 19:48:35.713353 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713359 kernel: CPU34: Booted secondary processor 0x00000f0000 [0x413fd0c1] Apr 12 19:48:35.713366 kernel: Detected PIPT I-cache on CPU35 Apr 12 19:48:35.713373 kernel: GICv3: CPU35: found redistributor 270000 region 0:0x0000100100b00000 Apr 12 19:48:35.713380 kernel: GICv3: CPU35: using allocated LPI pending table @0x00000800009c0000 Apr 12 19:48:35.713387 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713394 kernel: CPU35: Booted secondary processor 0x0000270000 [0x413fd0c1] Apr 12 19:48:35.713400 kernel: Detected PIPT I-cache on CPU36 Apr 12 19:48:35.713407 kernel: GICv3: CPU36: found redistributor 30000 region 0:0x0000100100200000 Apr 12 19:48:35.713415 kernel: GICv3: CPU36: using allocated LPI pending table @0x00000800009d0000 Apr 12 19:48:35.713422 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713429 kernel: CPU36: Booted secondary processor 0x0000030000 [0x413fd0c1] Apr 12 19:48:35.713436 kernel: Detected PIPT I-cache on CPU37 Apr 12 19:48:35.713443 kernel: GICv3: CPU37: found redistributor 50000 region 0:0x0000100100280000 Apr 12 19:48:35.713450 kernel: GICv3: CPU37: using allocated LPI pending table @0x00000800009e0000 Apr 12 19:48:35.713457 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713464 kernel: CPU37: Booted secondary processor 0x0000050000 [0x413fd0c1] Apr 12 19:48:35.713470 kernel: Detected PIPT I-cache on CPU38 Apr 12 19:48:35.713478 kernel: GICv3: CPU38: found redistributor 10000 region 0:0x0000100100180000 Apr 12 19:48:35.713485 kernel: GICv3: CPU38: using allocated LPI pending table @0x00000800009f0000 Apr 12 19:48:35.713492 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713499 kernel: CPU38: Booted secondary processor 0x0000010000 [0x413fd0c1] Apr 12 19:48:35.713506 kernel: Detected PIPT I-cache on CPU39 Apr 12 19:48:35.713512 kernel: GICv3: CPU39: found redistributor 70000 region 0:0x0000100100300000 Apr 12 19:48:35.713519 kernel: GICv3: CPU39: using allocated LPI pending table @0x0000080000a00000 Apr 12 19:48:35.713526 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713533 kernel: CPU39: Booted secondary processor 0x0000070000 [0x413fd0c1] Apr 12 19:48:35.713541 kernel: Detected PIPT I-cache on CPU40 Apr 12 19:48:35.713548 kernel: GICv3: CPU40: found redistributor 120100 region 0:0x00001001005e0000 Apr 12 19:48:35.713555 kernel: GICv3: CPU40: using allocated LPI pending table @0x0000080000a10000 Apr 12 19:48:35.713562 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713569 kernel: CPU40: Booted secondary processor 0x0000120100 [0x413fd0c1] Apr 12 19:48:35.713575 kernel: Detected PIPT I-cache on CPU41 Apr 12 19:48:35.713582 kernel: GICv3: CPU41: found redistributor 1a0100 region 0:0x00001001007e0000 Apr 12 19:48:35.713589 kernel: GICv3: CPU41: using allocated LPI pending table @0x0000080000a20000 Apr 12 19:48:35.713597 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713604 kernel: CPU41: Booted secondary processor 0x00001a0100 [0x413fd0c1] Apr 12 19:48:35.713610 kernel: Detected PIPT I-cache on CPU42 Apr 12 19:48:35.713617 kernel: GICv3: CPU42: found redistributor 140100 region 0:0x0000100100660000 Apr 12 19:48:35.713624 kernel: GICv3: CPU42: using allocated LPI pending table @0x0000080000a30000 Apr 12 19:48:35.713631 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713638 kernel: CPU42: Booted secondary processor 0x0000140100 [0x413fd0c1] Apr 12 19:48:35.713645 kernel: Detected PIPT I-cache on CPU43 Apr 12 19:48:35.713652 kernel: GICv3: CPU43: found redistributor 1c0100 region 0:0x0000100100860000 Apr 12 19:48:35.713659 kernel: GICv3: CPU43: using allocated LPI pending table @0x0000080000a40000 Apr 12 19:48:35.713667 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713673 kernel: CPU43: Booted secondary processor 0x00001c0100 [0x413fd0c1] Apr 12 19:48:35.713680 kernel: Detected PIPT I-cache on CPU44 Apr 12 19:48:35.713687 kernel: GICv3: CPU44: found redistributor 100100 region 0:0x0000100100560000 Apr 12 19:48:35.713694 kernel: GICv3: CPU44: using allocated LPI pending table @0x0000080000a50000 Apr 12 19:48:35.713701 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713707 kernel: CPU44: Booted secondary processor 0x0000100100 [0x413fd0c1] Apr 12 19:48:35.713714 kernel: Detected PIPT I-cache on CPU45 Apr 12 19:48:35.713721 kernel: GICv3: CPU45: found redistributor 180100 region 0:0x0000100100760000 Apr 12 19:48:35.713729 kernel: GICv3: CPU45: using allocated LPI pending table @0x0000080000a60000 Apr 12 19:48:35.713736 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713743 kernel: CPU45: Booted secondary processor 0x0000180100 [0x413fd0c1] Apr 12 19:48:35.713750 kernel: Detected PIPT I-cache on CPU46 Apr 12 19:48:35.713757 kernel: GICv3: CPU46: found redistributor 160100 region 0:0x00001001006e0000 Apr 12 19:48:35.713765 kernel: GICv3: CPU46: using allocated LPI pending table @0x0000080000a70000 Apr 12 19:48:35.713771 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713778 kernel: CPU46: Booted secondary processor 0x0000160100 [0x413fd0c1] Apr 12 19:48:35.713785 kernel: Detected PIPT I-cache on CPU47 Apr 12 19:48:35.713792 kernel: GICv3: CPU47: found redistributor 1e0100 region 0:0x00001001008e0000 Apr 12 19:48:35.713800 kernel: GICv3: CPU47: using allocated LPI pending table @0x0000080000a80000 Apr 12 19:48:35.713807 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713814 kernel: CPU47: Booted secondary processor 0x00001e0100 [0x413fd0c1] Apr 12 19:48:35.713820 kernel: Detected PIPT I-cache on CPU48 Apr 12 19:48:35.713827 kernel: GICv3: CPU48: found redistributor a0100 region 0:0x00001001003e0000 Apr 12 19:48:35.713834 kernel: GICv3: CPU48: using allocated LPI pending table @0x0000080000a90000 Apr 12 19:48:35.713841 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713848 kernel: CPU48: Booted secondary processor 0x00000a0100 [0x413fd0c1] Apr 12 19:48:35.713855 kernel: Detected PIPT I-cache on CPU49 Apr 12 19:48:35.713863 kernel: GICv3: CPU49: found redistributor 220100 region 0:0x00001001009e0000 Apr 12 19:48:35.713870 kernel: GICv3: CPU49: using allocated LPI pending table @0x0000080000aa0000 Apr 12 19:48:35.713877 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713883 kernel: CPU49: Booted secondary processor 0x0000220100 [0x413fd0c1] Apr 12 19:48:35.713890 kernel: Detected PIPT I-cache on CPU50 Apr 12 19:48:35.713897 kernel: GICv3: CPU50: found redistributor c0100 region 0:0x0000100100460000 Apr 12 19:48:35.713904 kernel: GICv3: CPU50: using allocated LPI pending table @0x0000080000ab0000 Apr 12 19:48:35.713911 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713917 kernel: CPU50: Booted secondary processor 0x00000c0100 [0x413fd0c1] Apr 12 19:48:35.713924 kernel: Detected PIPT I-cache on CPU51 Apr 12 19:48:35.713932 kernel: GICv3: CPU51: found redistributor 240100 region 0:0x0000100100a60000 Apr 12 19:48:35.713939 kernel: GICv3: CPU51: using allocated LPI pending table @0x0000080000ac0000 Apr 12 19:48:35.713946 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713952 kernel: CPU51: Booted secondary processor 0x0000240100 [0x413fd0c1] Apr 12 19:48:35.713959 kernel: Detected PIPT I-cache on CPU52 Apr 12 19:48:35.713966 kernel: GICv3: CPU52: found redistributor 80100 region 0:0x0000100100360000 Apr 12 19:48:35.713973 kernel: GICv3: CPU52: using allocated LPI pending table @0x0000080000ad0000 Apr 12 19:48:35.713980 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.713987 kernel: CPU52: Booted secondary processor 0x0000080100 [0x413fd0c1] Apr 12 19:48:35.713995 kernel: Detected PIPT I-cache on CPU53 Apr 12 19:48:35.714003 kernel: GICv3: CPU53: found redistributor 200100 region 0:0x0000100100960000 Apr 12 19:48:35.714010 kernel: GICv3: CPU53: using allocated LPI pending table @0x0000080000ae0000 Apr 12 19:48:35.714017 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714023 kernel: CPU53: Booted secondary processor 0x0000200100 [0x413fd0c1] Apr 12 19:48:35.714030 kernel: Detected PIPT I-cache on CPU54 Apr 12 19:48:35.714037 kernel: GICv3: CPU54: found redistributor e0100 region 0:0x00001001004e0000 Apr 12 19:48:35.714045 kernel: GICv3: CPU54: using allocated LPI pending table @0x0000080000af0000 Apr 12 19:48:35.714052 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714059 kernel: CPU54: Booted secondary processor 0x00000e0100 [0x413fd0c1] Apr 12 19:48:35.714067 kernel: Detected PIPT I-cache on CPU55 Apr 12 19:48:35.714074 kernel: GICv3: CPU55: found redistributor 260100 region 0:0x0000100100ae0000 Apr 12 19:48:35.714081 kernel: GICv3: CPU55: using allocated LPI pending table @0x0000080000b00000 Apr 12 19:48:35.714088 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714094 kernel: CPU55: Booted secondary processor 0x0000260100 [0x413fd0c1] Apr 12 19:48:35.714101 kernel: Detected PIPT I-cache on CPU56 Apr 12 19:48:35.714108 kernel: GICv3: CPU56: found redistributor 20100 region 0:0x00001001001e0000 Apr 12 19:48:35.714115 kernel: GICv3: CPU56: using allocated LPI pending table @0x0000080000b10000 Apr 12 19:48:35.714122 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714129 kernel: CPU56: Booted secondary processor 0x0000020100 [0x413fd0c1] Apr 12 19:48:35.714136 kernel: Detected PIPT I-cache on CPU57 Apr 12 19:48:35.714143 kernel: GICv3: CPU57: found redistributor 40100 region 0:0x0000100100260000 Apr 12 19:48:35.714150 kernel: GICv3: CPU57: using allocated LPI pending table @0x0000080000b20000 Apr 12 19:48:35.714157 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714164 kernel: CPU57: Booted secondary processor 0x0000040100 [0x413fd0c1] Apr 12 19:48:35.714170 kernel: Detected PIPT I-cache on CPU58 Apr 12 19:48:35.714177 kernel: GICv3: CPU58: found redistributor 100 region 0:0x0000100100160000 Apr 12 19:48:35.714184 kernel: GICv3: CPU58: using allocated LPI pending table @0x0000080000b30000 Apr 12 19:48:35.714192 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714199 kernel: CPU58: Booted secondary processor 0x0000000100 [0x413fd0c1] Apr 12 19:48:35.714206 kernel: Detected PIPT I-cache on CPU59 Apr 12 19:48:35.714213 kernel: GICv3: CPU59: found redistributor 60100 region 0:0x00001001002e0000 Apr 12 19:48:35.714220 kernel: GICv3: CPU59: using allocated LPI pending table @0x0000080000b40000 Apr 12 19:48:35.714226 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714233 kernel: CPU59: Booted secondary processor 0x0000060100 [0x413fd0c1] Apr 12 19:48:35.714240 kernel: Detected PIPT I-cache on CPU60 Apr 12 19:48:35.714247 kernel: GICv3: CPU60: found redistributor 130100 region 0:0x0000100100620000 Apr 12 19:48:35.714254 kernel: GICv3: CPU60: using allocated LPI pending table @0x0000080000b50000 Apr 12 19:48:35.714262 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714268 kernel: CPU60: Booted secondary processor 0x0000130100 [0x413fd0c1] Apr 12 19:48:35.714275 kernel: Detected PIPT I-cache on CPU61 Apr 12 19:48:35.714282 kernel: GICv3: CPU61: found redistributor 1b0100 region 0:0x0000100100820000 Apr 12 19:48:35.714289 kernel: GICv3: CPU61: using allocated LPI pending table @0x0000080000b60000 Apr 12 19:48:35.714296 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714302 kernel: CPU61: Booted secondary processor 0x00001b0100 [0x413fd0c1] Apr 12 19:48:35.714309 kernel: Detected PIPT I-cache on CPU62 Apr 12 19:48:35.714316 kernel: GICv3: CPU62: found redistributor 150100 region 0:0x00001001006a0000 Apr 12 19:48:35.714324 kernel: GICv3: CPU62: using allocated LPI pending table @0x0000080000b70000 Apr 12 19:48:35.714331 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714338 kernel: CPU62: Booted secondary processor 0x0000150100 [0x413fd0c1] Apr 12 19:48:35.714345 kernel: Detected PIPT I-cache on CPU63 Apr 12 19:48:35.714351 kernel: GICv3: CPU63: found redistributor 1d0100 region 0:0x00001001008a0000 Apr 12 19:48:35.714358 kernel: GICv3: CPU63: using allocated LPI pending table @0x0000080000b80000 Apr 12 19:48:35.714365 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714372 kernel: CPU63: Booted secondary processor 0x00001d0100 [0x413fd0c1] Apr 12 19:48:35.714379 kernel: Detected PIPT I-cache on CPU64 Apr 12 19:48:35.714385 kernel: GICv3: CPU64: found redistributor 110100 region 0:0x00001001005a0000 Apr 12 19:48:35.714393 kernel: GICv3: CPU64: using allocated LPI pending table @0x0000080000b90000 Apr 12 19:48:35.714400 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714407 kernel: CPU64: Booted secondary processor 0x0000110100 [0x413fd0c1] Apr 12 19:48:35.714414 kernel: Detected PIPT I-cache on CPU65 Apr 12 19:48:35.714421 kernel: GICv3: CPU65: found redistributor 190100 region 0:0x00001001007a0000 Apr 12 19:48:35.714428 kernel: GICv3: CPU65: using allocated LPI pending table @0x0000080000ba0000 Apr 12 19:48:35.714434 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714441 kernel: CPU65: Booted secondary processor 0x0000190100 [0x413fd0c1] Apr 12 19:48:35.714448 kernel: Detected PIPT I-cache on CPU66 Apr 12 19:48:35.714456 kernel: GICv3: CPU66: found redistributor 170100 region 0:0x0000100100720000 Apr 12 19:48:35.714463 kernel: GICv3: CPU66: using allocated LPI pending table @0x0000080000bb0000 Apr 12 19:48:35.714470 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714476 kernel: CPU66: Booted secondary processor 0x0000170100 [0x413fd0c1] Apr 12 19:48:35.714483 kernel: Detected PIPT I-cache on CPU67 Apr 12 19:48:35.714490 kernel: GICv3: CPU67: found redistributor 1f0100 region 0:0x0000100100920000 Apr 12 19:48:35.714497 kernel: GICv3: CPU67: using allocated LPI pending table @0x0000080000bc0000 Apr 12 19:48:35.714504 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714510 kernel: CPU67: Booted secondary processor 0x00001f0100 [0x413fd0c1] Apr 12 19:48:35.714517 kernel: Detected PIPT I-cache on CPU68 Apr 12 19:48:35.714525 kernel: GICv3: CPU68: found redistributor b0100 region 0:0x0000100100420000 Apr 12 19:48:35.714532 kernel: GICv3: CPU68: using allocated LPI pending table @0x0000080000bd0000 Apr 12 19:48:35.714539 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714545 kernel: CPU68: Booted secondary processor 0x00000b0100 [0x413fd0c1] Apr 12 19:48:35.714552 kernel: Detected PIPT I-cache on CPU69 Apr 12 19:48:35.714559 kernel: GICv3: CPU69: found redistributor 230100 region 0:0x0000100100a20000 Apr 12 19:48:35.714566 kernel: GICv3: CPU69: using allocated LPI pending table @0x0000080000be0000 Apr 12 19:48:35.714573 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714579 kernel: CPU69: Booted secondary processor 0x0000230100 [0x413fd0c1] Apr 12 19:48:35.714587 kernel: Detected PIPT I-cache on CPU70 Apr 12 19:48:35.714594 kernel: GICv3: CPU70: found redistributor d0100 region 0:0x00001001004a0000 Apr 12 19:48:35.714601 kernel: GICv3: CPU70: using allocated LPI pending table @0x0000080000bf0000 Apr 12 19:48:35.714608 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714615 kernel: CPU70: Booted secondary processor 0x00000d0100 [0x413fd0c1] Apr 12 19:48:35.714622 kernel: Detected PIPT I-cache on CPU71 Apr 12 19:48:35.714628 kernel: GICv3: CPU71: found redistributor 250100 region 0:0x0000100100aa0000 Apr 12 19:48:35.714635 kernel: GICv3: CPU71: using allocated LPI pending table @0x0000080000c00000 Apr 12 19:48:35.714642 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714649 kernel: CPU71: Booted secondary processor 0x0000250100 [0x413fd0c1] Apr 12 19:48:35.714657 kernel: Detected PIPT I-cache on CPU72 Apr 12 19:48:35.714664 kernel: GICv3: CPU72: found redistributor 90100 region 0:0x00001001003a0000 Apr 12 19:48:35.714670 kernel: GICv3: CPU72: using allocated LPI pending table @0x0000080000c10000 Apr 12 19:48:35.714677 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714684 kernel: CPU72: Booted secondary processor 0x0000090100 [0x413fd0c1] Apr 12 19:48:35.714691 kernel: Detected PIPT I-cache on CPU73 Apr 12 19:48:35.714698 kernel: GICv3: CPU73: found redistributor 210100 region 0:0x00001001009a0000 Apr 12 19:48:35.714704 kernel: GICv3: CPU73: using allocated LPI pending table @0x0000080000c20000 Apr 12 19:48:35.714711 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714719 kernel: CPU73: Booted secondary processor 0x0000210100 [0x413fd0c1] Apr 12 19:48:35.714726 kernel: Detected PIPT I-cache on CPU74 Apr 12 19:48:35.714733 kernel: GICv3: CPU74: found redistributor f0100 region 0:0x0000100100520000 Apr 12 19:48:35.714740 kernel: GICv3: CPU74: using allocated LPI pending table @0x0000080000c30000 Apr 12 19:48:35.714747 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714754 kernel: CPU74: Booted secondary processor 0x00000f0100 [0x413fd0c1] Apr 12 19:48:35.714760 kernel: Detected PIPT I-cache on CPU75 Apr 12 19:48:35.714767 kernel: GICv3: CPU75: found redistributor 270100 region 0:0x0000100100b20000 Apr 12 19:48:35.714774 kernel: GICv3: CPU75: using allocated LPI pending table @0x0000080000c40000 Apr 12 19:48:35.714782 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714789 kernel: CPU75: Booted secondary processor 0x0000270100 [0x413fd0c1] Apr 12 19:48:35.714795 kernel: Detected PIPT I-cache on CPU76 Apr 12 19:48:35.714802 kernel: GICv3: CPU76: found redistributor 30100 region 0:0x0000100100220000 Apr 12 19:48:35.714809 kernel: GICv3: CPU76: using allocated LPI pending table @0x0000080000c50000 Apr 12 19:48:35.714816 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714823 kernel: CPU76: Booted secondary processor 0x0000030100 [0x413fd0c1] Apr 12 19:48:35.714830 kernel: Detected PIPT I-cache on CPU77 Apr 12 19:48:35.714836 kernel: GICv3: CPU77: found redistributor 50100 region 0:0x00001001002a0000 Apr 12 19:48:35.714843 kernel: GICv3: CPU77: using allocated LPI pending table @0x0000080000c60000 Apr 12 19:48:35.714851 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714858 kernel: CPU77: Booted secondary processor 0x0000050100 [0x413fd0c1] Apr 12 19:48:35.714865 kernel: Detected PIPT I-cache on CPU78 Apr 12 19:48:35.714872 kernel: GICv3: CPU78: found redistributor 10100 region 0:0x00001001001a0000 Apr 12 19:48:35.714879 kernel: GICv3: CPU78: using allocated LPI pending table @0x0000080000c70000 Apr 12 19:48:35.714885 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714892 kernel: CPU78: Booted secondary processor 0x0000010100 [0x413fd0c1] Apr 12 19:48:35.714899 kernel: Detected PIPT I-cache on CPU79 Apr 12 19:48:35.714906 kernel: GICv3: CPU79: found redistributor 70100 region 0:0x0000100100320000 Apr 12 19:48:35.714914 kernel: GICv3: CPU79: using allocated LPI pending table @0x0000080000c80000 Apr 12 19:48:35.714921 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 19:48:35.714928 kernel: CPU79: Booted secondary processor 0x0000070100 [0x413fd0c1] Apr 12 19:48:35.714935 kernel: smp: Brought up 1 node, 80 CPUs Apr 12 19:48:35.714942 kernel: SMP: Total of 80 processors activated. Apr 12 19:48:35.714948 kernel: CPU features: detected: 32-bit EL0 Support Apr 12 19:48:35.714955 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Apr 12 19:48:35.714962 kernel: CPU features: detected: Common not Private translations Apr 12 19:48:35.714969 kernel: CPU features: detected: CRC32 instructions Apr 12 19:48:35.714977 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Apr 12 19:48:35.714984 kernel: CPU features: detected: LSE atomic instructions Apr 12 19:48:35.714991 kernel: CPU features: detected: Privileged Access Never Apr 12 19:48:35.714998 kernel: CPU features: detected: RAS Extension Support Apr 12 19:48:35.715005 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Apr 12 19:48:35.715012 kernel: CPU: All CPU(s) started at EL2 Apr 12 19:48:35.715018 kernel: devtmpfs: initialized Apr 12 19:48:35.715025 kernel: KASLR enabled Apr 12 19:48:35.715032 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 19:48:35.715039 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Apr 12 19:48:35.715049 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 19:48:35.715056 kernel: SMBIOS 3.4.0 present. Apr 12 19:48:35.715063 kernel: DMI: GIGABYTE R272-P30-JG/MP32-AR0-JG, BIOS F17a (SCP: 1.07.20210713) 07/22/2021 Apr 12 19:48:35.715070 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 19:48:35.715077 kernel: DMA: preallocated 4096 KiB GFP_KERNEL pool for atomic allocations Apr 12 19:48:35.715084 kernel: DMA: preallocated 4096 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Apr 12 19:48:35.715091 kernel: DMA: preallocated 4096 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Apr 12 19:48:35.715097 kernel: audit: initializing netlink subsys (disabled) Apr 12 19:48:35.715106 kernel: audit: type=2000 audit(0.053:1): state=initialized audit_enabled=0 res=1 Apr 12 19:48:35.715113 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 19:48:35.715120 kernel: cpuidle: using governor menu Apr 12 19:48:35.715126 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Apr 12 19:48:35.715133 kernel: ASID allocator initialised with 32768 entries Apr 12 19:48:35.715140 kernel: ACPI: bus type PCI registered Apr 12 19:48:35.715147 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 19:48:35.715153 kernel: Serial: AMBA PL011 UART driver Apr 12 19:48:35.715160 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 19:48:35.715167 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Apr 12 19:48:35.715175 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 19:48:35.715182 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Apr 12 19:48:35.715189 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 19:48:35.715196 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Apr 12 19:48:35.715203 kernel: ACPI: Added _OSI(Module Device) Apr 12 19:48:35.715210 kernel: ACPI: Added _OSI(Processor Device) Apr 12 19:48:35.715217 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 19:48:35.715223 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 19:48:35.715230 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 19:48:35.715239 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 19:48:35.715245 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 19:48:35.715252 kernel: ACPI: 2 ACPI AML tables successfully acquired and loaded Apr 12 19:48:35.715259 kernel: ACPI: Interpreter enabled Apr 12 19:48:35.715266 kernel: ACPI: Using GIC for interrupt routing Apr 12 19:48:35.715273 kernel: ACPI: MCFG table detected, 8 entries Apr 12 19:48:35.715280 kernel: ACPI: IORT: SMMU-v3[33ffe0000000] Mapped to Proximity domain 0 Apr 12 19:48:35.715286 kernel: ACPI: IORT: SMMU-v3[37ffe0000000] Mapped to Proximity domain 0 Apr 12 19:48:35.715293 kernel: ACPI: IORT: SMMU-v3[3bffe0000000] Mapped to Proximity domain 0 Apr 12 19:48:35.715301 kernel: ACPI: IORT: SMMU-v3[3fffe0000000] Mapped to Proximity domain 0 Apr 12 19:48:35.715308 kernel: ACPI: IORT: SMMU-v3[23ffe0000000] Mapped to Proximity domain 0 Apr 12 19:48:35.715315 kernel: ACPI: IORT: SMMU-v3[27ffe0000000] Mapped to Proximity domain 0 Apr 12 19:48:35.715322 kernel: ACPI: IORT: SMMU-v3[2bffe0000000] Mapped to Proximity domain 0 Apr 12 19:48:35.715329 kernel: ACPI: IORT: SMMU-v3[2fffe0000000] Mapped to Proximity domain 0 Apr 12 19:48:35.715336 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x100002600000 (irq = 19, base_baud = 0) is a SBSA Apr 12 19:48:35.715343 kernel: printk: console [ttyAMA0] enabled Apr 12 19:48:35.715350 kernel: ARMH0011:01: ttyAMA1 at MMIO 0x100002620000 (irq = 20, base_baud = 0) is a SBSA Apr 12 19:48:35.715357 kernel: ACPI: PCI Root Bridge [PCI1] (domain 000d [bus 00-ff]) Apr 12 19:48:35.715476 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 19:48:35.715542 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 19:48:35.715600 kernel: acpi PNP0A08:00: _OSC: OS now controls [AER PCIeCapability] Apr 12 19:48:35.715659 kernel: acpi PNP0A08:00: MCFG quirk: ECAM at [mem 0x37fff0000000-0x37ffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 19:48:35.715716 kernel: acpi PNP0A08:00: ECAM area [mem 0x37fff0000000-0x37ffffffffff] reserved by PNP0C02:00 Apr 12 19:48:35.715773 kernel: acpi PNP0A08:00: ECAM at [mem 0x37fff0000000-0x37ffffffffff] for [bus 00-ff] Apr 12 19:48:35.715785 kernel: PCI host bridge to bus 000d:00 Apr 12 19:48:35.715850 kernel: pci_bus 000d:00: root bus resource [mem 0x50000000-0x5fffffff window] Apr 12 19:48:35.715904 kernel: pci_bus 000d:00: root bus resource [mem 0x340000000000-0x37ffdfffffff window] Apr 12 19:48:35.715957 kernel: pci_bus 000d:00: root bus resource [bus 00-ff] Apr 12 19:48:35.716028 kernel: pci 000d:00:00.0: [1def:e100] type 00 class 0x060000 Apr 12 19:48:35.716103 kernel: pci 000d:00:01.0: [1def:e101] type 01 class 0x060400 Apr 12 19:48:35.716165 kernel: pci 000d:00:01.0: enabling Extended Tags Apr 12 19:48:35.716226 kernel: pci 000d:00:01.0: supports D1 D2 Apr 12 19:48:35.716285 kernel: pci 000d:00:01.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.716351 kernel: pci 000d:00:02.0: [1def:e102] type 01 class 0x060400 Apr 12 19:48:35.716413 kernel: pci 000d:00:02.0: supports D1 D2 Apr 12 19:48:35.716472 kernel: pci 000d:00:02.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.716538 kernel: pci 000d:00:03.0: [1def:e103] type 01 class 0x060400 Apr 12 19:48:35.716600 kernel: pci 000d:00:03.0: supports D1 D2 Apr 12 19:48:35.716660 kernel: pci 000d:00:03.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.716728 kernel: pci 000d:00:04.0: [1def:e104] type 01 class 0x060400 Apr 12 19:48:35.716787 kernel: pci 000d:00:04.0: supports D1 D2 Apr 12 19:48:35.716847 kernel: pci 000d:00:04.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.716856 kernel: acpiphp: Slot [1] registered Apr 12 19:48:35.716863 kernel: acpiphp: Slot [2] registered Apr 12 19:48:35.716871 kernel: acpiphp: Slot [3] registered Apr 12 19:48:35.716878 kernel: acpiphp: Slot [4] registered Apr 12 19:48:35.716929 kernel: pci_bus 000d:00: on NUMA node 0 Apr 12 19:48:35.716989 kernel: pci 000d:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 19:48:35.717050 kernel: pci 000d:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:48:35.717111 kernel: pci 000d:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:48:35.717170 kernel: pci 000d:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 19:48:35.717230 kernel: pci 000d:00:02.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:48:35.717290 kernel: pci 000d:00:02.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:48:35.717355 kernel: pci 000d:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 19:48:35.717417 kernel: pci 000d:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:48:35.717476 kernel: pci 000d:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:48:35.717538 kernel: pci 000d:00:04.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 19:48:35.717598 kernel: pci 000d:00:04.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:48:35.717658 kernel: pci 000d:00:04.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:48:35.717721 kernel: pci 000d:00:01.0: BAR 14: assigned [mem 0x50000000-0x501fffff] Apr 12 19:48:35.717784 kernel: pci 000d:00:01.0: BAR 15: assigned [mem 0x340000000000-0x3400001fffff 64bit pref] Apr 12 19:48:35.717845 kernel: pci 000d:00:02.0: BAR 14: assigned [mem 0x50200000-0x503fffff] Apr 12 19:48:35.717907 kernel: pci 000d:00:02.0: BAR 15: assigned [mem 0x340000200000-0x3400003fffff 64bit pref] Apr 12 19:48:35.717971 kernel: pci 000d:00:03.0: BAR 14: assigned [mem 0x50400000-0x505fffff] Apr 12 19:48:35.718073 kernel: pci 000d:00:03.0: BAR 15: assigned [mem 0x340000400000-0x3400005fffff 64bit pref] Apr 12 19:48:35.718136 kernel: pci 000d:00:04.0: BAR 14: assigned [mem 0x50600000-0x507fffff] Apr 12 19:48:35.718198 kernel: pci 000d:00:04.0: BAR 15: assigned [mem 0x340000600000-0x3400007fffff 64bit pref] Apr 12 19:48:35.718259 kernel: pci 000d:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.718320 kernel: pci 000d:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.718380 kernel: pci 000d:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.718441 kernel: pci 000d:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.718501 kernel: pci 000d:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.718561 kernel: pci 000d:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.718621 kernel: pci 000d:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.718683 kernel: pci 000d:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.718742 kernel: pci 000d:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.718801 kernel: pci 000d:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.718860 kernel: pci 000d:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.718921 kernel: pci 000d:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.718987 kernel: pci 000d:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.719057 kernel: pci 000d:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.719117 kernel: pci 000d:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.719179 kernel: pci 000d:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.719237 kernel: pci 000d:00:01.0: PCI bridge to [bus 01] Apr 12 19:48:35.719297 kernel: pci 000d:00:01.0: bridge window [mem 0x50000000-0x501fffff] Apr 12 19:48:35.719355 kernel: pci 000d:00:01.0: bridge window [mem 0x340000000000-0x3400001fffff 64bit pref] Apr 12 19:48:35.719415 kernel: pci 000d:00:02.0: PCI bridge to [bus 02] Apr 12 19:48:35.719474 kernel: pci 000d:00:02.0: bridge window [mem 0x50200000-0x503fffff] Apr 12 19:48:35.719533 kernel: pci 000d:00:02.0: bridge window [mem 0x340000200000-0x3400003fffff 64bit pref] Apr 12 19:48:35.719596 kernel: pci 000d:00:03.0: PCI bridge to [bus 03] Apr 12 19:48:35.719654 kernel: pci 000d:00:03.0: bridge window [mem 0x50400000-0x505fffff] Apr 12 19:48:35.719714 kernel: pci 000d:00:03.0: bridge window [mem 0x340000400000-0x3400005fffff 64bit pref] Apr 12 19:48:35.719772 kernel: pci 000d:00:04.0: PCI bridge to [bus 04] Apr 12 19:48:35.719832 kernel: pci 000d:00:04.0: bridge window [mem 0x50600000-0x507fffff] Apr 12 19:48:35.719891 kernel: pci 000d:00:04.0: bridge window [mem 0x340000600000-0x3400007fffff 64bit pref] Apr 12 19:48:35.719948 kernel: pci_bus 000d:00: resource 4 [mem 0x50000000-0x5fffffff window] Apr 12 19:48:35.720003 kernel: pci_bus 000d:00: resource 5 [mem 0x340000000000-0x37ffdfffffff window] Apr 12 19:48:35.720072 kernel: pci_bus 000d:01: resource 1 [mem 0x50000000-0x501fffff] Apr 12 19:48:35.720131 kernel: pci_bus 000d:01: resource 2 [mem 0x340000000000-0x3400001fffff 64bit pref] Apr 12 19:48:35.720195 kernel: pci_bus 000d:02: resource 1 [mem 0x50200000-0x503fffff] Apr 12 19:48:35.720251 kernel: pci_bus 000d:02: resource 2 [mem 0x340000200000-0x3400003fffff 64bit pref] Apr 12 19:48:35.720324 kernel: pci_bus 000d:03: resource 1 [mem 0x50400000-0x505fffff] Apr 12 19:48:35.720380 kernel: pci_bus 000d:03: resource 2 [mem 0x340000400000-0x3400005fffff 64bit pref] Apr 12 19:48:35.720445 kernel: pci_bus 000d:04: resource 1 [mem 0x50600000-0x507fffff] Apr 12 19:48:35.720500 kernel: pci_bus 000d:04: resource 2 [mem 0x340000600000-0x3400007fffff 64bit pref] Apr 12 19:48:35.720509 kernel: ACPI: PCI Root Bridge [PCI3] (domain 0000 [bus 00-ff]) Apr 12 19:48:35.720575 kernel: acpi PNP0A08:01: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 19:48:35.720635 kernel: acpi PNP0A08:01: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 19:48:35.720693 kernel: acpi PNP0A08:01: _OSC: OS now controls [AER PCIeCapability] Apr 12 19:48:35.720750 kernel: acpi PNP0A08:01: MCFG quirk: ECAM at [mem 0x3ffff0000000-0x3fffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 19:48:35.720807 kernel: acpi PNP0A08:01: ECAM area [mem 0x3ffff0000000-0x3fffffffffff] reserved by PNP0C02:00 Apr 12 19:48:35.720868 kernel: acpi PNP0A08:01: ECAM at [mem 0x3ffff0000000-0x3fffffffffff] for [bus 00-ff] Apr 12 19:48:35.720877 kernel: PCI host bridge to bus 0000:00 Apr 12 19:48:35.720938 kernel: pci_bus 0000:00: root bus resource [mem 0x70000000-0x7fffffff window] Apr 12 19:48:35.720992 kernel: pci_bus 0000:00: root bus resource [mem 0x3c0000000000-0x3fffdfffffff window] Apr 12 19:48:35.721047 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 19:48:35.721117 kernel: pci 0000:00:00.0: [1def:e100] type 00 class 0x060000 Apr 12 19:48:35.721185 kernel: pci 0000:00:01.0: [1def:e101] type 01 class 0x060400 Apr 12 19:48:35.721246 kernel: pci 0000:00:01.0: enabling Extended Tags Apr 12 19:48:35.721304 kernel: pci 0000:00:01.0: supports D1 D2 Apr 12 19:48:35.721364 kernel: pci 0000:00:01.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.721433 kernel: pci 0000:00:02.0: [1def:e102] type 01 class 0x060400 Apr 12 19:48:35.721493 kernel: pci 0000:00:02.0: supports D1 D2 Apr 12 19:48:35.721553 kernel: pci 0000:00:02.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.721618 kernel: pci 0000:00:03.0: [1def:e103] type 01 class 0x060400 Apr 12 19:48:35.721678 kernel: pci 0000:00:03.0: supports D1 D2 Apr 12 19:48:35.721737 kernel: pci 0000:00:03.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.721804 kernel: pci 0000:00:04.0: [1def:e104] type 01 class 0x060400 Apr 12 19:48:35.721876 kernel: pci 0000:00:04.0: supports D1 D2 Apr 12 19:48:35.721941 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.721950 kernel: acpiphp: Slot [1-1] registered Apr 12 19:48:35.721957 kernel: acpiphp: Slot [2-1] registered Apr 12 19:48:35.721963 kernel: acpiphp: Slot [3-1] registered Apr 12 19:48:35.721970 kernel: acpiphp: Slot [4-1] registered Apr 12 19:48:35.722023 kernel: pci_bus 0000:00: on NUMA node 0 Apr 12 19:48:35.722086 kernel: pci 0000:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 19:48:35.722150 kernel: pci 0000:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:48:35.722209 kernel: pci 0000:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:48:35.722271 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 19:48:35.722330 kernel: pci 0000:00:02.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:48:35.722392 kernel: pci 0000:00:02.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:48:35.722452 kernel: pci 0000:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 19:48:35.722512 kernel: pci 0000:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:48:35.722574 kernel: pci 0000:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:48:35.722634 kernel: pci 0000:00:04.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 19:48:35.722693 kernel: pci 0000:00:04.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:48:35.722752 kernel: pci 0000:00:04.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:48:35.722812 kernel: pci 0000:00:01.0: BAR 14: assigned [mem 0x70000000-0x701fffff] Apr 12 19:48:35.722872 kernel: pci 0000:00:01.0: BAR 15: assigned [mem 0x3c0000000000-0x3c00001fffff 64bit pref] Apr 12 19:48:35.722931 kernel: pci 0000:00:02.0: BAR 14: assigned [mem 0x70200000-0x703fffff] Apr 12 19:48:35.722992 kernel: pci 0000:00:02.0: BAR 15: assigned [mem 0x3c0000200000-0x3c00003fffff 64bit pref] Apr 12 19:48:35.723069 kernel: pci 0000:00:03.0: BAR 14: assigned [mem 0x70400000-0x705fffff] Apr 12 19:48:35.723131 kernel: pci 0000:00:03.0: BAR 15: assigned [mem 0x3c0000400000-0x3c00005fffff 64bit pref] Apr 12 19:48:35.723190 kernel: pci 0000:00:04.0: BAR 14: assigned [mem 0x70600000-0x707fffff] Apr 12 19:48:35.723248 kernel: pci 0000:00:04.0: BAR 15: assigned [mem 0x3c0000600000-0x3c00007fffff 64bit pref] Apr 12 19:48:35.723306 kernel: pci 0000:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.723363 kernel: pci 0000:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.723423 kernel: pci 0000:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.723485 kernel: pci 0000:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.723545 kernel: pci 0000:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.723604 kernel: pci 0000:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.723663 kernel: pci 0000:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.723723 kernel: pci 0000:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.723782 kernel: pci 0000:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.723841 kernel: pci 0000:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.723900 kernel: pci 0000:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.723961 kernel: pci 0000:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.724020 kernel: pci 0000:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.724083 kernel: pci 0000:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.724143 kernel: pci 0000:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.724202 kernel: pci 0000:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.724261 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 19:48:35.724319 kernel: pci 0000:00:01.0: bridge window [mem 0x70000000-0x701fffff] Apr 12 19:48:35.724382 kernel: pci 0000:00:01.0: bridge window [mem 0x3c0000000000-0x3c00001fffff 64bit pref] Apr 12 19:48:35.724442 kernel: pci 0000:00:02.0: PCI bridge to [bus 02] Apr 12 19:48:35.724501 kernel: pci 0000:00:02.0: bridge window [mem 0x70200000-0x703fffff] Apr 12 19:48:35.724560 kernel: pci 0000:00:02.0: bridge window [mem 0x3c0000200000-0x3c00003fffff 64bit pref] Apr 12 19:48:35.724620 kernel: pci 0000:00:03.0: PCI bridge to [bus 03] Apr 12 19:48:35.724681 kernel: pci 0000:00:03.0: bridge window [mem 0x70400000-0x705fffff] Apr 12 19:48:35.724740 kernel: pci 0000:00:03.0: bridge window [mem 0x3c0000400000-0x3c00005fffff 64bit pref] Apr 12 19:48:35.724800 kernel: pci 0000:00:04.0: PCI bridge to [bus 04] Apr 12 19:48:35.724859 kernel: pci 0000:00:04.0: bridge window [mem 0x70600000-0x707fffff] Apr 12 19:48:35.724921 kernel: pci 0000:00:04.0: bridge window [mem 0x3c0000600000-0x3c00007fffff 64bit pref] Apr 12 19:48:35.724974 kernel: pci_bus 0000:00: resource 4 [mem 0x70000000-0x7fffffff window] Apr 12 19:48:35.725029 kernel: pci_bus 0000:00: resource 5 [mem 0x3c0000000000-0x3fffdfffffff window] Apr 12 19:48:35.725096 kernel: pci_bus 0000:01: resource 1 [mem 0x70000000-0x701fffff] Apr 12 19:48:35.725154 kernel: pci_bus 0000:01: resource 2 [mem 0x3c0000000000-0x3c00001fffff 64bit pref] Apr 12 19:48:35.725218 kernel: pci_bus 0000:02: resource 1 [mem 0x70200000-0x703fffff] Apr 12 19:48:35.725274 kernel: pci_bus 0000:02: resource 2 [mem 0x3c0000200000-0x3c00003fffff 64bit pref] Apr 12 19:48:35.725345 kernel: pci_bus 0000:03: resource 1 [mem 0x70400000-0x705fffff] Apr 12 19:48:35.725404 kernel: pci_bus 0000:03: resource 2 [mem 0x3c0000400000-0x3c00005fffff 64bit pref] Apr 12 19:48:35.725466 kernel: pci_bus 0000:04: resource 1 [mem 0x70600000-0x707fffff] Apr 12 19:48:35.725522 kernel: pci_bus 0000:04: resource 2 [mem 0x3c0000600000-0x3c00007fffff 64bit pref] Apr 12 19:48:35.725531 kernel: ACPI: PCI Root Bridge [PCI7] (domain 0005 [bus 00-ff]) Apr 12 19:48:35.725597 kernel: acpi PNP0A08:02: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 19:48:35.725656 kernel: acpi PNP0A08:02: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 19:48:35.725715 kernel: acpi PNP0A08:02: _OSC: OS now controls [AER PCIeCapability] Apr 12 19:48:35.725774 kernel: acpi PNP0A08:02: MCFG quirk: ECAM at [mem 0x2ffff0000000-0x2fffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 19:48:35.725831 kernel: acpi PNP0A08:02: ECAM area [mem 0x2ffff0000000-0x2fffffffffff] reserved by PNP0C02:00 Apr 12 19:48:35.725889 kernel: acpi PNP0A08:02: ECAM at [mem 0x2ffff0000000-0x2fffffffffff] for [bus 00-ff] Apr 12 19:48:35.725898 kernel: PCI host bridge to bus 0005:00 Apr 12 19:48:35.725957 kernel: pci_bus 0005:00: root bus resource [mem 0x30000000-0x3fffffff window] Apr 12 19:48:35.726011 kernel: pci_bus 0005:00: root bus resource [mem 0x2c0000000000-0x2fffdfffffff window] Apr 12 19:48:35.726069 kernel: pci_bus 0005:00: root bus resource [bus 00-ff] Apr 12 19:48:35.726138 kernel: pci 0005:00:00.0: [1def:e110] type 00 class 0x060000 Apr 12 19:48:35.726206 kernel: pci 0005:00:01.0: [1def:e111] type 01 class 0x060400 Apr 12 19:48:35.726266 kernel: pci 0005:00:01.0: supports D1 D2 Apr 12 19:48:35.726326 kernel: pci 0005:00:01.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.726392 kernel: pci 0005:00:03.0: [1def:e113] type 01 class 0x060400 Apr 12 19:48:35.726453 kernel: pci 0005:00:03.0: supports D1 D2 Apr 12 19:48:35.726513 kernel: pci 0005:00:03.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.726578 kernel: pci 0005:00:05.0: [1def:e115] type 01 class 0x060400 Apr 12 19:48:35.726638 kernel: pci 0005:00:05.0: supports D1 D2 Apr 12 19:48:35.726697 kernel: pci 0005:00:05.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.726762 kernel: pci 0005:00:07.0: [1def:e117] type 01 class 0x060400 Apr 12 19:48:35.726822 kernel: pci 0005:00:07.0: supports D1 D2 Apr 12 19:48:35.726882 kernel: pci 0005:00:07.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.726892 kernel: acpiphp: Slot [1-2] registered Apr 12 19:48:35.726899 kernel: acpiphp: Slot [2-2] registered Apr 12 19:48:35.726965 kernel: pci 0005:03:00.0: [144d:a808] type 00 class 0x010802 Apr 12 19:48:35.727031 kernel: pci 0005:03:00.0: reg 0x10: [mem 0x30110000-0x30113fff 64bit] Apr 12 19:48:35.727097 kernel: pci 0005:03:00.0: reg 0x30: [mem 0x30100000-0x3010ffff pref] Apr 12 19:48:35.727167 kernel: pci 0005:04:00.0: [144d:a808] type 00 class 0x010802 Apr 12 19:48:35.727232 kernel: pci 0005:04:00.0: reg 0x10: [mem 0x30010000-0x30013fff 64bit] Apr 12 19:48:35.727295 kernel: pci 0005:04:00.0: reg 0x30: [mem 0x30000000-0x3000ffff pref] Apr 12 19:48:35.727350 kernel: pci_bus 0005:00: on NUMA node 0 Apr 12 19:48:35.727409 kernel: pci 0005:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 19:48:35.727470 kernel: pci 0005:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:48:35.727529 kernel: pci 0005:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:48:35.727589 kernel: pci 0005:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 19:48:35.727649 kernel: pci 0005:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:48:35.727709 kernel: pci 0005:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:48:35.727771 kernel: pci 0005:00:05.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 19:48:35.727829 kernel: pci 0005:00:05.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:48:35.727889 kernel: pci 0005:00:05.0: bridge window [mem 0x00100000-0x001fffff] to [bus 03] add_size 100000 add_align 100000 Apr 12 19:48:35.727947 kernel: pci 0005:00:07.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 19:48:35.728009 kernel: pci 0005:00:07.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:48:35.728070 kernel: pci 0005:00:07.0: bridge window [mem 0x00100000-0x001fffff] to [bus 04] add_size 100000 add_align 100000 Apr 12 19:48:35.728134 kernel: pci 0005:00:01.0: BAR 14: assigned [mem 0x30000000-0x301fffff] Apr 12 19:48:35.728194 kernel: pci 0005:00:01.0: BAR 15: assigned [mem 0x2c0000000000-0x2c00001fffff 64bit pref] Apr 12 19:48:35.728252 kernel: pci 0005:00:03.0: BAR 14: assigned [mem 0x30200000-0x303fffff] Apr 12 19:48:35.728311 kernel: pci 0005:00:03.0: BAR 15: assigned [mem 0x2c0000200000-0x2c00003fffff 64bit pref] Apr 12 19:48:35.728372 kernel: pci 0005:00:05.0: BAR 14: assigned [mem 0x30400000-0x305fffff] Apr 12 19:48:35.728431 kernel: pci 0005:00:05.0: BAR 15: assigned [mem 0x2c0000400000-0x2c00005fffff 64bit pref] Apr 12 19:48:35.728490 kernel: pci 0005:00:07.0: BAR 14: assigned [mem 0x30600000-0x307fffff] Apr 12 19:48:35.728552 kernel: pci 0005:00:07.0: BAR 15: assigned [mem 0x2c0000600000-0x2c00007fffff 64bit pref] Apr 12 19:48:35.728611 kernel: pci 0005:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.728670 kernel: pci 0005:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.728729 kernel: pci 0005:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.728787 kernel: pci 0005:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.728846 kernel: pci 0005:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.728904 kernel: pci 0005:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.728964 kernel: pci 0005:00:07.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.729024 kernel: pci 0005:00:07.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.729086 kernel: pci 0005:00:07.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.729145 kernel: pci 0005:00:07.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.729203 kernel: pci 0005:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.729262 kernel: pci 0005:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.729320 kernel: pci 0005:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.729379 kernel: pci 0005:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.729437 kernel: pci 0005:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.729496 kernel: pci 0005:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.729556 kernel: pci 0005:00:01.0: PCI bridge to [bus 01] Apr 12 19:48:35.729616 kernel: pci 0005:00:01.0: bridge window [mem 0x30000000-0x301fffff] Apr 12 19:48:35.729675 kernel: pci 0005:00:01.0: bridge window [mem 0x2c0000000000-0x2c00001fffff 64bit pref] Apr 12 19:48:35.729734 kernel: pci 0005:00:03.0: PCI bridge to [bus 02] Apr 12 19:48:35.729793 kernel: pci 0005:00:03.0: bridge window [mem 0x30200000-0x303fffff] Apr 12 19:48:35.729851 kernel: pci 0005:00:03.0: bridge window [mem 0x2c0000200000-0x2c00003fffff 64bit pref] Apr 12 19:48:35.729914 kernel: pci 0005:03:00.0: BAR 6: assigned [mem 0x30400000-0x3040ffff pref] Apr 12 19:48:35.729978 kernel: pci 0005:03:00.0: BAR 0: assigned [mem 0x30410000-0x30413fff 64bit] Apr 12 19:48:35.730039 kernel: pci 0005:00:05.0: PCI bridge to [bus 03] Apr 12 19:48:35.730101 kernel: pci 0005:00:05.0: bridge window [mem 0x30400000-0x305fffff] Apr 12 19:48:35.730161 kernel: pci 0005:00:05.0: bridge window [mem 0x2c0000400000-0x2c00005fffff 64bit pref] Apr 12 19:48:35.730223 kernel: pci 0005:04:00.0: BAR 6: assigned [mem 0x30600000-0x3060ffff pref] Apr 12 19:48:35.730284 kernel: pci 0005:04:00.0: BAR 0: assigned [mem 0x30610000-0x30613fff 64bit] Apr 12 19:48:35.730344 kernel: pci 0005:00:07.0: PCI bridge to [bus 04] Apr 12 19:48:35.730405 kernel: pci 0005:00:07.0: bridge window [mem 0x30600000-0x307fffff] Apr 12 19:48:35.730465 kernel: pci 0005:00:07.0: bridge window [mem 0x2c0000600000-0x2c00007fffff 64bit pref] Apr 12 19:48:35.730519 kernel: pci_bus 0005:00: resource 4 [mem 0x30000000-0x3fffffff window] Apr 12 19:48:35.730572 kernel: pci_bus 0005:00: resource 5 [mem 0x2c0000000000-0x2fffdfffffff window] Apr 12 19:48:35.730636 kernel: pci_bus 0005:01: resource 1 [mem 0x30000000-0x301fffff] Apr 12 19:48:35.730692 kernel: pci_bus 0005:01: resource 2 [mem 0x2c0000000000-0x2c00001fffff 64bit pref] Apr 12 19:48:35.730764 kernel: pci_bus 0005:02: resource 1 [mem 0x30200000-0x303fffff] Apr 12 19:48:35.730820 kernel: pci_bus 0005:02: resource 2 [mem 0x2c0000200000-0x2c00003fffff 64bit pref] Apr 12 19:48:35.730883 kernel: pci_bus 0005:03: resource 1 [mem 0x30400000-0x305fffff] Apr 12 19:48:35.730939 kernel: pci_bus 0005:03: resource 2 [mem 0x2c0000400000-0x2c00005fffff 64bit pref] Apr 12 19:48:35.731002 kernel: pci_bus 0005:04: resource 1 [mem 0x30600000-0x307fffff] Apr 12 19:48:35.731063 kernel: pci_bus 0005:04: resource 2 [mem 0x2c0000600000-0x2c00007fffff 64bit pref] Apr 12 19:48:35.731072 kernel: ACPI: PCI Root Bridge [PCI5] (domain 0003 [bus 00-ff]) Apr 12 19:48:35.731137 kernel: acpi PNP0A08:03: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 19:48:35.731195 kernel: acpi PNP0A08:03: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 19:48:35.731255 kernel: acpi PNP0A08:03: _OSC: OS now controls [AER PCIeCapability] Apr 12 19:48:35.731312 kernel: acpi PNP0A08:03: MCFG quirk: ECAM at [mem 0x27fff0000000-0x27ffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 19:48:35.731368 kernel: acpi PNP0A08:03: ECAM area [mem 0x27fff0000000-0x27ffffffffff] reserved by PNP0C02:00 Apr 12 19:48:35.731427 kernel: acpi PNP0A08:03: ECAM at [mem 0x27fff0000000-0x27ffffffffff] for [bus 00-ff] Apr 12 19:48:35.731436 kernel: PCI host bridge to bus 0003:00 Apr 12 19:48:35.731495 kernel: pci_bus 0003:00: root bus resource [mem 0x10000000-0x1fffffff window] Apr 12 19:48:35.731549 kernel: pci_bus 0003:00: root bus resource [mem 0x240000000000-0x27ffdfffffff window] Apr 12 19:48:35.731601 kernel: pci_bus 0003:00: root bus resource [bus 00-ff] Apr 12 19:48:35.731667 kernel: pci 0003:00:00.0: [1def:e110] type 00 class 0x060000 Apr 12 19:48:35.731734 kernel: pci 0003:00:01.0: [1def:e111] type 01 class 0x060400 Apr 12 19:48:35.731795 kernel: pci 0003:00:01.0: supports D1 D2 Apr 12 19:48:35.731855 kernel: pci 0003:00:01.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.731920 kernel: pci 0003:00:03.0: [1def:e113] type 01 class 0x060400 Apr 12 19:48:35.731979 kernel: pci 0003:00:03.0: supports D1 D2 Apr 12 19:48:35.732038 kernel: pci 0003:00:03.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.732108 kernel: pci 0003:00:05.0: [1def:e115] type 01 class 0x060400 Apr 12 19:48:35.732169 kernel: pci 0003:00:05.0: supports D1 D2 Apr 12 19:48:35.732229 kernel: pci 0003:00:05.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.732238 kernel: acpiphp: Slot [1-3] registered Apr 12 19:48:35.732245 kernel: acpiphp: Slot [2-3] registered Apr 12 19:48:35.732312 kernel: pci 0003:03:00.0: [8086:1521] type 00 class 0x020000 Apr 12 19:48:35.732373 kernel: pci 0003:03:00.0: reg 0x10: [mem 0x10020000-0x1003ffff] Apr 12 19:48:35.732435 kernel: pci 0003:03:00.0: reg 0x18: [io 0x0020-0x003f] Apr 12 19:48:35.732496 kernel: pci 0003:03:00.0: reg 0x1c: [mem 0x10044000-0x10047fff] Apr 12 19:48:35.732563 kernel: pci 0003:03:00.0: PME# supported from D0 D3hot D3cold Apr 12 19:48:35.732626 kernel: pci 0003:03:00.0: reg 0x184: [mem 0x240000060000-0x240000063fff 64bit pref] Apr 12 19:48:35.732688 kernel: pci 0003:03:00.0: VF(n) BAR0 space: [mem 0x240000060000-0x24000007ffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 19:48:35.732752 kernel: pci 0003:03:00.0: reg 0x190: [mem 0x240000040000-0x240000043fff 64bit pref] Apr 12 19:48:35.732818 kernel: pci 0003:03:00.0: VF(n) BAR3 space: [mem 0x240000040000-0x24000005ffff 64bit pref] (contains BAR3 for 8 VFs) Apr 12 19:48:35.732882 kernel: pci 0003:03:00.0: 8.000 Gb/s available PCIe bandwidth, limited by 5.0 GT/s PCIe x2 link at 0003:00:05.0 (capable of 16.000 Gb/s with 5.0 GT/s PCIe x4 link) Apr 12 19:48:35.732954 kernel: pci 0003:03:00.1: [8086:1521] type 00 class 0x020000 Apr 12 19:48:35.733018 kernel: pci 0003:03:00.1: reg 0x10: [mem 0x10000000-0x1001ffff] Apr 12 19:48:35.733083 kernel: pci 0003:03:00.1: reg 0x18: [io 0x0000-0x001f] Apr 12 19:48:35.733144 kernel: pci 0003:03:00.1: reg 0x1c: [mem 0x10040000-0x10043fff] Apr 12 19:48:35.733206 kernel: pci 0003:03:00.1: PME# supported from D0 D3hot D3cold Apr 12 19:48:35.733266 kernel: pci 0003:03:00.1: reg 0x184: [mem 0x240000020000-0x240000023fff 64bit pref] Apr 12 19:48:35.733328 kernel: pci 0003:03:00.1: VF(n) BAR0 space: [mem 0x240000020000-0x24000003ffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 19:48:35.733390 kernel: pci 0003:03:00.1: reg 0x190: [mem 0x240000000000-0x240000003fff 64bit pref] Apr 12 19:48:35.733453 kernel: pci 0003:03:00.1: VF(n) BAR3 space: [mem 0x240000000000-0x24000001ffff 64bit pref] (contains BAR3 for 8 VFs) Apr 12 19:48:35.733509 kernel: pci_bus 0003:00: on NUMA node 0 Apr 12 19:48:35.733568 kernel: pci 0003:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 19:48:35.733629 kernel: pci 0003:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:48:35.733688 kernel: pci 0003:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:48:35.733749 kernel: pci 0003:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 19:48:35.733807 kernel: pci 0003:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:48:35.733865 kernel: pci 0003:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:48:35.733929 kernel: pci 0003:00:05.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03-04] add_size 300000 add_align 100000 Apr 12 19:48:35.733988 kernel: pci 0003:00:05.0: bridge window [mem 0x00100000-0x001fffff] to [bus 03-04] add_size 100000 add_align 100000 Apr 12 19:48:35.734126 kernel: pci 0003:00:01.0: BAR 14: assigned [mem 0x10000000-0x101fffff] Apr 12 19:48:35.734190 kernel: pci 0003:00:01.0: BAR 15: assigned [mem 0x240000000000-0x2400001fffff 64bit pref] Apr 12 19:48:35.734249 kernel: pci 0003:00:03.0: BAR 14: assigned [mem 0x10200000-0x103fffff] Apr 12 19:48:35.734307 kernel: pci 0003:00:03.0: BAR 15: assigned [mem 0x240000200000-0x2400003fffff 64bit pref] Apr 12 19:48:35.734364 kernel: pci 0003:00:05.0: BAR 14: assigned [mem 0x10400000-0x105fffff] Apr 12 19:48:35.734425 kernel: pci 0003:00:05.0: BAR 15: assigned [mem 0x240000400000-0x2400006fffff 64bit pref] Apr 12 19:48:35.734482 kernel: pci 0003:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.734540 kernel: pci 0003:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.734597 kernel: pci 0003:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.734655 kernel: pci 0003:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.734712 kernel: pci 0003:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.734780 kernel: pci 0003:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.734839 kernel: pci 0003:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.734899 kernel: pci 0003:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.734957 kernel: pci 0003:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.735016 kernel: pci 0003:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.735077 kernel: pci 0003:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.735134 kernel: pci 0003:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.735193 kernel: pci 0003:00:01.0: PCI bridge to [bus 01] Apr 12 19:48:35.735250 kernel: pci 0003:00:01.0: bridge window [mem 0x10000000-0x101fffff] Apr 12 19:48:35.735309 kernel: pci 0003:00:01.0: bridge window [mem 0x240000000000-0x2400001fffff 64bit pref] Apr 12 19:48:35.735368 kernel: pci 0003:00:03.0: PCI bridge to [bus 02] Apr 12 19:48:35.735426 kernel: pci 0003:00:03.0: bridge window [mem 0x10200000-0x103fffff] Apr 12 19:48:35.735484 kernel: pci 0003:00:03.0: bridge window [mem 0x240000200000-0x2400003fffff 64bit pref] Apr 12 19:48:35.735545 kernel: pci 0003:03:00.0: BAR 0: assigned [mem 0x10400000-0x1041ffff] Apr 12 19:48:35.735606 kernel: pci 0003:03:00.1: BAR 0: assigned [mem 0x10420000-0x1043ffff] Apr 12 19:48:35.735666 kernel: pci 0003:03:00.0: BAR 3: assigned [mem 0x10440000-0x10443fff] Apr 12 19:48:35.735727 kernel: pci 0003:03:00.0: BAR 7: assigned [mem 0x240000400000-0x24000041ffff 64bit pref] Apr 12 19:48:35.735789 kernel: pci 0003:03:00.0: BAR 10: assigned [mem 0x240000420000-0x24000043ffff 64bit pref] Apr 12 19:48:35.735849 kernel: pci 0003:03:00.1: BAR 3: assigned [mem 0x10444000-0x10447fff] Apr 12 19:48:35.735909 kernel: pci 0003:03:00.1: BAR 7: assigned [mem 0x240000440000-0x24000045ffff 64bit pref] Apr 12 19:48:35.735972 kernel: pci 0003:03:00.1: BAR 10: assigned [mem 0x240000460000-0x24000047ffff 64bit pref] Apr 12 19:48:35.736033 kernel: pci 0003:03:00.0: BAR 2: no space for [io size 0x0020] Apr 12 19:48:35.736097 kernel: pci 0003:03:00.0: BAR 2: failed to assign [io size 0x0020] Apr 12 19:48:35.736159 kernel: pci 0003:03:00.1: BAR 2: no space for [io size 0x0020] Apr 12 19:48:35.736221 kernel: pci 0003:03:00.1: BAR 2: failed to assign [io size 0x0020] Apr 12 19:48:35.736281 kernel: pci 0003:03:00.0: BAR 2: no space for [io size 0x0020] Apr 12 19:48:35.736342 kernel: pci 0003:03:00.0: BAR 2: failed to assign [io size 0x0020] Apr 12 19:48:35.736401 kernel: pci 0003:03:00.1: BAR 2: no space for [io size 0x0020] Apr 12 19:48:35.736463 kernel: pci 0003:03:00.1: BAR 2: failed to assign [io size 0x0020] Apr 12 19:48:35.736521 kernel: pci 0003:00:05.0: PCI bridge to [bus 03-04] Apr 12 19:48:35.736579 kernel: pci 0003:00:05.0: bridge window [mem 0x10400000-0x105fffff] Apr 12 19:48:35.736639 kernel: pci 0003:00:05.0: bridge window [mem 0x240000400000-0x2400006fffff 64bit pref] Apr 12 19:48:35.736694 kernel: pci_bus 0003:00: Some PCI device resources are unassigned, try booting with pci=realloc Apr 12 19:48:35.736747 kernel: pci_bus 0003:00: resource 4 [mem 0x10000000-0x1fffffff window] Apr 12 19:48:35.736799 kernel: pci_bus 0003:00: resource 5 [mem 0x240000000000-0x27ffdfffffff window] Apr 12 19:48:35.736871 kernel: pci_bus 0003:01: resource 1 [mem 0x10000000-0x101fffff] Apr 12 19:48:35.736928 kernel: pci_bus 0003:01: resource 2 [mem 0x240000000000-0x2400001fffff 64bit pref] Apr 12 19:48:35.736990 kernel: pci_bus 0003:02: resource 1 [mem 0x10200000-0x103fffff] Apr 12 19:48:35.737048 kernel: pci_bus 0003:02: resource 2 [mem 0x240000200000-0x2400003fffff 64bit pref] Apr 12 19:48:35.737110 kernel: pci_bus 0003:03: resource 1 [mem 0x10400000-0x105fffff] Apr 12 19:48:35.737166 kernel: pci_bus 0003:03: resource 2 [mem 0x240000400000-0x2400006fffff 64bit pref] Apr 12 19:48:35.737175 kernel: ACPI: PCI Root Bridge [PCI0] (domain 000c [bus 00-ff]) Apr 12 19:48:35.737238 kernel: acpi PNP0A08:04: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 19:48:35.737298 kernel: acpi PNP0A08:04: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 19:48:35.737356 kernel: acpi PNP0A08:04: _OSC: OS now controls [AER PCIeCapability] Apr 12 19:48:35.737418 kernel: acpi PNP0A08:04: MCFG quirk: ECAM at [mem 0x33fff0000000-0x33ffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 19:48:35.737478 kernel: acpi PNP0A08:04: ECAM area [mem 0x33fff0000000-0x33ffffffffff] reserved by PNP0C02:00 Apr 12 19:48:35.737540 kernel: acpi PNP0A08:04: ECAM at [mem 0x33fff0000000-0x33ffffffffff] for [bus 00-ff] Apr 12 19:48:35.737550 kernel: PCI host bridge to bus 000c:00 Apr 12 19:48:35.737613 kernel: pci_bus 000c:00: root bus resource [mem 0x40000000-0x4fffffff window] Apr 12 19:48:35.737670 kernel: pci_bus 000c:00: root bus resource [mem 0x300000000000-0x33ffdfffffff window] Apr 12 19:48:35.737724 kernel: pci_bus 000c:00: root bus resource [bus 00-ff] Apr 12 19:48:35.737790 kernel: pci 000c:00:00.0: [1def:e100] type 00 class 0x060000 Apr 12 19:48:35.737857 kernel: pci 000c:00:01.0: [1def:e101] type 01 class 0x060400 Apr 12 19:48:35.737916 kernel: pci 000c:00:01.0: enabling Extended Tags Apr 12 19:48:35.737975 kernel: pci 000c:00:01.0: supports D1 D2 Apr 12 19:48:35.738033 kernel: pci 000c:00:01.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.738108 kernel: pci 000c:00:02.0: [1def:e102] type 01 class 0x060400 Apr 12 19:48:35.738169 kernel: pci 000c:00:02.0: supports D1 D2 Apr 12 19:48:35.738227 kernel: pci 000c:00:02.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.738292 kernel: pci 000c:00:03.0: [1def:e103] type 01 class 0x060400 Apr 12 19:48:35.738351 kernel: pci 000c:00:03.0: supports D1 D2 Apr 12 19:48:35.738410 kernel: pci 000c:00:03.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.738475 kernel: pci 000c:00:04.0: [1def:e104] type 01 class 0x060400 Apr 12 19:48:35.738544 kernel: pci 000c:00:04.0: supports D1 D2 Apr 12 19:48:35.738628 kernel: pci 000c:00:04.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.738639 kernel: acpiphp: Slot [1-4] registered Apr 12 19:48:35.738646 kernel: acpiphp: Slot [2-4] registered Apr 12 19:48:35.738653 kernel: acpiphp: Slot [3-2] registered Apr 12 19:48:35.738660 kernel: acpiphp: Slot [4-2] registered Apr 12 19:48:35.738712 kernel: pci_bus 000c:00: on NUMA node 0 Apr 12 19:48:35.738773 kernel: pci 000c:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 19:48:35.738832 kernel: pci 000c:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:48:35.738896 kernel: pci 000c:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:48:35.738955 kernel: pci 000c:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 19:48:35.739015 kernel: pci 000c:00:02.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:48:35.739146 kernel: pci 000c:00:02.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:48:35.739209 kernel: pci 000c:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 19:48:35.739267 kernel: pci 000c:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:48:35.739328 kernel: pci 000c:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:48:35.739387 kernel: pci 000c:00:04.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 19:48:35.739444 kernel: pci 000c:00:04.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:48:35.739502 kernel: pci 000c:00:04.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:48:35.739560 kernel: pci 000c:00:01.0: BAR 14: assigned [mem 0x40000000-0x401fffff] Apr 12 19:48:35.739618 kernel: pci 000c:00:01.0: BAR 15: assigned [mem 0x300000000000-0x3000001fffff 64bit pref] Apr 12 19:48:35.739676 kernel: pci 000c:00:02.0: BAR 14: assigned [mem 0x40200000-0x403fffff] Apr 12 19:48:35.739736 kernel: pci 000c:00:02.0: BAR 15: assigned [mem 0x300000200000-0x3000003fffff 64bit pref] Apr 12 19:48:35.739794 kernel: pci 000c:00:03.0: BAR 14: assigned [mem 0x40400000-0x405fffff] Apr 12 19:48:35.739852 kernel: pci 000c:00:03.0: BAR 15: assigned [mem 0x300000400000-0x3000005fffff 64bit pref] Apr 12 19:48:35.739909 kernel: pci 000c:00:04.0: BAR 14: assigned [mem 0x40600000-0x407fffff] Apr 12 19:48:35.739967 kernel: pci 000c:00:04.0: BAR 15: assigned [mem 0x300000600000-0x3000007fffff 64bit pref] Apr 12 19:48:35.740025 kernel: pci 000c:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.740086 kernel: pci 000c:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.740145 kernel: pci 000c:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.740205 kernel: pci 000c:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.740263 kernel: pci 000c:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.740321 kernel: pci 000c:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.740379 kernel: pci 000c:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.740439 kernel: pci 000c:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.740497 kernel: pci 000c:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.740555 kernel: pci 000c:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.740615 kernel: pci 000c:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.740673 kernel: pci 000c:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.740732 kernel: pci 000c:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.740791 kernel: pci 000c:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.740848 kernel: pci 000c:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.740907 kernel: pci 000c:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.740964 kernel: pci 000c:00:01.0: PCI bridge to [bus 01] Apr 12 19:48:35.741023 kernel: pci 000c:00:01.0: bridge window [mem 0x40000000-0x401fffff] Apr 12 19:48:35.741084 kernel: pci 000c:00:01.0: bridge window [mem 0x300000000000-0x3000001fffff 64bit pref] Apr 12 19:48:35.741143 kernel: pci 000c:00:02.0: PCI bridge to [bus 02] Apr 12 19:48:35.741203 kernel: pci 000c:00:02.0: bridge window [mem 0x40200000-0x403fffff] Apr 12 19:48:35.741262 kernel: pci 000c:00:02.0: bridge window [mem 0x300000200000-0x3000003fffff 64bit pref] Apr 12 19:48:35.741322 kernel: pci 000c:00:03.0: PCI bridge to [bus 03] Apr 12 19:48:35.741379 kernel: pci 000c:00:03.0: bridge window [mem 0x40400000-0x405fffff] Apr 12 19:48:35.741438 kernel: pci 000c:00:03.0: bridge window [mem 0x300000400000-0x3000005fffff 64bit pref] Apr 12 19:48:35.741496 kernel: pci 000c:00:04.0: PCI bridge to [bus 04] Apr 12 19:48:35.741556 kernel: pci 000c:00:04.0: bridge window [mem 0x40600000-0x407fffff] Apr 12 19:48:35.741615 kernel: pci 000c:00:04.0: bridge window [mem 0x300000600000-0x3000007fffff 64bit pref] Apr 12 19:48:35.741669 kernel: pci_bus 000c:00: resource 4 [mem 0x40000000-0x4fffffff window] Apr 12 19:48:35.741721 kernel: pci_bus 000c:00: resource 5 [mem 0x300000000000-0x33ffdfffffff window] Apr 12 19:48:35.741784 kernel: pci_bus 000c:01: resource 1 [mem 0x40000000-0x401fffff] Apr 12 19:48:35.741841 kernel: pci_bus 000c:01: resource 2 [mem 0x300000000000-0x3000001fffff 64bit pref] Apr 12 19:48:35.741905 kernel: pci_bus 000c:02: resource 1 [mem 0x40200000-0x403fffff] Apr 12 19:48:35.741960 kernel: pci_bus 000c:02: resource 2 [mem 0x300000200000-0x3000003fffff 64bit pref] Apr 12 19:48:35.742030 kernel: pci_bus 000c:03: resource 1 [mem 0x40400000-0x405fffff] Apr 12 19:48:35.742088 kernel: pci_bus 000c:03: resource 2 [mem 0x300000400000-0x3000005fffff 64bit pref] Apr 12 19:48:35.742153 kernel: pci_bus 000c:04: resource 1 [mem 0x40600000-0x407fffff] Apr 12 19:48:35.742208 kernel: pci_bus 000c:04: resource 2 [mem 0x300000600000-0x3000007fffff 64bit pref] Apr 12 19:48:35.742218 kernel: ACPI: PCI Root Bridge [PCI4] (domain 0002 [bus 00-ff]) Apr 12 19:48:35.742283 kernel: acpi PNP0A08:05: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 19:48:35.742340 kernel: acpi PNP0A08:05: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 19:48:35.742397 kernel: acpi PNP0A08:05: _OSC: OS now controls [AER PCIeCapability] Apr 12 19:48:35.742453 kernel: acpi PNP0A08:05: MCFG quirk: ECAM at [mem 0x23fff0000000-0x23ffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 19:48:35.742510 kernel: acpi PNP0A08:05: ECAM area [mem 0x23fff0000000-0x23ffffffffff] reserved by PNP0C02:00 Apr 12 19:48:35.742566 kernel: acpi PNP0A08:05: ECAM at [mem 0x23fff0000000-0x23ffffffffff] for [bus 00-ff] Apr 12 19:48:35.742576 kernel: PCI host bridge to bus 0002:00 Apr 12 19:48:35.742634 kernel: pci_bus 0002:00: root bus resource [mem 0x00800000-0x0fffffff window] Apr 12 19:48:35.742688 kernel: pci_bus 0002:00: root bus resource [mem 0x200000000000-0x23ffdfffffff window] Apr 12 19:48:35.742739 kernel: pci_bus 0002:00: root bus resource [bus 00-ff] Apr 12 19:48:35.742805 kernel: pci 0002:00:00.0: [1def:e110] type 00 class 0x060000 Apr 12 19:48:35.742872 kernel: pci 0002:00:01.0: [1def:e111] type 01 class 0x060400 Apr 12 19:48:35.742932 kernel: pci 0002:00:01.0: supports D1 D2 Apr 12 19:48:35.742992 kernel: pci 0002:00:01.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.743059 kernel: pci 0002:00:03.0: [1def:e113] type 01 class 0x060400 Apr 12 19:48:35.743120 kernel: pci 0002:00:03.0: supports D1 D2 Apr 12 19:48:35.743180 kernel: pci 0002:00:03.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.743246 kernel: pci 0002:00:05.0: [1def:e115] type 01 class 0x060400 Apr 12 19:48:35.743306 kernel: pci 0002:00:05.0: supports D1 D2 Apr 12 19:48:35.743365 kernel: pci 0002:00:05.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.743433 kernel: pci 0002:00:07.0: [1def:e117] type 01 class 0x060400 Apr 12 19:48:35.743494 kernel: pci 0002:00:07.0: supports D1 D2 Apr 12 19:48:35.743553 kernel: pci 0002:00:07.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.743562 kernel: acpiphp: Slot [1-5] registered Apr 12 19:48:35.743569 kernel: acpiphp: Slot [2-5] registered Apr 12 19:48:35.743576 kernel: acpiphp: Slot [3-3] registered Apr 12 19:48:35.743584 kernel: acpiphp: Slot [4-3] registered Apr 12 19:48:35.743635 kernel: pci_bus 0002:00: on NUMA node 0 Apr 12 19:48:35.743696 kernel: pci 0002:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 19:48:35.743755 kernel: pci 0002:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:48:35.743815 kernel: pci 0002:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000 Apr 12 19:48:35.743877 kernel: pci 0002:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 19:48:35.743938 kernel: pci 0002:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:48:35.743997 kernel: pci 0002:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:48:35.744060 kernel: pci 0002:00:05.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 19:48:35.744123 kernel: pci 0002:00:05.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:48:35.744182 kernel: pci 0002:00:05.0: bridge window [mem 0x00100000-0x000fffff] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:48:35.744244 kernel: pci 0002:00:07.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 19:48:35.744303 kernel: pci 0002:00:07.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:48:35.744364 kernel: pci 0002:00:07.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:48:35.744423 kernel: pci 0002:00:01.0: BAR 14: assigned [mem 0x00800000-0x009fffff] Apr 12 19:48:35.744484 kernel: pci 0002:00:01.0: BAR 15: assigned [mem 0x200000000000-0x2000001fffff 64bit pref] Apr 12 19:48:35.744543 kernel: pci 0002:00:03.0: BAR 14: assigned [mem 0x00a00000-0x00bfffff] Apr 12 19:48:35.744604 kernel: pci 0002:00:03.0: BAR 15: assigned [mem 0x200000200000-0x2000003fffff 64bit pref] Apr 12 19:48:35.744663 kernel: pci 0002:00:05.0: BAR 14: assigned [mem 0x00c00000-0x00dfffff] Apr 12 19:48:35.744723 kernel: pci 0002:00:05.0: BAR 15: assigned [mem 0x200000400000-0x2000005fffff 64bit pref] Apr 12 19:48:35.744782 kernel: pci 0002:00:07.0: BAR 14: assigned [mem 0x00e00000-0x00ffffff] Apr 12 19:48:35.744843 kernel: pci 0002:00:07.0: BAR 15: assigned [mem 0x200000600000-0x2000007fffff 64bit pref] Apr 12 19:48:35.744903 kernel: pci 0002:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.744963 kernel: pci 0002:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.745021 kernel: pci 0002:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.745084 kernel: pci 0002:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.745144 kernel: pci 0002:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.745204 kernel: pci 0002:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.745263 kernel: pci 0002:00:07.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.745325 kernel: pci 0002:00:07.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.745383 kernel: pci 0002:00:07.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.745442 kernel: pci 0002:00:07.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.745502 kernel: pci 0002:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.745561 kernel: pci 0002:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.745621 kernel: pci 0002:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.745679 kernel: pci 0002:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.745739 kernel: pci 0002:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.745799 kernel: pci 0002:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.745861 kernel: pci 0002:00:01.0: PCI bridge to [bus 01] Apr 12 19:48:35.745920 kernel: pci 0002:00:01.0: bridge window [mem 0x00800000-0x009fffff] Apr 12 19:48:35.745980 kernel: pci 0002:00:01.0: bridge window [mem 0x200000000000-0x2000001fffff 64bit pref] Apr 12 19:48:35.746040 kernel: pci 0002:00:03.0: PCI bridge to [bus 02] Apr 12 19:48:35.746103 kernel: pci 0002:00:03.0: bridge window [mem 0x00a00000-0x00bfffff] Apr 12 19:48:35.746164 kernel: pci 0002:00:03.0: bridge window [mem 0x200000200000-0x2000003fffff 64bit pref] Apr 12 19:48:35.746224 kernel: pci 0002:00:05.0: PCI bridge to [bus 03] Apr 12 19:48:35.746284 kernel: pci 0002:00:05.0: bridge window [mem 0x00c00000-0x00dfffff] Apr 12 19:48:35.746343 kernel: pci 0002:00:05.0: bridge window [mem 0x200000400000-0x2000005fffff 64bit pref] Apr 12 19:48:35.746403 kernel: pci 0002:00:07.0: PCI bridge to [bus 04] Apr 12 19:48:35.746462 kernel: pci 0002:00:07.0: bridge window [mem 0x00e00000-0x00ffffff] Apr 12 19:48:35.746521 kernel: pci 0002:00:07.0: bridge window [mem 0x200000600000-0x2000007fffff 64bit pref] Apr 12 19:48:35.746578 kernel: pci_bus 0002:00: resource 4 [mem 0x00800000-0x0fffffff window] Apr 12 19:48:35.746631 kernel: pci_bus 0002:00: resource 5 [mem 0x200000000000-0x23ffdfffffff window] Apr 12 19:48:35.746697 kernel: pci_bus 0002:01: resource 1 [mem 0x00800000-0x009fffff] Apr 12 19:48:35.746753 kernel: pci_bus 0002:01: resource 2 [mem 0x200000000000-0x2000001fffff 64bit pref] Apr 12 19:48:35.746817 kernel: pci_bus 0002:02: resource 1 [mem 0x00a00000-0x00bfffff] Apr 12 19:48:35.746875 kernel: pci_bus 0002:02: resource 2 [mem 0x200000200000-0x2000003fffff 64bit pref] Apr 12 19:48:35.746944 kernel: pci_bus 0002:03: resource 1 [mem 0x00c00000-0x00dfffff] Apr 12 19:48:35.747002 kernel: pci_bus 0002:03: resource 2 [mem 0x200000400000-0x2000005fffff 64bit pref] Apr 12 19:48:35.747068 kernel: pci_bus 0002:04: resource 1 [mem 0x00e00000-0x00ffffff] Apr 12 19:48:35.747125 kernel: pci_bus 0002:04: resource 2 [mem 0x200000600000-0x2000007fffff 64bit pref] Apr 12 19:48:35.747134 kernel: ACPI: PCI Root Bridge [PCI2] (domain 0001 [bus 00-ff]) Apr 12 19:48:35.747198 kernel: acpi PNP0A08:06: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 19:48:35.747257 kernel: acpi PNP0A08:06: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 19:48:35.747317 kernel: acpi PNP0A08:06: _OSC: OS now controls [AER PCIeCapability] Apr 12 19:48:35.747375 kernel: acpi PNP0A08:06: MCFG quirk: ECAM at [mem 0x3bfff0000000-0x3bffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 19:48:35.747433 kernel: acpi PNP0A08:06: ECAM area [mem 0x3bfff0000000-0x3bffffffffff] reserved by PNP0C02:00 Apr 12 19:48:35.747490 kernel: acpi PNP0A08:06: ECAM at [mem 0x3bfff0000000-0x3bffffffffff] for [bus 00-ff] Apr 12 19:48:35.747500 kernel: PCI host bridge to bus 0001:00 Apr 12 19:48:35.747559 kernel: pci_bus 0001:00: root bus resource [mem 0x60000000-0x6fffffff window] Apr 12 19:48:35.747614 kernel: pci_bus 0001:00: root bus resource [mem 0x380000000000-0x3bffdfffffff window] Apr 12 19:48:35.747668 kernel: pci_bus 0001:00: root bus resource [bus 00-ff] Apr 12 19:48:35.747735 kernel: pci 0001:00:00.0: [1def:e100] type 00 class 0x060000 Apr 12 19:48:35.747805 kernel: pci 0001:00:01.0: [1def:e101] type 01 class 0x060400 Apr 12 19:48:35.747865 kernel: pci 0001:00:01.0: enabling Extended Tags Apr 12 19:48:35.747924 kernel: pci 0001:00:01.0: supports D1 D2 Apr 12 19:48:35.747984 kernel: pci 0001:00:01.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.748210 kernel: pci 0001:00:02.0: [1def:e102] type 01 class 0x060400 Apr 12 19:48:35.748279 kernel: pci 0001:00:02.0: supports D1 D2 Apr 12 19:48:35.748338 kernel: pci 0001:00:02.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.748404 kernel: pci 0001:00:03.0: [1def:e103] type 01 class 0x060400 Apr 12 19:48:35.748462 kernel: pci 0001:00:03.0: supports D1 D2 Apr 12 19:48:35.748520 kernel: pci 0001:00:03.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.748585 kernel: pci 0001:00:04.0: [1def:e104] type 01 class 0x060400 Apr 12 19:48:35.748646 kernel: pci 0001:00:04.0: supports D1 D2 Apr 12 19:48:35.748705 kernel: pci 0001:00:04.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.748714 kernel: acpiphp: Slot [1-6] registered Apr 12 19:48:35.748780 kernel: pci 0001:01:00.0: [15b3:1015] type 00 class 0x020000 Apr 12 19:48:35.748842 kernel: pci 0001:01:00.0: reg 0x10: [mem 0x380002000000-0x380003ffffff 64bit pref] Apr 12 19:48:35.748903 kernel: pci 0001:01:00.0: reg 0x30: [mem 0x60100000-0x601fffff pref] Apr 12 19:48:35.748963 kernel: pci 0001:01:00.0: PME# supported from D3cold Apr 12 19:48:35.749026 kernel: pci 0001:01:00.0: 31.504 Gb/s available PCIe bandwidth, limited by 8.0 GT/s PCIe x4 link at 0001:00:01.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Apr 12 19:48:35.749098 kernel: pci 0001:01:00.1: [15b3:1015] type 00 class 0x020000 Apr 12 19:48:35.749162 kernel: pci 0001:01:00.1: reg 0x10: [mem 0x380000000000-0x380001ffffff 64bit pref] Apr 12 19:48:35.749222 kernel: pci 0001:01:00.1: reg 0x30: [mem 0x60000000-0x600fffff pref] Apr 12 19:48:35.749283 kernel: pci 0001:01:00.1: PME# supported from D3cold Apr 12 19:48:35.749292 kernel: acpiphp: Slot [2-6] registered Apr 12 19:48:35.749299 kernel: acpiphp: Slot [3-4] registered Apr 12 19:48:35.749307 kernel: acpiphp: Slot [4-4] registered Apr 12 19:48:35.749360 kernel: pci_bus 0001:00: on NUMA node 0 Apr 12 19:48:35.749420 kernel: pci 0001:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000 Apr 12 19:48:35.749481 kernel: pci 0001:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 02] add_size 1000 Apr 12 19:48:35.749540 kernel: pci 0001:00:02.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:48:35.749598 kernel: pci 0001:00:02.0: bridge window [mem 0x00100000-0x000fffff] to [bus 02] add_size 200000 add_align 100000 Apr 12 19:48:35.749657 kernel: pci 0001:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 19:48:35.749715 kernel: pci 0001:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:48:35.749775 kernel: pci 0001:00:03.0: bridge window [mem 0x00100000-0x000fffff] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:48:35.749835 kernel: pci 0001:00:04.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 19:48:35.749893 kernel: pci 0001:00:04.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:48:35.749951 kernel: pci 0001:00:04.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:48:35.750010 kernel: pci 0001:00:01.0: BAR 15: assigned [mem 0x380000000000-0x380003ffffff 64bit pref] Apr 12 19:48:35.750071 kernel: pci 0001:00:01.0: BAR 14: assigned [mem 0x60000000-0x601fffff] Apr 12 19:48:35.750130 kernel: pci 0001:00:02.0: BAR 14: assigned [mem 0x60200000-0x603fffff] Apr 12 19:48:35.750190 kernel: pci 0001:00:02.0: BAR 15: assigned [mem 0x380004000000-0x3800041fffff 64bit pref] Apr 12 19:48:35.750248 kernel: pci 0001:00:03.0: BAR 14: assigned [mem 0x60400000-0x605fffff] Apr 12 19:48:35.750306 kernel: pci 0001:00:03.0: BAR 15: assigned [mem 0x380004200000-0x3800043fffff 64bit pref] Apr 12 19:48:35.750364 kernel: pci 0001:00:04.0: BAR 14: assigned [mem 0x60600000-0x607fffff] Apr 12 19:48:35.750424 kernel: pci 0001:00:04.0: BAR 15: assigned [mem 0x380004400000-0x3800045fffff 64bit pref] Apr 12 19:48:35.750482 kernel: pci 0001:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.750540 kernel: pci 0001:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.750598 kernel: pci 0001:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.750658 kernel: pci 0001:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.750716 kernel: pci 0001:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.750774 kernel: pci 0001:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.750832 kernel: pci 0001:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.750890 kernel: pci 0001:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.750948 kernel: pci 0001:00:04.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.751005 kernel: pci 0001:00:04.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.751066 kernel: pci 0001:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.751125 kernel: pci 0001:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.751183 kernel: pci 0001:00:02.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.751241 kernel: pci 0001:00:02.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.751299 kernel: pci 0001:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.751357 kernel: pci 0001:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.751419 kernel: pci 0001:01:00.0: BAR 0: assigned [mem 0x380000000000-0x380001ffffff 64bit pref] Apr 12 19:48:35.751481 kernel: pci 0001:01:00.1: BAR 0: assigned [mem 0x380002000000-0x380003ffffff 64bit pref] Apr 12 19:48:35.751541 kernel: pci 0001:01:00.0: BAR 6: assigned [mem 0x60000000-0x600fffff pref] Apr 12 19:48:35.751602 kernel: pci 0001:01:00.1: BAR 6: assigned [mem 0x60100000-0x601fffff pref] Apr 12 19:48:35.751662 kernel: pci 0001:00:01.0: PCI bridge to [bus 01] Apr 12 19:48:35.751720 kernel: pci 0001:00:01.0: bridge window [mem 0x60000000-0x601fffff] Apr 12 19:48:35.751778 kernel: pci 0001:00:01.0: bridge window [mem 0x380000000000-0x380003ffffff 64bit pref] Apr 12 19:48:35.751837 kernel: pci 0001:00:02.0: PCI bridge to [bus 02] Apr 12 19:48:35.751895 kernel: pci 0001:00:02.0: bridge window [mem 0x60200000-0x603fffff] Apr 12 19:48:35.751953 kernel: pci 0001:00:02.0: bridge window [mem 0x380004000000-0x3800041fffff 64bit pref] Apr 12 19:48:35.752014 kernel: pci 0001:00:03.0: PCI bridge to [bus 03] Apr 12 19:48:35.752075 kernel: pci 0001:00:03.0: bridge window [mem 0x60400000-0x605fffff] Apr 12 19:48:35.752134 kernel: pci 0001:00:03.0: bridge window [mem 0x380004200000-0x3800043fffff 64bit pref] Apr 12 19:48:35.752192 kernel: pci 0001:00:04.0: PCI bridge to [bus 04] Apr 12 19:48:35.752250 kernel: pci 0001:00:04.0: bridge window [mem 0x60600000-0x607fffff] Apr 12 19:48:35.752309 kernel: pci 0001:00:04.0: bridge window [mem 0x380004400000-0x3800045fffff 64bit pref] Apr 12 19:48:35.752364 kernel: pci_bus 0001:00: resource 4 [mem 0x60000000-0x6fffffff window] Apr 12 19:48:35.752417 kernel: pci_bus 0001:00: resource 5 [mem 0x380000000000-0x3bffdfffffff window] Apr 12 19:48:35.752487 kernel: pci_bus 0001:01: resource 1 [mem 0x60000000-0x601fffff] Apr 12 19:48:35.752544 kernel: pci_bus 0001:01: resource 2 [mem 0x380000000000-0x380003ffffff 64bit pref] Apr 12 19:48:35.752605 kernel: pci_bus 0001:02: resource 1 [mem 0x60200000-0x603fffff] Apr 12 19:48:35.752660 kernel: pci_bus 0001:02: resource 2 [mem 0x380004000000-0x3800041fffff 64bit pref] Apr 12 19:48:35.752725 kernel: pci_bus 0001:03: resource 1 [mem 0x60400000-0x605fffff] Apr 12 19:48:35.752780 kernel: pci_bus 0001:03: resource 2 [mem 0x380004200000-0x3800043fffff 64bit pref] Apr 12 19:48:35.752843 kernel: pci_bus 0001:04: resource 1 [mem 0x60600000-0x607fffff] Apr 12 19:48:35.752899 kernel: pci_bus 0001:04: resource 2 [mem 0x380004400000-0x3800045fffff 64bit pref] Apr 12 19:48:35.752909 kernel: ACPI: PCI Root Bridge [PCI6] (domain 0004 [bus 00-ff]) Apr 12 19:48:35.752974 kernel: acpi PNP0A08:07: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 19:48:35.753032 kernel: acpi PNP0A08:07: _OSC: platform does not support [PCIeHotplug PME LTR] Apr 12 19:48:35.753095 kernel: acpi PNP0A08:07: _OSC: OS now controls [AER PCIeCapability] Apr 12 19:48:35.753152 kernel: acpi PNP0A08:07: MCFG quirk: ECAM at [mem 0x2bfff0000000-0x2bffffffffff] for [bus 00-ff] with pci_32b_read_ops Apr 12 19:48:35.753209 kernel: acpi PNP0A08:07: ECAM area [mem 0x2bfff0000000-0x2bffffffffff] reserved by PNP0C02:00 Apr 12 19:48:35.753265 kernel: acpi PNP0A08:07: ECAM at [mem 0x2bfff0000000-0x2bffffffffff] for [bus 00-ff] Apr 12 19:48:35.753275 kernel: PCI host bridge to bus 0004:00 Apr 12 19:48:35.753334 kernel: pci_bus 0004:00: root bus resource [mem 0x20000000-0x2fffffff window] Apr 12 19:48:35.753388 kernel: pci_bus 0004:00: root bus resource [mem 0x280000000000-0x2bffdfffffff window] Apr 12 19:48:35.753442 kernel: pci_bus 0004:00: root bus resource [bus 00-ff] Apr 12 19:48:35.753507 kernel: pci 0004:00:00.0: [1def:e110] type 00 class 0x060000 Apr 12 19:48:35.753573 kernel: pci 0004:00:01.0: [1def:e111] type 01 class 0x060400 Apr 12 19:48:35.753633 kernel: pci 0004:00:01.0: supports D1 D2 Apr 12 19:48:35.753692 kernel: pci 0004:00:01.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.753757 kernel: pci 0004:00:03.0: [1def:e113] type 01 class 0x060400 Apr 12 19:48:35.753819 kernel: pci 0004:00:03.0: supports D1 D2 Apr 12 19:48:35.753878 kernel: pci 0004:00:03.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.753946 kernel: pci 0004:00:05.0: [1def:e115] type 01 class 0x060400 Apr 12 19:48:35.754005 kernel: pci 0004:00:05.0: supports D1 D2 Apr 12 19:48:35.754068 kernel: pci 0004:00:05.0: PME# supported from D0 D1 D3hot Apr 12 19:48:35.754137 kernel: pci 0004:01:00.0: [1a03:1150] type 01 class 0x060400 Apr 12 19:48:35.754198 kernel: pci 0004:01:00.0: enabling Extended Tags Apr 12 19:48:35.754261 kernel: pci 0004:01:00.0: supports D1 D2 Apr 12 19:48:35.754322 kernel: pci 0004:01:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 19:48:35.754388 kernel: pci_bus 0004:02: extended config space not accessible Apr 12 19:48:35.754465 kernel: pci 0004:02:00.0: [1a03:2000] type 00 class 0x030000 Apr 12 19:48:35.754530 kernel: pci 0004:02:00.0: reg 0x10: [mem 0x20000000-0x21ffffff] Apr 12 19:48:35.754594 kernel: pci 0004:02:00.0: reg 0x14: [mem 0x22000000-0x2201ffff] Apr 12 19:48:35.754659 kernel: pci 0004:02:00.0: reg 0x18: [io 0x0000-0x007f] Apr 12 19:48:35.754724 kernel: pci 0004:02:00.0: BAR 0: assigned to efifb Apr 12 19:48:35.754788 kernel: pci 0004:02:00.0: supports D1 D2 Apr 12 19:48:35.754852 kernel: pci 0004:02:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 19:48:35.754920 kernel: pci 0004:03:00.0: [1912:0014] type 00 class 0x0c0330 Apr 12 19:48:35.754983 kernel: pci 0004:03:00.0: reg 0x10: [mem 0x22200000-0x22201fff 64bit] Apr 12 19:48:35.755049 kernel: pci 0004:03:00.0: PME# supported from D0 D3hot D3cold Apr 12 19:48:35.755103 kernel: pci_bus 0004:00: on NUMA node 0 Apr 12 19:48:35.755165 kernel: pci 0004:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01-02] add_size 200000 add_align 100000 Apr 12 19:48:35.755225 kernel: pci 0004:00:03.0: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Apr 12 19:48:35.755285 kernel: pci 0004:00:03.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Apr 12 19:48:35.755344 kernel: pci 0004:00:03.0: bridge window [mem 0x00100000-0x001fffff] to [bus 03] add_size 100000 add_align 100000 Apr 12 19:48:35.755404 kernel: pci 0004:00:05.0: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Apr 12 19:48:35.755463 kernel: pci 0004:00:05.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:48:35.755522 kernel: pci 0004:00:05.0: bridge window [mem 0x00100000-0x000fffff] to [bus 04] add_size 200000 add_align 100000 Apr 12 19:48:35.755584 kernel: pci 0004:00:01.0: BAR 14: assigned [mem 0x20000000-0x22ffffff] Apr 12 19:48:35.755642 kernel: pci 0004:00:01.0: BAR 15: assigned [mem 0x280000000000-0x2800001fffff 64bit pref] Apr 12 19:48:35.755702 kernel: pci 0004:00:03.0: BAR 14: assigned [mem 0x23000000-0x231fffff] Apr 12 19:48:35.755760 kernel: pci 0004:00:03.0: BAR 15: assigned [mem 0x280000200000-0x2800003fffff 64bit pref] Apr 12 19:48:35.755819 kernel: pci 0004:00:05.0: BAR 14: assigned [mem 0x23200000-0x233fffff] Apr 12 19:48:35.755879 kernel: pci 0004:00:05.0: BAR 15: assigned [mem 0x280000400000-0x2800005fffff 64bit pref] Apr 12 19:48:35.755939 kernel: pci 0004:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.755999 kernel: pci 0004:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.756064 kernel: pci 0004:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.756125 kernel: pci 0004:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.756186 kernel: pci 0004:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.756246 kernel: pci 0004:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.756307 kernel: pci 0004:00:01.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.756366 kernel: pci 0004:00:01.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.756427 kernel: pci 0004:00:05.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.756486 kernel: pci 0004:00:05.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.756548 kernel: pci 0004:00:03.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.756607 kernel: pci 0004:00:03.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.756671 kernel: pci 0004:01:00.0: BAR 14: assigned [mem 0x20000000-0x22ffffff] Apr 12 19:48:35.756733 kernel: pci 0004:01:00.0: BAR 13: no space for [io size 0x1000] Apr 12 19:48:35.756796 kernel: pci 0004:01:00.0: BAR 13: failed to assign [io size 0x1000] Apr 12 19:48:35.756862 kernel: pci 0004:02:00.0: BAR 0: assigned [mem 0x20000000-0x21ffffff] Apr 12 19:48:35.756928 kernel: pci 0004:02:00.0: BAR 1: assigned [mem 0x22000000-0x2201ffff] Apr 12 19:48:35.756993 kernel: pci 0004:02:00.0: BAR 2: no space for [io size 0x0080] Apr 12 19:48:35.757063 kernel: pci 0004:02:00.0: BAR 2: failed to assign [io size 0x0080] Apr 12 19:48:35.757125 kernel: pci 0004:01:00.0: PCI bridge to [bus 02] Apr 12 19:48:35.757188 kernel: pci 0004:01:00.0: bridge window [mem 0x20000000-0x22ffffff] Apr 12 19:48:35.757248 kernel: pci 0004:00:01.0: PCI bridge to [bus 01-02] Apr 12 19:48:35.757306 kernel: pci 0004:00:01.0: bridge window [mem 0x20000000-0x22ffffff] Apr 12 19:48:35.757365 kernel: pci 0004:00:01.0: bridge window [mem 0x280000000000-0x2800001fffff 64bit pref] Apr 12 19:48:35.757429 kernel: pci 0004:03:00.0: BAR 0: assigned [mem 0x23000000-0x23001fff 64bit] Apr 12 19:48:35.757490 kernel: pci 0004:00:03.0: PCI bridge to [bus 03] Apr 12 19:48:35.757551 kernel: pci 0004:00:03.0: bridge window [mem 0x23000000-0x231fffff] Apr 12 19:48:35.757610 kernel: pci 0004:00:03.0: bridge window [mem 0x280000200000-0x2800003fffff 64bit pref] Apr 12 19:48:35.757669 kernel: pci 0004:00:05.0: PCI bridge to [bus 04] Apr 12 19:48:35.757728 kernel: pci 0004:00:05.0: bridge window [mem 0x23200000-0x233fffff] Apr 12 19:48:35.757787 kernel: pci 0004:00:05.0: bridge window [mem 0x280000400000-0x2800005fffff 64bit pref] Apr 12 19:48:35.757840 kernel: pci_bus 0004:00: Some PCI device resources are unassigned, try booting with pci=realloc Apr 12 19:48:35.757895 kernel: pci_bus 0004:00: resource 4 [mem 0x20000000-0x2fffffff window] Apr 12 19:48:35.757950 kernel: pci_bus 0004:00: resource 5 [mem 0x280000000000-0x2bffdfffffff window] Apr 12 19:48:35.758015 kernel: pci_bus 0004:01: resource 1 [mem 0x20000000-0x22ffffff] Apr 12 19:48:35.758074 kernel: pci_bus 0004:01: resource 2 [mem 0x280000000000-0x2800001fffff 64bit pref] Apr 12 19:48:35.758134 kernel: pci_bus 0004:02: resource 1 [mem 0x20000000-0x22ffffff] Apr 12 19:48:35.758197 kernel: pci_bus 0004:03: resource 1 [mem 0x23000000-0x231fffff] Apr 12 19:48:35.758253 kernel: pci_bus 0004:03: resource 2 [mem 0x280000200000-0x2800003fffff 64bit pref] Apr 12 19:48:35.758318 kernel: pci_bus 0004:04: resource 1 [mem 0x23200000-0x233fffff] Apr 12 19:48:35.758374 kernel: pci_bus 0004:04: resource 2 [mem 0x280000400000-0x2800005fffff 64bit pref] Apr 12 19:48:35.758383 kernel: iommu: Default domain type: Translated Apr 12 19:48:35.758390 kernel: iommu: DMA domain TLB invalidation policy: strict mode Apr 12 19:48:35.758456 kernel: pci 0004:02:00.0: vgaarb: VGA device added: decodes=io+mem,owns=none,locks=none Apr 12 19:48:35.758520 kernel: pci 0004:02:00.0: vgaarb: bridge control possible Apr 12 19:48:35.758586 kernel: pci 0004:02:00.0: vgaarb: setting as boot device (VGA legacy resources not available) Apr 12 19:48:35.758597 kernel: vgaarb: loaded Apr 12 19:48:35.758604 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 19:48:35.758612 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it> Apr 12 19:48:35.758619 kernel: PTP clock support registered Apr 12 19:48:35.758626 kernel: Registered efivars operations Apr 12 19:48:35.758633 kernel: clocksource: Switched to clocksource arch_sys_counter Apr 12 19:48:35.758641 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 19:48:35.758648 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 19:48:35.758656 kernel: pnp: PnP ACPI init Apr 12 19:48:35.758720 kernel: system 00:00: [mem 0x3bfff0000000-0x3bffffffffff window] could not be reserved Apr 12 19:48:35.758776 kernel: system 00:00: [mem 0x3ffff0000000-0x3fffffffffff window] could not be reserved Apr 12 19:48:35.758831 kernel: system 00:00: [mem 0x23fff0000000-0x23ffffffffff window] could not be reserved Apr 12 19:48:35.758884 kernel: system 00:00: [mem 0x27fff0000000-0x27ffffffffff window] could not be reserved Apr 12 19:48:35.758940 kernel: system 00:00: [mem 0x2bfff0000000-0x2bffffffffff window] could not be reserved Apr 12 19:48:35.758994 kernel: system 00:00: [mem 0x2ffff0000000-0x2fffffffffff window] could not be reserved Apr 12 19:48:35.759056 kernel: system 00:00: [mem 0x33fff0000000-0x33ffffffffff window] could not be reserved Apr 12 19:48:35.759111 kernel: system 00:00: [mem 0x37fff0000000-0x37ffffffffff window] could not be reserved Apr 12 19:48:35.759120 kernel: pnp: PnP ACPI: found 1 devices Apr 12 19:48:35.759127 kernel: NET: Registered PF_INET protocol family Apr 12 19:48:35.759135 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 19:48:35.759142 kernel: tcp_listen_portaddr_hash hash table entries: 65536 (order: 8, 1048576 bytes, linear) Apr 12 19:48:35.759150 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 19:48:35.759157 kernel: TCP established hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 19:48:35.759164 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Apr 12 19:48:35.759173 kernel: TCP: Hash tables configured (established 524288 bind 65536) Apr 12 19:48:35.759180 kernel: UDP hash table entries: 65536 (order: 9, 2097152 bytes, linear) Apr 12 19:48:35.759188 kernel: UDP-Lite hash table entries: 65536 (order: 9, 2097152 bytes, linear) Apr 12 19:48:35.759195 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 19:48:35.759258 kernel: pci 0001:01:00.0: CLS mismatch (64 != 32), using 64 bytes Apr 12 19:48:35.759268 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Apr 12 19:48:35.759275 kernel: kvm [1]: IPA Size Limit: 48 bits Apr 12 19:48:35.759282 kernel: kvm [1]: GICv3: no GICV resource entry Apr 12 19:48:35.759291 kernel: kvm [1]: disabling GICv2 emulation Apr 12 19:48:35.759299 kernel: kvm [1]: GIC system register CPU interface enabled Apr 12 19:48:35.759306 kernel: kvm [1]: vgic interrupt IRQ9 Apr 12 19:48:35.759313 kernel: kvm [1]: VHE mode initialized successfully Apr 12 19:48:35.759320 kernel: Initialise system trusted keyrings Apr 12 19:48:35.759327 kernel: workingset: timestamp_bits=39 max_order=26 bucket_order=0 Apr 12 19:48:35.759334 kernel: Key type asymmetric registered Apr 12 19:48:35.759341 kernel: Asymmetric key parser 'x509' registered Apr 12 19:48:35.759349 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 19:48:35.759356 kernel: io scheduler mq-deadline registered Apr 12 19:48:35.759364 kernel: io scheduler kyber registered Apr 12 19:48:35.759371 kernel: io scheduler bfq registered Apr 12 19:48:35.759380 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Apr 12 19:48:35.759387 kernel: ACPI: button: Power Button [PWRB] Apr 12 19:48:35.759394 kernel: ACPI GTDT: found 1 SBSA generic Watchdog(s). Apr 12 19:48:35.759401 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 19:48:35.759469 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: option mask 0x0 Apr 12 19:48:35.759527 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 19:48:35.759585 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 19:48:35.759643 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: allocated 262144 entries for cmdq Apr 12 19:48:35.759698 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: allocated 128 entries for evtq Apr 12 19:48:35.759753 kernel: arm-smmu-v3 arm-smmu-v3.0.auto: allocated 256 entries for priq Apr 12 19:48:35.759817 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: option mask 0x0 Apr 12 19:48:35.759873 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 19:48:35.759930 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 19:48:35.759985 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: allocated 262144 entries for cmdq Apr 12 19:48:35.760041 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: allocated 128 entries for evtq Apr 12 19:48:35.760100 kernel: arm-smmu-v3 arm-smmu-v3.1.auto: allocated 256 entries for priq Apr 12 19:48:35.760163 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: option mask 0x0 Apr 12 19:48:35.760220 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 19:48:35.760274 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 19:48:35.760332 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: allocated 262144 entries for cmdq Apr 12 19:48:35.760387 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: allocated 128 entries for evtq Apr 12 19:48:35.760443 kernel: arm-smmu-v3 arm-smmu-v3.2.auto: allocated 256 entries for priq Apr 12 19:48:35.760506 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: option mask 0x0 Apr 12 19:48:35.760561 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 19:48:35.760616 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 19:48:35.760672 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: allocated 262144 entries for cmdq Apr 12 19:48:35.760728 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: allocated 128 entries for evtq Apr 12 19:48:35.760783 kernel: arm-smmu-v3 arm-smmu-v3.3.auto: allocated 256 entries for priq Apr 12 19:48:35.760854 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: option mask 0x0 Apr 12 19:48:35.760910 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 19:48:35.760966 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 19:48:35.761021 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: allocated 262144 entries for cmdq Apr 12 19:48:35.761081 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: allocated 128 entries for evtq Apr 12 19:48:35.761137 kernel: arm-smmu-v3 arm-smmu-v3.4.auto: allocated 256 entries for priq Apr 12 19:48:35.761198 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: option mask 0x0 Apr 12 19:48:35.761255 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 19:48:35.761310 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 19:48:35.761366 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: allocated 262144 entries for cmdq Apr 12 19:48:35.761420 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: allocated 128 entries for evtq Apr 12 19:48:35.761476 kernel: arm-smmu-v3 arm-smmu-v3.5.auto: allocated 256 entries for priq Apr 12 19:48:35.761539 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: option mask 0x0 Apr 12 19:48:35.761594 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 19:48:35.761650 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 19:48:35.761704 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: allocated 262144 entries for cmdq Apr 12 19:48:35.761760 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: allocated 128 entries for evtq Apr 12 19:48:35.761816 kernel: arm-smmu-v3 arm-smmu-v3.6.auto: allocated 256 entries for priq Apr 12 19:48:35.761877 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: option mask 0x0 Apr 12 19:48:35.761933 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: IDR0.COHACC overridden by FW configuration (false) Apr 12 19:48:35.761988 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: ias 48-bit, oas 48-bit (features 0x000c1eff) Apr 12 19:48:35.762046 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: allocated 262144 entries for cmdq Apr 12 19:48:35.762102 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: allocated 128 entries for evtq Apr 12 19:48:35.762159 kernel: arm-smmu-v3 arm-smmu-v3.7.auto: allocated 256 entries for priq Apr 12 19:48:35.762168 kernel: thunder_xcv, ver 1.0 Apr 12 19:48:35.762176 kernel: thunder_bgx, ver 1.0 Apr 12 19:48:35.762184 kernel: nicpf, ver 1.0 Apr 12 19:48:35.762191 kernel: nicvf, ver 1.0 Apr 12 19:48:35.762253 kernel: rtc-efi rtc-efi.0: registered as rtc0 Apr 12 19:48:35.762310 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-04-12T19:48:34 UTC (1712951314) Apr 12 19:48:35.762320 kernel: efifb: probing for efifb Apr 12 19:48:35.762329 kernel: efifb: framebuffer at 0x20000000, using 1876k, total 1875k Apr 12 19:48:35.762336 kernel: efifb: mode is 800x600x32, linelength=3200, pages=1 Apr 12 19:48:35.762344 kernel: efifb: scrolling: redraw Apr 12 19:48:35.762351 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Apr 12 19:48:35.762359 kernel: Console: switching to colour frame buffer device 100x37 Apr 12 19:48:35.762366 kernel: fb0: EFI VGA frame buffer device Apr 12 19:48:35.762373 kernel: SMCCC: SOC_ID: ID = jep106:0a16:0001 Revision = 0x000000a1 Apr 12 19:48:35.762380 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 19:48:35.762388 kernel: NET: Registered PF_INET6 protocol family Apr 12 19:48:35.762395 kernel: Segment Routing with IPv6 Apr 12 19:48:35.762403 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 19:48:35.762411 kernel: NET: Registered PF_PACKET protocol family Apr 12 19:48:35.762418 kernel: Key type dns_resolver registered Apr 12 19:48:35.762425 kernel: registered taskstats version 1 Apr 12 19:48:35.762432 kernel: Loading compiled-in X.509 certificates Apr 12 19:48:35.762439 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 8c258d82bbd8df4a9da2c0ea4108142f04be6b34' Apr 12 19:48:35.762446 kernel: Key type .fscrypt registered Apr 12 19:48:35.762453 kernel: Key type fscrypt-provisioning registered Apr 12 19:48:35.762460 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 19:48:35.762469 kernel: ima: Allocated hash algorithm: sha1 Apr 12 19:48:35.762476 kernel: ima: No architecture policies found Apr 12 19:48:35.762536 kernel: pcieport 000d:00:01.0: Adding to iommu group 0 Apr 12 19:48:35.762597 kernel: pcieport 000d:00:01.0: AER: enabled with IRQ 91 Apr 12 19:48:35.762659 kernel: pcieport 000d:00:02.0: Adding to iommu group 1 Apr 12 19:48:35.762718 kernel: pcieport 000d:00:02.0: AER: enabled with IRQ 91 Apr 12 19:48:35.762780 kernel: pcieport 000d:00:03.0: Adding to iommu group 2 Apr 12 19:48:35.762840 kernel: pcieport 000d:00:03.0: AER: enabled with IRQ 91 Apr 12 19:48:35.762903 kernel: pcieport 000d:00:04.0: Adding to iommu group 3 Apr 12 19:48:35.762962 kernel: pcieport 000d:00:04.0: AER: enabled with IRQ 91 Apr 12 19:48:35.763026 kernel: pcieport 0000:00:01.0: Adding to iommu group 4 Apr 12 19:48:35.763090 kernel: pcieport 0000:00:01.0: AER: enabled with IRQ 92 Apr 12 19:48:35.763150 kernel: pcieport 0000:00:02.0: Adding to iommu group 5 Apr 12 19:48:35.763210 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 92 Apr 12 19:48:35.763271 kernel: pcieport 0000:00:03.0: Adding to iommu group 6 Apr 12 19:48:35.763332 kernel: pcieport 0000:00:03.0: AER: enabled with IRQ 92 Apr 12 19:48:35.763393 kernel: pcieport 0000:00:04.0: Adding to iommu group 7 Apr 12 19:48:35.763455 kernel: pcieport 0000:00:04.0: AER: enabled with IRQ 92 Apr 12 19:48:35.763517 kernel: pcieport 0005:00:01.0: Adding to iommu group 8 Apr 12 19:48:35.763576 kernel: pcieport 0005:00:01.0: AER: enabled with IRQ 93 Apr 12 19:48:35.763638 kernel: pcieport 0005:00:03.0: Adding to iommu group 9 Apr 12 19:48:35.763697 kernel: pcieport 0005:00:03.0: AER: enabled with IRQ 93 Apr 12 19:48:35.763759 kernel: pcieport 0005:00:05.0: Adding to iommu group 10 Apr 12 19:48:35.763818 kernel: pcieport 0005:00:05.0: AER: enabled with IRQ 93 Apr 12 19:48:35.763879 kernel: pcieport 0005:00:07.0: Adding to iommu group 11 Apr 12 19:48:35.763940 kernel: pcieport 0005:00:07.0: AER: enabled with IRQ 93 Apr 12 19:48:35.764002 kernel: pcieport 0003:00:01.0: Adding to iommu group 12 Apr 12 19:48:35.764065 kernel: pcieport 0003:00:01.0: AER: enabled with IRQ 94 Apr 12 19:48:35.764125 kernel: pcieport 0003:00:03.0: Adding to iommu group 13 Apr 12 19:48:35.764186 kernel: pcieport 0003:00:03.0: AER: enabled with IRQ 94 Apr 12 19:48:35.764246 kernel: pcieport 0003:00:05.0: Adding to iommu group 14 Apr 12 19:48:35.764307 kernel: pcieport 0003:00:05.0: AER: enabled with IRQ 94 Apr 12 19:48:35.764369 kernel: pcieport 000c:00:01.0: Adding to iommu group 15 Apr 12 19:48:35.764430 kernel: pcieport 000c:00:01.0: AER: enabled with IRQ 95 Apr 12 19:48:35.764491 kernel: pcieport 000c:00:02.0: Adding to iommu group 16 Apr 12 19:48:35.764549 kernel: pcieport 000c:00:02.0: AER: enabled with IRQ 95 Apr 12 19:48:35.764610 kernel: pcieport 000c:00:03.0: Adding to iommu group 17 Apr 12 19:48:35.764669 kernel: pcieport 000c:00:03.0: AER: enabled with IRQ 95 Apr 12 19:48:35.764730 kernel: pcieport 000c:00:04.0: Adding to iommu group 18 Apr 12 19:48:35.764789 kernel: pcieport 000c:00:04.0: AER: enabled with IRQ 95 Apr 12 19:48:35.764851 kernel: pcieport 0002:00:01.0: Adding to iommu group 19 Apr 12 19:48:35.764911 kernel: pcieport 0002:00:01.0: AER: enabled with IRQ 96 Apr 12 19:48:35.764972 kernel: pcieport 0002:00:03.0: Adding to iommu group 20 Apr 12 19:48:35.765031 kernel: pcieport 0002:00:03.0: AER: enabled with IRQ 96 Apr 12 19:48:35.765094 kernel: pcieport 0002:00:05.0: Adding to iommu group 21 Apr 12 19:48:35.765155 kernel: pcieport 0002:00:05.0: AER: enabled with IRQ 96 Apr 12 19:48:35.765215 kernel: pcieport 0002:00:07.0: Adding to iommu group 22 Apr 12 19:48:35.765275 kernel: pcieport 0002:00:07.0: AER: enabled with IRQ 96 Apr 12 19:48:35.765334 kernel: pcieport 0001:00:01.0: Adding to iommu group 23 Apr 12 19:48:35.765394 kernel: pcieport 0001:00:01.0: AER: enabled with IRQ 97 Apr 12 19:48:35.765456 kernel: pcieport 0001:00:02.0: Adding to iommu group 24 Apr 12 19:48:35.765515 kernel: pcieport 0001:00:02.0: AER: enabled with IRQ 97 Apr 12 19:48:35.765576 kernel: pcieport 0001:00:03.0: Adding to iommu group 25 Apr 12 19:48:35.765635 kernel: pcieport 0001:00:03.0: AER: enabled with IRQ 97 Apr 12 19:48:35.765696 kernel: pcieport 0001:00:04.0: Adding to iommu group 26 Apr 12 19:48:35.765755 kernel: pcieport 0001:00:04.0: AER: enabled with IRQ 97 Apr 12 19:48:35.765815 kernel: pcieport 0004:00:01.0: Adding to iommu group 27 Apr 12 19:48:35.765876 kernel: pcieport 0004:00:01.0: AER: enabled with IRQ 98 Apr 12 19:48:35.765937 kernel: pcieport 0004:00:03.0: Adding to iommu group 28 Apr 12 19:48:35.765996 kernel: pcieport 0004:00:03.0: AER: enabled with IRQ 98 Apr 12 19:48:35.766058 kernel: pcieport 0004:00:05.0: Adding to iommu group 29 Apr 12 19:48:35.766119 kernel: pcieport 0004:00:05.0: AER: enabled with IRQ 98 Apr 12 19:48:35.766181 kernel: pcieport 0004:01:00.0: Adding to iommu group 30 Apr 12 19:48:35.766191 kernel: Freeing unused kernel memory: 36352K Apr 12 19:48:35.766198 kernel: Run /init as init process Apr 12 19:48:35.766207 kernel: with arguments: Apr 12 19:48:35.766214 kernel: /init Apr 12 19:48:35.766221 kernel: with environment: Apr 12 19:48:35.766228 kernel: HOME=/ Apr 12 19:48:35.766235 kernel: TERM=linux Apr 12 19:48:35.766242 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 19:48:35.766252 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 19:48:35.766261 systemd[1]: Detected architecture arm64. Apr 12 19:48:35.766270 systemd[1]: Running in initrd. Apr 12 19:48:35.766277 systemd[1]: No hostname configured, using default hostname. Apr 12 19:48:35.766285 systemd[1]: Hostname set to <localhost>. Apr 12 19:48:35.766292 systemd[1]: Initializing machine ID from random generator. Apr 12 19:48:35.766300 systemd[1]: Queued start job for default target initrd.target. Apr 12 19:48:35.766307 systemd[1]: Started systemd-ask-password-console.path. Apr 12 19:48:35.766315 systemd[1]: Reached target cryptsetup.target. Apr 12 19:48:35.766322 systemd[1]: Reached target paths.target. Apr 12 19:48:35.766329 systemd[1]: Reached target slices.target. Apr 12 19:48:35.766338 systemd[1]: Reached target swap.target. Apr 12 19:48:35.766345 systemd[1]: Reached target timers.target. Apr 12 19:48:35.766353 systemd[1]: Listening on iscsid.socket. Apr 12 19:48:35.766361 systemd[1]: Listening on iscsiuio.socket. Apr 12 19:48:35.766368 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 19:48:35.766376 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 19:48:35.766383 systemd[1]: Listening on systemd-journald.socket. Apr 12 19:48:35.766392 systemd[1]: Listening on systemd-networkd.socket. Apr 12 19:48:35.766400 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 19:48:35.766407 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 19:48:35.766415 systemd[1]: Reached target sockets.target. Apr 12 19:48:35.766422 systemd[1]: Starting kmod-static-nodes.service... Apr 12 19:48:35.766429 systemd[1]: Finished network-cleanup.service. Apr 12 19:48:35.766437 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 19:48:35.766444 systemd[1]: Starting systemd-journald.service... Apr 12 19:48:35.766451 systemd[1]: Starting systemd-modules-load.service... Apr 12 19:48:35.766460 systemd[1]: Starting systemd-resolved.service... Apr 12 19:48:35.766468 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 19:48:35.766475 systemd[1]: Finished kmod-static-nodes.service. Apr 12 19:48:35.766483 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 19:48:35.766494 systemd-journald[834]: Journal started Apr 12 19:48:35.766536 systemd-journald[834]: Runtime Journal (/run/log/journal/c0466294308145b3976dfb4e7d3f26da) is 8.0M, max 4.0G, 3.9G free. Apr 12 19:48:35.706780 systemd-modules-load[835]: Inserted module 'overlay' Apr 12 19:48:35.837314 kernel: audit: type=1130 audit(1712951315.773:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:35.837348 systemd[1]: Started systemd-resolved.service. Apr 12 19:48:35.837369 kernel: Bridge firewalling registered Apr 12 19:48:35.837388 kernel: SCSI subsystem initialized Apr 12 19:48:35.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:35.754180 systemd-resolved[836]: Positive Trust Anchors: Apr 12 19:48:35.932938 kernel: audit: type=1130 audit(1712951315.841:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:35.932952 systemd[1]: Started systemd-journald.service. Apr 12 19:48:35.932962 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 19:48:35.932971 kernel: device-mapper: uevent: version 1.0.3 Apr 12 19:48:35.932980 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 19:48:35.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:35.754188 systemd-resolved[836]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 19:48:35.981040 kernel: audit: type=1130 audit(1712951315.937:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:35.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:35.754215 systemd-resolved[836]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 19:48:36.049366 kernel: audit: type=1130 audit(1712951315.985:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:35.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:35.759239 systemd-resolved[836]: Defaulting to hostname 'linux'. Apr 12 19:48:36.093978 kernel: audit: type=1130 audit(1712951316.054:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:36.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:35.774869 systemd-modules-load[835]: Inserted module 'br_netfilter' Apr 12 19:48:36.144203 kernel: audit: type=1130 audit(1712951316.098:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:36.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:35.922116 systemd-modules-load[835]: Inserted module 'dm_multipath' Apr 12 19:48:35.937829 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 19:48:35.986048 systemd[1]: Finished systemd-modules-load.service. Apr 12 19:48:36.054394 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 19:48:36.099141 systemd[1]: Reached target nss-lookup.target. Apr 12 19:48:36.150387 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 19:48:36.233295 kernel: audit: type=1130 audit(1712951316.195:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:36.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:36.161284 systemd[1]: Starting systemd-sysctl.service... Apr 12 19:48:36.276538 kernel: audit: type=1130 audit(1712951316.237:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:36.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:36.172114 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 19:48:36.328932 kernel: audit: type=1130 audit(1712951316.281:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:36.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:36.186725 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 19:48:36.339784 dracut-cmdline[854]: dracut-dracut-053 Apr 12 19:48:36.339784 dracut-cmdline[854]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=t Apr 12 19:48:36.339784 dracut-cmdline[854]: tyS1,115200n8 flatcar.first_boot=detected acpi=force flatcar.oem.id=packet flatcar.autologin verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 19:48:36.195259 systemd[1]: Finished systemd-sysctl.service. Apr 12 19:48:36.238162 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 19:48:36.282735 systemd[1]: Starting dracut-cmdline.service... Apr 12 19:48:36.414051 kernel: Loading iSCSI transport class v2.0-870. Apr 12 19:48:36.435054 kernel: iscsi: registered transport (tcp) Apr 12 19:48:36.466495 kernel: iscsi: registered transport (qla4xxx) Apr 12 19:48:36.466515 kernel: QLogic iSCSI HBA Driver Apr 12 19:48:36.497672 systemd[1]: Finished dracut-cmdline.service. Apr 12 19:48:36.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:36.507570 systemd[1]: Starting dracut-pre-udev.service... Apr 12 19:48:36.562054 kernel: raid6: neonx8 gen() 13860 MB/s Apr 12 19:48:36.587051 kernel: raid6: neonx8 xor() 10873 MB/s Apr 12 19:48:36.612051 kernel: raid6: neonx4 gen() 13614 MB/s Apr 12 19:48:36.637051 kernel: raid6: neonx4 xor() 11359 MB/s Apr 12 19:48:36.662051 kernel: raid6: neonx2 gen() 13155 MB/s Apr 12 19:48:36.687051 kernel: raid6: neonx2 xor() 10390 MB/s Apr 12 19:48:36.712051 kernel: raid6: neonx1 gen() 10604 MB/s Apr 12 19:48:36.736051 kernel: raid6: neonx1 xor() 8790 MB/s Apr 12 19:48:36.760051 kernel: raid6: int64x8 gen() 6304 MB/s Apr 12 19:48:36.784051 kernel: raid6: int64x8 xor() 3555 MB/s Apr 12 19:48:36.808051 kernel: raid6: int64x4 gen() 7204 MB/s Apr 12 19:48:36.832051 kernel: raid6: int64x4 xor() 3873 MB/s Apr 12 19:48:36.856051 kernel: raid6: int64x2 gen() 6174 MB/s Apr 12 19:48:36.880051 kernel: raid6: int64x2 xor() 3331 MB/s Apr 12 19:48:36.903051 kernel: raid6: int64x1 gen() 5062 MB/s Apr 12 19:48:36.934291 kernel: raid6: int64x1 xor() 2656 MB/s Apr 12 19:48:36.934310 kernel: raid6: using algorithm neonx8 gen() 13860 MB/s Apr 12 19:48:36.934327 kernel: raid6: .... xor() 10873 MB/s, rmw enabled Apr 12 19:48:36.942056 kernel: raid6: using neon recovery algorithm Apr 12 19:48:36.974565 kernel: xor: measuring software checksum speed Apr 12 19:48:36.974576 kernel: 8regs : 17311 MB/sec Apr 12 19:48:36.981843 kernel: 32regs : 20749 MB/sec Apr 12 19:48:36.996638 kernel: arm64_neon : 27920 MB/sec Apr 12 19:48:36.996657 kernel: xor: using function: arm64_neon (27920 MB/sec) Apr 12 19:48:37.056049 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Apr 12 19:48:37.064982 systemd[1]: Finished dracut-pre-udev.service. Apr 12 19:48:37.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:37.077308 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 19:48:37.077341 kernel: audit: type=1130 audit(1712951317.069:12): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:37.077000 audit: BPF prog-id=7 op=LOAD Apr 12 19:48:37.105509 systemd[1]: Starting systemd-udevd.service... Apr 12 19:48:37.128889 kernel: audit: type=1334 audit(1712951317.077:13): prog-id=7 op=LOAD Apr 12 19:48:37.128905 kernel: audit: type=1334 audit(1712951317.104:14): prog-id=8 op=LOAD Apr 12 19:48:37.104000 audit: BPF prog-id=8 op=LOAD Apr 12 19:48:37.136293 systemd-udevd[1030]: Using default interface naming scheme 'v252'. Apr 12 19:48:37.139601 systemd[1]: Started systemd-udevd.service. Apr 12 19:48:37.175652 kernel: audit: type=1130 audit(1712951317.142:15): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:37.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:37.145291 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 19:48:37.182984 dracut-pre-trigger[1037]: rd.md=0: removing MD RAID activation Apr 12 19:48:37.192207 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 19:48:37.231645 kernel: audit: type=1130 audit(1712951317.195:16): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:37.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:37.197142 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 19:48:37.290119 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 19:48:37.334059 kernel: audit: type=1130 audit(1712951317.294:17): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:37.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:37.355090 kernel: ACPI: bus type USB registered Apr 12 19:48:37.355103 kernel: mlx5_core 0001:01:00.0: Adding to iommu group 31 Apr 12 19:48:37.355230 kernel: usbcore: registered new interface driver usbfs Apr 12 19:48:37.376070 kernel: mlx5_core 0001:01:00.0: firmware version: 14.31.1014 Apr 12 19:48:37.376175 kernel: usbcore: registered new interface driver hub Apr 12 19:48:37.411588 kernel: mlx5_core 0001:01:00.0: 31.504 Gb/s available PCIe bandwidth, limited by 8.0 GT/s PCIe x4 link at 0001:00:01.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Apr 12 19:48:37.411672 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Apr 12 19:48:37.411682 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Apr 12 19:48:37.411690 kernel: igb 0003:03:00.0: Adding to iommu group 32 Apr 12 19:48:37.411764 kernel: usbcore: registered new device driver usb Apr 12 19:48:37.452059 kernel: nvme 0005:03:00.0: Adding to iommu group 33 Apr 12 19:48:37.485619 kernel: xhci_hcd 0004:03:00.0: Adding to iommu group 34 Apr 12 19:48:37.485744 kernel: igb 0003:03:00.0: added PHC on eth0 Apr 12 19:48:37.502518 kernel: igb 0003:03:00.0: Intel(R) Gigabit Ethernet Network Connection Apr 12 19:48:37.514256 kernel: igb 0003:03:00.0: eth0: (PCIe:5.0Gb/s:Width x2) 18:c0:4d:0c:6f:98 Apr 12 19:48:37.523970 kernel: igb 0003:03:00.0: eth0: PBA No: 106300-000 Apr 12 19:48:37.545748 kernel: igb 0003:03:00.0: Using MSI-X interrupts. 8 rx queue(s), 8 tx queue(s) Apr 12 19:48:37.545980 kernel: igb 0003:03:00.1: Adding to iommu group 35 Apr 12 19:48:37.546096 kernel: nvme nvme0: pci function 0005:03:00.0 Apr 12 19:48:37.564312 kernel: xhci_hcd 0004:03:00.0: xHCI Host Controller Apr 12 19:48:37.564452 kernel: nvme 0005:04:00.0: Adding to iommu group 36 Apr 12 19:48:37.564525 kernel: xhci_hcd 0004:03:00.0: new USB bus registered, assigned bus number 1 Apr 12 19:48:37.595182 kernel: nvme nvme0: Shutdown timeout set to 8 seconds Apr 12 19:48:37.595308 kernel: xhci_hcd 0004:03:00.0: Zeroing 64bit base registers, expecting fault Apr 12 19:48:37.629052 kernel: nvme nvme0: 32/0/0 default/read/poll queues Apr 12 19:48:37.654191 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 19:48:37.654226 kernel: GPT:9289727 != 1875385007 Apr 12 19:48:37.665189 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 19:48:37.673776 kernel: GPT:9289727 != 1875385007 Apr 12 19:48:37.683834 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 19:48:37.692804 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 19:48:37.728941 kernel: mlx5_core 0001:01:00.0: Port module event: module 0, Cable plugged Apr 12 19:48:37.780364 kernel: xhci_hcd 0004:03:00.0: hcc params 0x014051cf hci version 0x100 quirks 0x0000001100000410 Apr 12 19:48:37.780525 kernel: xhci_hcd 0004:03:00.0: xHCI Host Controller Apr 12 19:48:37.780642 kernel: xhci_hcd 0004:03:00.0: new USB bus registered, assigned bus number 2 Apr 12 19:48:37.802318 kernel: xhci_hcd 0004:03:00.0: Host supports USB 3.0 SuperSpeed Apr 12 19:48:37.818957 kernel: hub 1-0:1.0: USB hub found Apr 12 19:48:37.819146 kernel: hub 1-0:1.0: 4 ports detected Apr 12 19:48:37.819289 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Apr 12 19:48:37.863005 kernel: mlx5_core 0001:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 19:48:37.863176 kernel: nvme nvme1: pci function 0005:04:00.0 Apr 12 19:48:37.884894 kernel: hub 2-0:1.0: USB hub found Apr 12 19:48:37.885072 kernel: nvme nvme1: Shutdown timeout set to 8 seconds Apr 12 19:48:37.885165 kernel: hub 2-0:1.0: 4 ports detected Apr 12 19:48:37.915310 kernel: igb 0003:03:00.1: added PHC on eth1 Apr 12 19:48:37.915460 kernel: igb 0003:03:00.1: Intel(R) Gigabit Ethernet Network Connection Apr 12 19:48:37.915567 kernel: nvme nvme1: 32/0/0 default/read/poll queues Apr 12 19:48:37.915632 kernel: igb 0003:03:00.1: eth1: (PCIe:5.0Gb/s:Width x2) 18:c0:4d:0c:6f:99 Apr 12 19:48:37.945463 kernel: igb 0003:03:00.1: eth1: PBA No: 106300-000 Apr 12 19:48:37.945555 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by (udev-worker) (1086) Apr 12 19:48:37.945565 kernel: igb 0003:03:00.1: Using MSI-X interrupts. 8 rx queue(s), 8 tx queue(s) Apr 12 19:48:37.946811 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 19:48:37.993942 kernel: igb 0003:03:00.1 eno2: renamed from eth1 Apr 12 19:48:37.992688 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 19:48:38.001287 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 19:48:38.022009 kernel: igb 0003:03:00.0 eno1: renamed from eth0 Apr 12 19:48:38.007727 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 19:48:38.032807 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 19:48:38.043630 systemd[1]: Starting disk-uuid.service... Apr 12 19:48:38.064425 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 19:48:38.064540 disk-uuid[1128]: Primary Header is updated. Apr 12 19:48:38.064540 disk-uuid[1128]: Secondary Entries is updated. Apr 12 19:48:38.064540 disk-uuid[1128]: Secondary Header is updated. Apr 12 19:48:38.104056 kernel: usb 1-3: new high-speed USB device number 2 using xhci_hcd Apr 12 19:48:38.248053 kernel: hub 1-3:1.0: USB hub found Apr 12 19:48:38.258050 kernel: hub 1-3:1.0: 4 ports detected Apr 12 19:48:38.309079 kernel: mlx5_core 0001:01:00.1: Adding to iommu group 37 Apr 12 19:48:38.344137 kernel: mlx5_core 0001:01:00.1: firmware version: 14.31.1014 Apr 12 19:48:38.344230 kernel: mlx5_core 0001:01:00.1: 31.504 Gb/s available PCIe bandwidth, limited by 8.0 GT/s PCIe x4 link at 0001:00:01.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Apr 12 19:48:38.359058 kernel: usb 2-3: new SuperSpeed USB device number 2 using xhci_hcd Apr 12 19:48:38.408964 kernel: hub 2-3:1.0: USB hub found Apr 12 19:48:38.409161 kernel: hub 2-3:1.0: 4 ports detected Apr 12 19:48:38.698100 kernel: mlx5_core 0001:01:00.1: Port module event: module 1, Cable plugged Apr 12 19:48:38.742055 kernel: mlx5_core 0001:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 19:48:39.069919 disk-uuid[1129]: The operation has completed successfully. Apr 12 19:48:39.085249 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 19:48:39.085264 kernel: mlx5_core 0001:01:00.0 enP1p1s0f0np0: renamed from eth0 Apr 12 19:48:39.100049 kernel: mlx5_core 0001:01:00.1 enP1p1s0f1np1: renamed from eth1 Apr 12 19:48:39.142510 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 19:48:39.217255 kernel: audit: type=1130 audit(1712951319.147:18): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:39.217277 kernel: audit: type=1131 audit(1712951319.147:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:39.217287 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Apr 12 19:48:39.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:39.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:39.142591 systemd[1]: Finished disk-uuid.service. Apr 12 19:48:39.148422 systemd[1]: Starting verity-setup.service... Apr 12 19:48:39.247760 systemd[1]: Found device dev-mapper-usr.device. Apr 12 19:48:39.256564 systemd[1]: Finished verity-setup.service. Apr 12 19:48:39.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:39.265761 systemd[1]: Mounting sysusr-usr.mount... Apr 12 19:48:39.330055 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 19:48:39.330542 systemd[1]: Mounted sysusr-usr.mount. Apr 12 19:48:39.335052 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 19:48:39.405224 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Apr 12 19:48:39.405237 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 19:48:39.405246 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 19:48:39.405255 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 19:48:39.336332 systemd[1]: Starting ignition-setup.service... Apr 12 19:48:39.345655 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 19:48:39.421101 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 19:48:39.426954 systemd[1]: Finished ignition-setup.service. Apr 12 19:48:39.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:39.437181 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 19:48:39.455659 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 19:48:39.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:39.464000 audit: BPF prog-id=9 op=LOAD Apr 12 19:48:39.465304 systemd[1]: Starting systemd-networkd.service... Apr 12 19:48:39.491257 systemd-networkd[1484]: lo: Link UP Apr 12 19:48:39.491262 systemd-networkd[1484]: lo: Gained carrier Apr 12 19:48:39.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:39.491725 systemd-networkd[1484]: Enumeration completed Apr 12 19:48:39.491856 systemd[1]: Started systemd-networkd.service. Apr 12 19:48:39.492517 systemd-networkd[1484]: enP1p1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 19:48:39.524852 ignition[1458]: Ignition 2.14.0 Apr 12 19:48:39.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:39.500038 systemd[1]: Reached target network.target. Apr 12 19:48:39.524859 ignition[1458]: Stage: fetch-offline Apr 12 19:48:39.508990 systemd[1]: Starting iscsiuio.service... Apr 12 19:48:39.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:39.557015 iscsid[1501]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 19:48:39.557015 iscsid[1501]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 19:48:39.557015 iscsid[1501]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier]. Apr 12 19:48:39.557015 iscsid[1501]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 19:48:39.557015 iscsid[1501]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 19:48:39.557015 iscsid[1501]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 19:48:39.557015 iscsid[1501]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 19:48:39.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:39.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:39.524923 ignition[1458]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:48:39.523429 systemd[1]: Started iscsiuio.service. Apr 12 19:48:39.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:39.524946 ignition[1458]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 19:48:39.534204 systemd[1]: Starting iscsid.service... Apr 12 19:48:39.529239 ignition[1458]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 19:48:39.547625 systemd[1]: Started iscsid.service. Apr 12 19:48:39.529339 ignition[1458]: parsed url from cmdline: "" Apr 12 19:48:39.548145 unknown[1458]: fetched base config from "system" Apr 12 19:48:39.529342 ignition[1458]: no config URL provided Apr 12 19:48:39.548152 unknown[1458]: fetched user config from "system" Apr 12 19:48:39.529346 ignition[1458]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 19:48:39.553480 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 19:48:39.529388 ignition[1458]: parsing config with SHA512: 791e90f7538c5a0d919e6bf3b2e2f66a555b59226ec9104bb6c7be734ce7bc330f2dd3c0f83fd3296d9dde39981ec7243f2b321f5f7a536c39cdee4769d8c7cb Apr 12 19:48:39.562505 systemd[1]: Starting dracut-initqueue.service... Apr 12 19:48:39.549316 ignition[1458]: fetch-offline: fetch-offline passed Apr 12 19:48:39.573670 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Apr 12 19:48:39.549322 ignition[1458]: POST message to Packet Timeline Apr 12 19:48:39.576460 systemd[1]: Starting ignition-kargs.service... Apr 12 19:48:39.549327 ignition[1458]: POST Status error: resource requires networking Apr 12 19:48:39.592150 systemd[1]: Finished dracut-initqueue.service. Apr 12 19:48:39.549390 ignition[1458]: Ignition finished successfully Apr 12 19:48:39.608976 systemd[1]: Reached target remote-fs-pre.target. Apr 12 19:48:39.591950 ignition[1514]: Ignition 2.14.0 Apr 12 19:48:39.617735 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 19:48:39.591956 ignition[1514]: Stage: kargs Apr 12 19:48:39.626982 systemd[1]: Reached target remote-fs.target. Apr 12 19:48:39.592074 ignition[1514]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:48:39.642276 systemd[1]: Starting dracut-pre-mount.service... Apr 12 19:48:39.592091 ignition[1514]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 19:48:39.656760 systemd[1]: Finished dracut-pre-mount.service. Apr 12 19:48:39.594205 ignition[1514]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 19:48:39.595188 ignition[1514]: kargs: kargs passed Apr 12 19:48:39.595193 ignition[1514]: POST message to Packet Timeline Apr 12 19:48:39.595205 ignition[1514]: GET https://metadata.packet.net/metadata: attempt #1 Apr 12 19:48:39.598231 ignition[1514]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:33006->[::1]:53: read: connection refused Apr 12 19:48:39.798512 ignition[1514]: GET https://metadata.packet.net/metadata: attempt #2 Apr 12 19:48:39.799106 ignition[1514]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:48329->[::1]:53: read: connection refused Apr 12 19:48:40.199829 ignition[1514]: GET https://metadata.packet.net/metadata: attempt #3 Apr 12 19:48:40.201878 ignition[1514]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:43950->[::1]:53: read: connection refused Apr 12 19:48:40.327055 kernel: mlx5_core 0001:01:00.1 enP1p1s0f1np1: Link up Apr 12 19:48:40.332468 systemd-networkd[1484]: enP1p1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 19:48:40.350822 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enP1p1s0f1np1: link becomes ready Apr 12 19:48:41.002001 ignition[1514]: GET https://metadata.packet.net/metadata: attempt #4 Apr 12 19:48:41.002539 ignition[1514]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:60755->[::1]:53: read: connection refused Apr 12 19:48:41.200058 kernel: mlx5_core 0001:01:00.0 enP1p1s0f0np0: Link up Apr 12 19:48:41.203681 systemd-networkd[1484]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 19:48:41.256031 systemd-networkd[1484]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 19:48:41.308132 systemd-networkd[1484]: enP1p1s0f1np1: Link UP Apr 12 19:48:41.308274 systemd-networkd[1484]: enP1p1s0f1np1: Gained carrier Apr 12 19:48:41.317247 systemd-networkd[1484]: enP1p1s0f0np0: Link UP Apr 12 19:48:41.317392 systemd-networkd[1484]: eno2: Link UP Apr 12 19:48:41.317496 systemd-networkd[1484]: eno1: Link UP Apr 12 19:48:41.349909 systemd-networkd[1484]: enP1p1s0f0np0: Gained carrier Apr 12 19:48:41.354719 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enP1p1s0f0np0: link becomes ready Apr 12 19:48:41.373093 systemd-networkd[1484]: enP1p1s0f0np0: DHCPv4 address 147.28.162.119/31, gateway 147.28.162.118 acquired from 147.28.144.140 Apr 12 19:48:42.604369 ignition[1514]: GET https://metadata.packet.net/metadata: attempt #5 Apr 12 19:48:42.605243 ignition[1514]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:53006->[::1]:53: read: connection refused Apr 12 19:48:42.658343 systemd-networkd[1484]: enP1p1s0f0np0: Gained IPv6LL Apr 12 19:48:43.170270 systemd-networkd[1484]: enP1p1s0f1np1: Gained IPv6LL Apr 12 19:48:45.806218 ignition[1514]: GET https://metadata.packet.net/metadata: attempt #6 Apr 12 19:48:45.837769 ignition[1514]: GET result: OK Apr 12 19:48:45.999073 ignition[1514]: Ignition finished successfully Apr 12 19:48:46.004431 systemd[1]: Finished ignition-kargs.service. Apr 12 19:48:46.059050 kernel: kauditd_printk_skb: 10 callbacks suppressed Apr 12 19:48:46.059073 kernel: audit: type=1130 audit(1712951326.004:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:46.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:46.016348 ignition[1537]: Ignition 2.14.0 Apr 12 19:48:46.006420 systemd[1]: Starting ignition-disks.service... Apr 12 19:48:46.016354 ignition[1537]: Stage: disks Apr 12 19:48:46.016453 ignition[1537]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:48:46.016471 ignition[1537]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 19:48:46.018371 ignition[1537]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 19:48:46.019233 ignition[1537]: disks: disks passed Apr 12 19:48:46.019238 ignition[1537]: POST message to Packet Timeline Apr 12 19:48:46.019251 ignition[1537]: GET https://metadata.packet.net/metadata: attempt #1 Apr 12 19:48:46.046488 ignition[1537]: GET result: OK Apr 12 19:48:46.156075 ignition[1537]: Ignition finished successfully Apr 12 19:48:46.157297 systemd[1]: Finished ignition-disks.service. Apr 12 19:48:46.200851 kernel: audit: type=1130 audit(1712951326.164:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:46.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:46.164646 systemd[1]: Reached target initrd-root-device.target. Apr 12 19:48:46.205449 systemd[1]: Reached target local-fs-pre.target. Apr 12 19:48:46.214494 systemd[1]: Reached target local-fs.target. Apr 12 19:48:46.223405 systemd[1]: Reached target sysinit.target. Apr 12 19:48:46.232181 systemd[1]: Reached target basic.target. Apr 12 19:48:46.242122 systemd[1]: Starting systemd-fsck-root.service... Apr 12 19:48:46.258930 systemd-fsck[1556]: ROOT: clean, 612/553520 files, 56018/553472 blocks Apr 12 19:48:46.261104 systemd[1]: Finished systemd-fsck-root.service. Apr 12 19:48:46.323678 kernel: audit: type=1130 audit(1712951326.268:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:46.323707 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 19:48:46.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:46.269716 systemd[1]: Mounting sysroot.mount... Apr 12 19:48:46.330035 systemd[1]: Mounted sysroot.mount. Apr 12 19:48:46.338431 systemd[1]: Reached target initrd-root-fs.target. Apr 12 19:48:46.347257 systemd[1]: Mounting sysroot-usr.mount... Apr 12 19:48:46.356977 systemd[1]: Starting flatcar-metadata-hostname.service... Apr 12 19:48:46.366070 systemd[1]: Starting flatcar-static-network.service... Apr 12 19:48:46.373890 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 19:48:46.373983 systemd[1]: Reached target ignition-diskful.target. Apr 12 19:48:46.385018 systemd[1]: Mounted sysroot-usr.mount. Apr 12 19:48:46.467705 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/nvme0n1p6 scanned by mount (1569) Apr 12 19:48:46.467721 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Apr 12 19:48:46.467734 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 19:48:46.467744 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 19:48:46.467753 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 19:48:46.467774 coreos-metadata[1563]: Apr 12 19:48:46.439 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 19:48:46.467774 coreos-metadata[1563]: Apr 12 19:48:46.460 INFO Fetch successful Apr 12 19:48:46.398057 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 19:48:46.533179 kernel: audit: type=1130 audit(1712951326.495:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:46.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:46.533224 coreos-metadata[1564]: Apr 12 19:48:46.448 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 19:48:46.533224 coreos-metadata[1564]: Apr 12 19:48:46.468 INFO Fetch successful Apr 12 19:48:46.666097 kernel: audit: type=1130 audit(1712951326.537:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:46.666115 kernel: audit: type=1130 audit(1712951326.585:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:46.666125 kernel: audit: type=1131 audit(1712951326.585:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:46.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:46.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:46.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:46.666275 coreos-metadata[1563]: Apr 12 19:48:46.492 INFO wrote hostname ci-3510.3.3-a-bd0b40f5b0 to /sysroot/etc/hostname Apr 12 19:48:46.406692 systemd[1]: Starting initrd-setup-root.service... Apr 12 19:48:46.475669 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 19:48:46.697873 initrd-setup-root[1592]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 19:48:46.748051 kernel: audit: type=1130 audit(1712951326.703:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:46.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:46.486464 systemd[1]: Finished initrd-setup-root.service. Apr 12 19:48:46.753328 initrd-setup-root[1600]: cut: /sysroot/etc/group: No such file or directory Apr 12 19:48:46.495732 systemd[1]: Finished flatcar-metadata-hostname.service. Apr 12 19:48:46.763750 initrd-setup-root[1608]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 19:48:46.768995 ignition[1640]: INFO : Ignition 2.14.0 Apr 12 19:48:46.768995 ignition[1640]: INFO : Stage: mount Apr 12 19:48:46.768995 ignition[1640]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:48:46.768995 ignition[1640]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 19:48:46.768995 ignition[1640]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 19:48:46.768995 ignition[1640]: INFO : mount: mount passed Apr 12 19:48:46.768995 ignition[1640]: INFO : POST message to Packet Timeline Apr 12 19:48:46.768995 ignition[1640]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 19:48:46.768995 ignition[1640]: INFO : GET result: OK Apr 12 19:48:46.537870 systemd[1]: flatcar-static-network.service: Deactivated successfully. Apr 12 19:48:46.833776 initrd-setup-root[1616]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 19:48:46.537939 systemd[1]: Finished flatcar-static-network.service. Apr 12 19:48:46.586678 systemd[1]: Starting ignition-mount.service... Apr 12 19:48:46.672326 systemd[1]: Starting sysroot-boot.service... Apr 12 19:48:46.891781 kernel: audit: type=1130 audit(1712951326.852:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:46.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:46.891831 ignition[1640]: INFO : Ignition finished successfully Apr 12 19:48:46.688212 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 19:48:46.969763 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/nvme0n1p6 scanned by mount (1658) Apr 12 19:48:46.969779 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Apr 12 19:48:46.969788 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 19:48:46.969797 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 19:48:46.969806 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 19:48:46.688435 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 19:48:46.697558 systemd[1]: Finished sysroot-boot.service. Apr 12 19:48:46.845207 systemd[1]: Finished ignition-mount.service. Apr 12 19:48:46.988911 ignition[1677]: INFO : Ignition 2.14.0 Apr 12 19:48:46.988911 ignition[1677]: INFO : Stage: files Apr 12 19:48:46.988911 ignition[1677]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:48:46.988911 ignition[1677]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 19:48:46.854447 systemd[1]: Starting ignition-files.service... Apr 12 19:48:47.020708 ignition[1677]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 19:48:47.020708 ignition[1677]: DEBUG : files: compiled without relabeling support, skipping Apr 12 19:48:47.020708 ignition[1677]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 19:48:47.020708 ignition[1677]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 19:48:47.020708 ignition[1677]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 19:48:47.020708 ignition[1677]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 19:48:47.020708 ignition[1677]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 19:48:47.020708 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 19:48:47.020708 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Apr 12 19:48:46.901120 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 19:48:47.111872 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 19:48:46.912249 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 19:48:46.993755 unknown[1677]: wrote ssh authorized keys file for user: core Apr 12 19:48:47.331896 ignition[1677]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Apr 12 19:48:47.347928 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 19:48:47.347928 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 19:48:47.347928 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Apr 12 19:48:47.390954 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 19:48:47.515965 ignition[1677]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Apr 12 19:48:47.533615 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 19:48:47.533615 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 19:48:47.533615 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.29.2/bin/linux/arm64/kubeadm: attempt #1 Apr 12 19:48:47.602167 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 19:48:48.152885 ignition[1677]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 3e6beeb7794aa002604f0be43af0255e707846760508ebe98006ec72ae8d7a7cf2c14fd52bbcc5084f0e9366b992dc64341b1da646f1ce6e937fb762f880dc15 Apr 12 19:48:48.170924 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 19:48:48.170924 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 19:48:48.170924 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.29.2/bin/linux/arm64/kubelet: attempt #1 Apr 12 19:48:48.206604 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 19:48:48.793925 ignition[1677]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: ded47d757fac0279b1b784756fb54b3a5cb0180ce45833838b00d6d7c87578a985e4627503dd7ff734e5f577cf4752ae7daaa2b68e5934fd4617ea15e995f91b Apr 12 19:48:48.835527 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1686) Apr 12 19:48:48.803481 systemd[1]: mnt-oem994151204.mount: Deactivated successfully. Apr 12 19:48:48.841781 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 19:48:48.841781 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Apr 12 19:48:48.841781 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 19:48:48.841781 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 19:48:48.841781 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 19:48:48.841781 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 19:48:48.841781 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 19:48:48.841781 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Apr 12 19:48:48.841781 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 19:48:48.841781 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem994151204" Apr 12 19:48:48.841781 ignition[1677]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem994151204": device or resource busy Apr 12 19:48:48.841781 ignition[1677]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem994151204", trying btrfs: device or resource busy Apr 12 19:48:48.841781 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem994151204" Apr 12 19:48:48.841781 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem994151204" Apr 12 19:48:48.841781 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem994151204" Apr 12 19:48:49.109481 kernel: audit: type=1130 audit(1712951328.945:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:48.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:48.938391 systemd[1]: Finished ignition-files.service. Apr 12 19:48:49.115501 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem994151204" Apr 12 19:48:49.115501 ignition[1677]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Apr 12 19:48:49.115501 ignition[1677]: INFO : files: op(e): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 19:48:49.115501 ignition[1677]: INFO : files: op(e): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 19:48:49.115501 ignition[1677]: INFO : files: op(f): [started] processing unit "packet-phone-home.service" Apr 12 19:48:49.115501 ignition[1677]: INFO : files: op(f): [finished] processing unit "packet-phone-home.service" Apr 12 19:48:49.115501 ignition[1677]: INFO : files: op(10): [started] processing unit "prepare-cni-plugins.service" Apr 12 19:48:49.115501 ignition[1677]: INFO : files: op(10): op(11): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 19:48:49.115501 ignition[1677]: INFO : files: op(10): op(11): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 19:48:49.115501 ignition[1677]: INFO : files: op(10): [finished] processing unit "prepare-cni-plugins.service" Apr 12 19:48:49.115501 ignition[1677]: INFO : files: op(12): [started] processing unit "prepare-critools.service" Apr 12 19:48:49.115501 ignition[1677]: INFO : files: op(12): op(13): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 19:48:49.115501 ignition[1677]: INFO : files: op(12): op(13): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 19:48:49.115501 ignition[1677]: INFO : files: op(12): [finished] processing unit "prepare-critools.service" Apr 12 19:48:49.115501 ignition[1677]: INFO : files: op(14): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 19:48:49.115501 ignition[1677]: INFO : files: op(14): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 19:48:49.115501 ignition[1677]: INFO : files: op(15): [started] setting preset to enabled for "packet-phone-home.service" Apr 12 19:48:49.115501 ignition[1677]: INFO : files: op(15): [finished] setting preset to enabled for "packet-phone-home.service" Apr 12 19:48:49.115501 ignition[1677]: INFO : files: op(16): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 19:48:49.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:48.947868 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 19:48:49.441516 ignition[1677]: INFO : files: op(16): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 19:48:49.441516 ignition[1677]: INFO : files: op(17): [started] setting preset to enabled for "prepare-critools.service" Apr 12 19:48:49.441516 ignition[1677]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 19:48:49.441516 ignition[1677]: INFO : files: createResultFile: createFiles: op(18): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 19:48:49.441516 ignition[1677]: INFO : files: createResultFile: createFiles: op(18): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 19:48:49.441516 ignition[1677]: INFO : files: files passed Apr 12 19:48:49.441516 ignition[1677]: INFO : POST message to Packet Timeline Apr 12 19:48:49.441516 ignition[1677]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 19:48:49.441516 ignition[1677]: INFO : GET result: OK Apr 12 19:48:49.441516 ignition[1677]: INFO : Ignition finished successfully Apr 12 19:48:49.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.002115 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 19:48:49.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.589854 initrd-setup-root-after-ignition[1714]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 19:48:49.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.003657 systemd[1]: Starting ignition-quench.service... Apr 12 19:48:49.020716 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 19:48:49.627744 iscsid[1501]: iscsid shutting down. Apr 12 19:48:49.038336 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 19:48:49.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.038399 systemd[1]: Finished ignition-quench.service. Apr 12 19:48:49.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.061555 systemd[1]: Reached target ignition-complete.target. Apr 12 19:48:49.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.080372 systemd[1]: Starting initrd-parse-etc.service... Apr 12 19:48:49.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.111186 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 19:48:49.687396 ignition[1729]: INFO : Ignition 2.14.0 Apr 12 19:48:49.687396 ignition[1729]: INFO : Stage: umount Apr 12 19:48:49.687396 ignition[1729]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 19:48:49.687396 ignition[1729]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 19:48:49.687396 ignition[1729]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 19:48:49.687396 ignition[1729]: INFO : umount: umount passed Apr 12 19:48:49.687396 ignition[1729]: INFO : POST message to Packet Timeline Apr 12 19:48:49.687396 ignition[1729]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 19:48:49.687396 ignition[1729]: INFO : GET result: OK Apr 12 19:48:49.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.111293 systemd[1]: Finished initrd-parse-etc.service. Apr 12 19:48:49.795000 audit: BPF prog-id=6 op=UNLOAD Apr 12 19:48:49.121541 systemd[1]: Reached target initrd-fs.target. Apr 12 19:48:49.804579 ignition[1729]: INFO : Ignition finished successfully Apr 12 19:48:49.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.138239 systemd[1]: Reached target initrd.target. Apr 12 19:48:49.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.155148 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 19:48:49.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.156536 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 19:48:49.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.176830 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 19:48:49.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.191514 systemd[1]: Starting initrd-cleanup.service... Apr 12 19:48:49.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.213188 systemd[1]: Stopped target nss-lookup.target. Apr 12 19:48:49.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.223391 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 19:48:49.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.239657 systemd[1]: Stopped target timers.target. Apr 12 19:48:49.255928 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 19:48:49.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.256016 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 19:48:49.272473 systemd[1]: Stopped target initrd.target. Apr 12 19:48:49.288604 systemd[1]: Stopped target basic.target. Apr 12 19:48:49.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.304738 systemd[1]: Stopped target ignition-complete.target. Apr 12 19:48:49.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.320981 systemd[1]: Stopped target ignition-diskful.target. Apr 12 19:48:49.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.337425 systemd[1]: Stopped target initrd-root-device.target. Apr 12 19:48:49.353813 systemd[1]: Stopped target remote-fs.target. Apr 12 19:48:49.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.370471 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 19:48:49.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.386884 systemd[1]: Stopped target sysinit.target. Apr 12 19:48:49.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.403237 systemd[1]: Stopped target local-fs.target. Apr 12 19:48:49.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:49.419591 systemd[1]: Stopped target local-fs-pre.target. Apr 12 19:48:49.435994 systemd[1]: Stopped target swap.target. Apr 12 19:48:49.446889 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 19:48:49.446980 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 19:48:49.463115 systemd[1]: Stopped target cryptsetup.target. Apr 12 19:48:49.479118 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 19:48:49.479200 systemd[1]: Stopped dracut-initqueue.service. Apr 12 19:48:49.495250 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 19:48:49.495329 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 19:48:49.511436 systemd[1]: Stopped target paths.target. Apr 12 19:48:49.527329 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 19:48:49.531067 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 19:48:49.537830 systemd[1]: Stopped target slices.target. Apr 12 19:48:49.548271 systemd[1]: Stopped target sockets.target. Apr 12 19:48:49.558715 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 19:48:49.558803 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 19:48:49.569149 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 19:48:49.569222 systemd[1]: Stopped ignition-files.service. Apr 12 19:48:49.579612 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Apr 12 19:48:49.579691 systemd[1]: Stopped flatcar-metadata-hostname.service. Apr 12 19:48:49.596940 systemd[1]: Stopping ignition-mount.service... Apr 12 19:48:49.612084 systemd[1]: Stopping iscsid.service... Apr 12 19:48:49.624718 systemd[1]: Stopping sysroot-boot.service... Apr 12 19:48:49.633229 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 19:48:49.633465 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 19:48:49.643455 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 19:48:49.643534 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 19:48:49.656346 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 19:48:49.657081 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 19:48:49.657198 systemd[1]: Stopped iscsid.service. Apr 12 19:48:49.664874 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 19:48:49.664945 systemd[1]: Finished initrd-cleanup.service. Apr 12 19:48:49.673160 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 19:48:49.673199 systemd[1]: Closed iscsid.socket. Apr 12 19:48:49.682634 systemd[1]: Stopping iscsiuio.service... Apr 12 19:48:49.692240 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 19:48:49.692316 systemd[1]: Stopped iscsiuio.service. Apr 12 19:48:49.701567 systemd[1]: Stopped target network.target. Apr 12 19:48:49.710745 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 19:48:49.710809 systemd[1]: Closed iscsiuio.socket. Apr 12 19:48:49.724775 systemd[1]: Stopping systemd-networkd.service... Apr 12 19:48:49.736060 systemd-networkd[1484]: enP1p1s0f1np1: DHCPv6 lease lost Apr 12 19:48:49.738966 systemd[1]: Stopping systemd-resolved.service... Apr 12 19:48:49.746052 systemd-networkd[1484]: enP1p1s0f0np0: DHCPv6 lease lost Apr 12 19:48:50.155000 audit: BPF prog-id=9 op=UNLOAD Apr 12 19:48:49.753195 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 19:48:49.753273 systemd[1]: Stopped systemd-resolved.service. Apr 12 19:48:49.763361 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 19:48:49.763453 systemd[1]: Stopped systemd-networkd.service. Apr 12 19:48:49.772398 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 19:48:49.772464 systemd[1]: Stopped sysroot-boot.service. Apr 12 19:48:49.781242 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 19:48:49.781268 systemd[1]: Closed systemd-networkd.socket. Apr 12 19:48:49.791632 systemd[1]: Stopping network-cleanup.service... Apr 12 19:48:49.799959 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 19:48:49.800087 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 19:48:49.809583 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 19:48:49.809653 systemd[1]: Stopped systemd-sysctl.service. Apr 12 19:48:49.819101 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 19:48:49.819135 systemd[1]: Stopped systemd-modules-load.service. Apr 12 19:48:49.830034 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 19:48:49.830898 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 19:48:49.831001 systemd[1]: Stopped ignition-mount.service. Apr 12 19:48:49.844450 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 19:48:49.844594 systemd[1]: Stopped ignition-disks.service. Apr 12 19:48:49.852354 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 19:48:49.852384 systemd[1]: Stopped ignition-kargs.service. Apr 12 19:48:49.861696 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 19:48:49.861738 systemd[1]: Stopped ignition-setup.service. Apr 12 19:48:49.871106 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 19:48:49.871154 systemd[1]: Stopped initrd-setup-root.service. Apr 12 19:48:49.880716 systemd[1]: Stopping systemd-udevd.service... Apr 12 19:48:49.890427 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 19:48:49.890564 systemd[1]: Stopped systemd-udevd.service. Apr 12 19:48:49.899653 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 19:48:49.899718 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 19:48:49.908464 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 19:48:49.908488 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 19:48:49.917472 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 19:48:49.917503 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 19:48:49.926497 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 19:48:49.926526 systemd[1]: Stopped dracut-cmdline.service. Apr 12 19:48:49.935494 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 19:48:49.935523 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 19:48:49.945670 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 19:48:49.953323 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Apr 12 19:48:49.953398 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Apr 12 19:48:49.962317 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 19:48:49.962349 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 19:48:49.970783 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 19:48:49.970825 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 19:48:49.981368 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Apr 12 19:48:49.981987 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 19:48:49.982058 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 19:48:50.559786 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 19:48:50.559861 systemd[1]: Stopped network-cleanup.service. Apr 12 19:48:50.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:50.568211 systemd[1]: Reached target initrd-switch-root.target. Apr 12 19:48:50.577503 systemd[1]: Starting initrd-switch-root.service... Apr 12 19:48:50.589139 systemd[1]: Switching root. Apr 12 19:48:50.623020 systemd-journald[834]: Journal stopped Apr 12 19:48:53.671519 systemd-journald[834]: Received SIGTERM from PID 1 (systemd). Apr 12 19:48:53.671544 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 19:48:53.671554 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 19:48:53.671563 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 19:48:53.671571 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 19:48:53.671579 kernel: SELinux: policy capability open_perms=1 Apr 12 19:48:53.671588 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 19:48:53.671598 kernel: SELinux: policy capability always_check_network=0 Apr 12 19:48:53.671606 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 19:48:53.671614 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 19:48:53.671621 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 19:48:53.671629 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 19:48:53.671638 systemd[1]: Successfully loaded SELinux policy in 140.096ms. Apr 12 19:48:53.671648 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.538ms. Apr 12 19:48:53.671660 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 19:48:53.671669 systemd[1]: Detected architecture arm64. Apr 12 19:48:53.671678 systemd[1]: Detected first boot. Apr 12 19:48:53.671686 systemd[1]: Hostname set to <ci-3510.3.3-a-bd0b40f5b0>. Apr 12 19:48:53.671696 systemd[1]: Initializing machine ID from random generator. Apr 12 19:48:53.671706 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 19:48:53.671715 systemd[1]: Populated /etc with preset unit settings. Apr 12 19:48:53.671724 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 19:48:53.671734 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 19:48:53.671744 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 19:48:53.671753 kernel: kauditd_printk_skb: 59 callbacks suppressed Apr 12 19:48:53.671761 kernel: audit: type=1334 audit(1712951332.720:92): prog-id=12 op=LOAD Apr 12 19:48:53.671771 kernel: audit: type=1334 audit(1712951332.720:93): prog-id=3 op=UNLOAD Apr 12 19:48:53.671780 kernel: audit: type=1334 audit(1712951332.730:94): prog-id=13 op=LOAD Apr 12 19:48:53.671788 kernel: audit: type=1334 audit(1712951332.741:95): prog-id=14 op=LOAD Apr 12 19:48:53.671796 kernel: audit: type=1334 audit(1712951332.741:96): prog-id=4 op=UNLOAD Apr 12 19:48:53.671805 kernel: audit: type=1334 audit(1712951332.741:97): prog-id=5 op=UNLOAD Apr 12 19:48:53.671813 kernel: audit: type=1334 audit(1712951332.752:98): prog-id=15 op=LOAD Apr 12 19:48:53.671821 kernel: audit: type=1334 audit(1712951332.752:99): prog-id=12 op=UNLOAD Apr 12 19:48:53.671830 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 19:48:53.671840 kernel: audit: type=1334 audit(1712951332.763:100): prog-id=16 op=LOAD Apr 12 19:48:53.671848 kernel: audit: type=1334 audit(1712951332.774:101): prog-id=17 op=LOAD Apr 12 19:48:53.671857 systemd[1]: Stopped initrd-switch-root.service. Apr 12 19:48:53.671866 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 19:48:53.671876 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 19:48:53.671886 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 19:48:53.671897 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 19:48:53.671907 systemd[1]: Created slice system-getty.slice. Apr 12 19:48:53.671918 systemd[1]: Created slice system-modprobe.slice. Apr 12 19:48:53.671927 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 19:48:53.671937 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 19:48:53.671946 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 19:48:53.671955 systemd[1]: Created slice user.slice. Apr 12 19:48:53.671965 systemd[1]: Started systemd-ask-password-console.path. Apr 12 19:48:53.671974 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 19:48:53.671983 systemd[1]: Set up automount boot.automount. Apr 12 19:48:53.671992 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 19:48:53.672003 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 19:48:53.672012 systemd[1]: Stopped target initrd-fs.target. Apr 12 19:48:53.672021 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 19:48:53.672030 systemd[1]: Reached target integritysetup.target. Apr 12 19:48:53.672039 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 19:48:53.672052 systemd[1]: Reached target remote-fs.target. Apr 12 19:48:53.672061 systemd[1]: Reached target slices.target. Apr 12 19:48:53.672072 systemd[1]: Reached target swap.target. Apr 12 19:48:53.672081 systemd[1]: Reached target torcx.target. Apr 12 19:48:53.672090 systemd[1]: Reached target veritysetup.target. Apr 12 19:48:53.672099 systemd[1]: Listening on systemd-coredump.socket. Apr 12 19:48:53.672109 systemd[1]: Listening on systemd-initctl.socket. Apr 12 19:48:53.672118 systemd[1]: Listening on systemd-networkd.socket. Apr 12 19:48:53.672129 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 19:48:53.672139 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 19:48:53.672148 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 19:48:53.672157 systemd[1]: Mounting dev-hugepages.mount... Apr 12 19:48:53.672167 systemd[1]: Mounting dev-mqueue.mount... Apr 12 19:48:53.672176 systemd[1]: Mounting media.mount... Apr 12 19:48:53.672185 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 19:48:53.672195 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 19:48:53.672205 systemd[1]: Mounting tmp.mount... Apr 12 19:48:53.672215 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 19:48:53.672227 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 19:48:53.672236 systemd[1]: Starting kmod-static-nodes.service... Apr 12 19:48:53.672245 systemd[1]: Starting modprobe@configfs.service... Apr 12 19:48:53.672255 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 19:48:53.672264 systemd[1]: Starting modprobe@drm.service... Apr 12 19:48:53.672273 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 19:48:53.672282 systemd[1]: Starting modprobe@fuse.service... Apr 12 19:48:53.672292 kernel: fuse: init (API version 7.34) Apr 12 19:48:53.672302 systemd[1]: Starting modprobe@loop.service... Apr 12 19:48:53.672311 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 19:48:53.672321 kernel: loop: module loaded Apr 12 19:48:53.672330 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 19:48:53.672340 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 19:48:53.672349 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 19:48:53.672358 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 19:48:53.672368 systemd[1]: Stopped systemd-journald.service. Apr 12 19:48:53.672378 systemd[1]: systemd-journald.service: Consumed 3.901s CPU time. Apr 12 19:48:53.672387 systemd[1]: Starting systemd-journald.service... Apr 12 19:48:53.672397 systemd[1]: Starting systemd-modules-load.service... Apr 12 19:48:53.672406 systemd[1]: Starting systemd-network-generator.service... Apr 12 19:48:53.672419 systemd-journald[1898]: Journal started Apr 12 19:48:53.672458 systemd-journald[1898]: Runtime Journal (/run/log/journal/a8ae8921091848a3bc4bb6a9f785eb10) is 8.0M, max 4.0G, 3.9G free. Apr 12 19:48:50.796000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 19:48:50.942000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 19:48:50.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 19:48:50.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 19:48:50.950000 audit: BPF prog-id=10 op=LOAD Apr 12 19:48:50.950000 audit: BPF prog-id=10 op=UNLOAD Apr 12 19:48:50.951000 audit: BPF prog-id=11 op=LOAD Apr 12 19:48:50.951000 audit: BPF prog-id=11 op=UNLOAD Apr 12 19:48:50.984000 audit[1778]: AVC avc: denied { associate } for pid=1778 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 19:48:50.984000 audit[1778]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40002d189c a1=40001cadf8 a2=40001d10c0 a3=32 items=0 ppid=1761 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:48:50.984000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 19:48:51.003000 audit[1778]: AVC avc: denied { associate } for pid=1778 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 19:48:51.003000 audit[1778]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40002d1979 a2=1ed a3=0 items=2 ppid=1761 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:48:51.003000 audit: CWD cwd="/" Apr 12 19:48:51.003000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:51.003000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:51.003000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 19:48:52.720000 audit: BPF prog-id=12 op=LOAD Apr 12 19:48:52.720000 audit: BPF prog-id=3 op=UNLOAD Apr 12 19:48:52.730000 audit: BPF prog-id=13 op=LOAD Apr 12 19:48:52.741000 audit: BPF prog-id=14 op=LOAD Apr 12 19:48:52.741000 audit: BPF prog-id=4 op=UNLOAD Apr 12 19:48:52.741000 audit: BPF prog-id=5 op=UNLOAD Apr 12 19:48:52.752000 audit: BPF prog-id=15 op=LOAD Apr 12 19:48:52.752000 audit: BPF prog-id=12 op=UNLOAD Apr 12 19:48:52.763000 audit: BPF prog-id=16 op=LOAD Apr 12 19:48:52.774000 audit: BPF prog-id=17 op=LOAD Apr 12 19:48:52.774000 audit: BPF prog-id=13 op=UNLOAD Apr 12 19:48:52.774000 audit: BPF prog-id=14 op=UNLOAD Apr 12 19:48:52.785000 audit: BPF prog-id=18 op=LOAD Apr 12 19:48:52.785000 audit: BPF prog-id=15 op=UNLOAD Apr 12 19:48:52.796000 audit: BPF prog-id=19 op=LOAD Apr 12 19:48:52.806000 audit: BPF prog-id=20 op=LOAD Apr 12 19:48:52.806000 audit: BPF prog-id=16 op=UNLOAD Apr 12 19:48:52.806000 audit: BPF prog-id=17 op=UNLOAD Apr 12 19:48:52.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:52.860000 audit: BPF prog-id=18 op=UNLOAD Apr 12 19:48:52.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:52.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.633000 audit: BPF prog-id=21 op=LOAD Apr 12 19:48:53.633000 audit: BPF prog-id=22 op=LOAD Apr 12 19:48:53.633000 audit: BPF prog-id=23 op=LOAD Apr 12 19:48:53.633000 audit: BPF prog-id=19 op=UNLOAD Apr 12 19:48:53.633000 audit: BPF prog-id=20 op=UNLOAD Apr 12 19:48:53.667000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 19:48:53.667000 audit[1898]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffc127c630 a2=4000 a3=1 items=0 ppid=1 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:48:53.667000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 19:48:52.719007 systemd[1]: Queued start job for default target multi-user.target. Apr 12 19:48:50.982926 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 19:48:52.807291 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 19:48:50.983195 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:50Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 19:48:52.807780 systemd[1]: systemd-journald.service: Consumed 3.901s CPU time. Apr 12 19:48:50.983212 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:50Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 19:48:50.983242 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:50Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 19:48:50.983251 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:50Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 19:48:50.983275 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:50Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 19:48:50.983285 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:50Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 19:48:50.983471 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:50Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 19:48:50.983503 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:50Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 19:48:50.983515 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:50Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 19:48:50.984348 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:50Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 19:48:50.984378 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:50Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 19:48:50.984394 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:50Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 19:48:50.984407 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:50Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 19:48:50.984424 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:50Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 19:48:50.984437 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:50Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 19:48:52.383928 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:52Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:48:52.384201 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:52Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:48:52.384307 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:52Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:48:52.384460 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:52Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 19:48:52.384512 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:52Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 19:48:52.384572 /usr/lib/systemd/system-generators/torcx-generator[1778]: time="2024-04-12T19:48:52Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 19:48:53.692091 systemd[1]: Starting systemd-remount-fs.service... Apr 12 19:48:53.708056 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 19:48:53.731439 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 19:48:53.731455 systemd[1]: Stopped verity-setup.service. Apr 12 19:48:53.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.747056 systemd[1]: Started systemd-journald.service. Apr 12 19:48:53.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.751327 systemd[1]: Mounted dev-hugepages.mount. Apr 12 19:48:53.755559 systemd[1]: Mounted dev-mqueue.mount. Apr 12 19:48:53.759646 systemd[1]: Mounted media.mount. Apr 12 19:48:53.763671 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 19:48:53.767643 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 19:48:53.771597 systemd[1]: Mounted tmp.mount. Apr 12 19:48:53.775680 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 19:48:53.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.779788 systemd[1]: Finished kmod-static-nodes.service. Apr 12 19:48:53.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.783791 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 19:48:53.783903 systemd[1]: Finished modprobe@configfs.service. Apr 12 19:48:53.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.787952 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 19:48:53.788156 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 19:48:53.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.791945 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 19:48:53.792176 systemd[1]: Finished modprobe@drm.service. Apr 12 19:48:53.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.795790 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 19:48:53.795946 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 19:48:53.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.799766 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 19:48:53.799914 systemd[1]: Finished modprobe@fuse.service. Apr 12 19:48:53.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.803683 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 19:48:53.803792 systemd[1]: Finished modprobe@loop.service. Apr 12 19:48:53.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.807205 systemd[1]: Finished systemd-modules-load.service. Apr 12 19:48:53.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.810792 systemd[1]: Finished systemd-network-generator.service. Apr 12 19:48:53.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.814188 systemd[1]: Finished systemd-remount-fs.service. Apr 12 19:48:53.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.817583 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 19:48:53.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.821079 systemd[1]: Reached target network-pre.target. Apr 12 19:48:53.825194 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 19:48:53.829496 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 19:48:53.832619 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 19:48:53.834020 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 19:48:53.838069 systemd[1]: Starting systemd-journal-flush.service... Apr 12 19:48:53.841107 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 19:48:53.842203 systemd[1]: Starting systemd-random-seed.service... Apr 12 19:48:53.844088 systemd-journald[1898]: Time spent on flushing to /var/log/journal/a8ae8921091848a3bc4bb6a9f785eb10 is 25.044ms for 2569 entries. Apr 12 19:48:53.844088 systemd-journald[1898]: System Journal (/var/log/journal/a8ae8921091848a3bc4bb6a9f785eb10) is 8.0M, max 195.6M, 187.6M free. Apr 12 19:48:53.876901 systemd-journald[1898]: Received client request to flush runtime journal. Apr 12 19:48:53.855810 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 19:48:53.856897 systemd[1]: Starting systemd-sysctl.service... Apr 12 19:48:53.860956 systemd[1]: Starting systemd-sysusers.service... Apr 12 19:48:53.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.865047 systemd[1]: Starting systemd-udev-settle.service... Apr 12 19:48:53.869342 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 19:48:53.872283 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 19:48:53.875254 systemd[1]: Finished systemd-random-seed.service. Apr 12 19:48:53.878187 systemd[1]: Finished systemd-journal-flush.service. Apr 12 19:48:53.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.880858 systemd[1]: Finished systemd-sysctl.service. Apr 12 19:48:53.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.883459 systemd[1]: Finished systemd-sysusers.service. Apr 12 19:48:53.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:53.887420 systemd[1]: Reached target first-boot-complete.target. Apr 12 19:48:53.890974 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 19:48:53.894910 udevadm[1913]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 19:48:53.908281 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 19:48:53.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:54.172406 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 19:48:54.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:54.175000 audit: BPF prog-id=24 op=LOAD Apr 12 19:48:54.175000 audit: BPF prog-id=25 op=LOAD Apr 12 19:48:54.175000 audit: BPF prog-id=7 op=UNLOAD Apr 12 19:48:54.175000 audit: BPF prog-id=8 op=UNLOAD Apr 12 19:48:54.176422 systemd[1]: Starting systemd-udevd.service... Apr 12 19:48:54.194169 systemd-udevd[1918]: Using default interface naming scheme 'v252'. Apr 12 19:48:54.206705 systemd[1]: Started systemd-udevd.service. Apr 12 19:48:54.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:54.210000 audit: BPF prog-id=26 op=LOAD Apr 12 19:48:54.211090 systemd[1]: Starting systemd-networkd.service... Apr 12 19:48:54.216000 audit: BPF prog-id=27 op=LOAD Apr 12 19:48:54.216000 audit: BPF prog-id=28 op=LOAD Apr 12 19:48:54.216000 audit: BPF prog-id=29 op=LOAD Apr 12 19:48:54.217616 systemd[1]: Starting systemd-userdbd.service... Apr 12 19:48:54.221382 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Apr 12 19:48:54.253057 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1921) Apr 12 19:48:54.253208 kernel: IPMI message handler: version 39.2 Apr 12 19:48:54.258123 systemd[1]: Started systemd-userdbd.service. Apr 12 19:48:54.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:54.251000 audit[1965]: AVC avc: denied { confidentiality } for pid=1965 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 19:48:54.264276 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 19:48:54.251000 audit[1965]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffa934b010 a1=e46d4 a2=ffffab3024b0 a3=aaaaea28b010 items=312 ppid=1918 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:48:54.251000 audit: CWD cwd="/" Apr 12 19:48:54.251000 audit: PATH item=0 name=(null) inode=40 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=1 name=(null) inode=61449 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=2 name=(null) inode=61449 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=3 name=(null) inode=61450 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=4 name=(null) inode=61449 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=5 name=(null) inode=61451 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=6 name=(null) inode=61449 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=7 name=(null) inode=61452 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=8 name=(null) inode=61452 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=9 name=(null) inode=61453 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=10 name=(null) inode=61452 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=11 name=(null) inode=61454 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=12 name=(null) inode=61452 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=13 name=(null) inode=61455 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=14 name=(null) inode=61452 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=15 name=(null) inode=61456 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=16 name=(null) inode=61452 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=17 name=(null) inode=61457 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=18 name=(null) inode=61449 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=19 name=(null) inode=61458 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=20 name=(null) inode=61458 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=21 name=(null) inode=61459 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=22 name=(null) inode=61458 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=23 name=(null) inode=61460 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=24 name=(null) inode=61458 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=25 name=(null) inode=61461 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=26 name=(null) inode=61458 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=27 name=(null) inode=61462 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=28 name=(null) inode=61458 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=29 name=(null) inode=61463 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=30 name=(null) inode=61449 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=31 name=(null) inode=61464 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=32 name=(null) inode=61464 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=33 name=(null) inode=61465 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=34 name=(null) inode=61464 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=35 name=(null) inode=61466 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=36 name=(null) inode=61464 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=37 name=(null) inode=61467 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=38 name=(null) inode=61464 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=39 name=(null) inode=61468 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=40 name=(null) inode=61464 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=41 name=(null) inode=61469 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=42 name=(null) inode=61449 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=43 name=(null) inode=61470 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=44 name=(null) inode=61470 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=45 name=(null) inode=61471 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=46 name=(null) inode=61470 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=47 name=(null) inode=61472 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=48 name=(null) inode=61470 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=49 name=(null) inode=61473 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=50 name=(null) inode=61470 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=51 name=(null) inode=61474 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=52 name=(null) inode=61470 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=53 name=(null) inode=61475 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=54 name=(null) inode=61449 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=55 name=(null) inode=61476 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=56 name=(null) inode=61476 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=57 name=(null) inode=61477 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=58 name=(null) inode=61476 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=59 name=(null) inode=61478 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=60 name=(null) inode=61476 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=61 name=(null) inode=61479 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=62 name=(null) inode=61476 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=63 name=(null) inode=61480 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=64 name=(null) inode=61476 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=65 name=(null) inode=61481 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=66 name=(null) inode=61449 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=67 name=(null) inode=61482 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=68 name=(null) inode=61482 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=69 name=(null) inode=61483 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=70 name=(null) inode=61482 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=71 name=(null) inode=61484 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=72 name=(null) inode=61482 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=73 name=(null) inode=61485 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=74 name=(null) inode=61482 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=75 name=(null) inode=61486 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=76 name=(null) inode=61482 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=77 name=(null) inode=61487 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=78 name=(null) inode=61449 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=79 name=(null) inode=61488 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=80 name=(null) inode=61488 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=81 name=(null) inode=61489 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=82 name=(null) inode=61488 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=83 name=(null) inode=61490 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=84 name=(null) inode=61488 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=85 name=(null) inode=61491 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=86 name=(null) inode=61488 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=87 name=(null) inode=61492 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=88 name=(null) inode=61488 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=89 name=(null) inode=61493 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=90 name=(null) inode=61449 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=91 name=(null) inode=61494 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=92 name=(null) inode=61494 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=93 name=(null) inode=61495 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=94 name=(null) inode=61494 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=95 name=(null) inode=61496 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=96 name=(null) inode=61494 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=97 name=(null) inode=61497 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=98 name=(null) inode=61494 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=99 name=(null) inode=61498 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=100 name=(null) inode=61494 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=101 name=(null) inode=61499 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=102 name=(null) inode=61449 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=103 name=(null) inode=61500 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=104 name=(null) inode=61500 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=105 name=(null) inode=61501 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=106 name=(null) inode=61500 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=107 name=(null) inode=61502 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=108 name=(null) inode=61500 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=109 name=(null) inode=61503 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=110 name=(null) inode=61500 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=111 name=(null) inode=61504 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=112 name=(null) inode=61500 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=113 name=(null) inode=61505 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=114 name=(null) inode=61449 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=115 name=(null) inode=61506 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=116 name=(null) inode=61506 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=117 name=(null) inode=61507 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=118 name=(null) inode=61506 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=119 name=(null) inode=61508 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=120 name=(null) inode=61506 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=121 name=(null) inode=61509 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=122 name=(null) inode=61506 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=123 name=(null) inode=61510 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=124 name=(null) inode=61506 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=125 name=(null) inode=61511 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=126 name=(null) inode=61449 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=127 name=(null) inode=61512 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=128 name=(null) inode=61512 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=129 name=(null) inode=61513 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=130 name=(null) inode=61512 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.271071 kernel: ipmi device interface Apr 12 19:48:54.251000 audit: PATH item=131 name=(null) inode=61514 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=132 name=(null) inode=61512 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=133 name=(null) inode=61515 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=134 name=(null) inode=61512 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=135 name=(null) inode=61516 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=136 name=(null) inode=61512 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=137 name=(null) inode=61517 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=138 name=(null) inode=61449 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=139 name=(null) inode=61518 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=140 name=(null) inode=61518 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=141 name=(null) inode=61519 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=142 name=(null) inode=61518 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=143 name=(null) inode=61520 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=144 name=(null) inode=61518 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=145 name=(null) inode=61521 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=146 name=(null) inode=61518 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=147 name=(null) inode=61522 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=148 name=(null) inode=61518 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=149 name=(null) inode=61523 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=150 name=(null) inode=61449 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=151 name=(null) inode=61524 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=152 name=(null) inode=61524 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=153 name=(null) inode=61525 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=154 name=(null) inode=61524 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=155 name=(null) inode=61526 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=156 name=(null) inode=61524 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=157 name=(null) inode=61527 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=158 name=(null) inode=61524 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=159 name=(null) inode=61528 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=160 name=(null) inode=61524 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=161 name=(null) inode=61529 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=162 name=(null) inode=40 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=163 name=(null) inode=61530 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=164 name=(null) inode=61530 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=165 name=(null) inode=61531 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=166 name=(null) inode=61530 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=167 name=(null) inode=61532 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=168 name=(null) inode=61530 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=169 name=(null) inode=61533 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=170 name=(null) inode=61533 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=171 name=(null) inode=61534 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=172 name=(null) inode=61533 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=173 name=(null) inode=61535 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=174 name=(null) inode=61533 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=175 name=(null) inode=61536 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=176 name=(null) inode=61533 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=177 name=(null) inode=61537 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=178 name=(null) inode=61533 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=179 name=(null) inode=61538 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=180 name=(null) inode=61530 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=181 name=(null) inode=61539 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=182 name=(null) inode=61539 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=183 name=(null) inode=61540 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=184 name=(null) inode=61539 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=185 name=(null) inode=61541 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=186 name=(null) inode=61539 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=187 name=(null) inode=61542 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=188 name=(null) inode=61539 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=189 name=(null) inode=61543 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=190 name=(null) inode=61539 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=191 name=(null) inode=61544 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=192 name=(null) inode=61530 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=193 name=(null) inode=61545 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=194 name=(null) inode=61545 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=195 name=(null) inode=61546 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=196 name=(null) inode=61545 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=197 name=(null) inode=61547 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=198 name=(null) inode=61545 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=199 name=(null) inode=61548 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=200 name=(null) inode=61545 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=201 name=(null) inode=61549 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=202 name=(null) inode=61545 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=203 name=(null) inode=61550 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=204 name=(null) inode=61530 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=205 name=(null) inode=61551 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=206 name=(null) inode=61551 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=207 name=(null) inode=61552 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=208 name=(null) inode=61551 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=209 name=(null) inode=61553 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=210 name=(null) inode=61551 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=211 name=(null) inode=61554 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=212 name=(null) inode=61551 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=213 name=(null) inode=61555 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=214 name=(null) inode=61551 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=215 name=(null) inode=61556 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=216 name=(null) inode=61530 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=217 name=(null) inode=61557 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=218 name=(null) inode=61557 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=219 name=(null) inode=61558 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=220 name=(null) inode=61557 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=221 name=(null) inode=61559 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=222 name=(null) inode=61557 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=223 name=(null) inode=61560 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=224 name=(null) inode=61557 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=225 name=(null) inode=61561 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=226 name=(null) inode=61557 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=227 name=(null) inode=61562 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=228 name=(null) inode=61530 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=229 name=(null) inode=61563 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=230 name=(null) inode=61563 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=231 name=(null) inode=61564 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=232 name=(null) inode=61563 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=233 name=(null) inode=61565 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=234 name=(null) inode=61563 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=235 name=(null) inode=61566 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=236 name=(null) inode=61563 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=237 name=(null) inode=61567 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=238 name=(null) inode=61563 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=239 name=(null) inode=61568 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=240 name=(null) inode=61530 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=241 name=(null) inode=61569 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=242 name=(null) inode=61569 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=243 name=(null) inode=61570 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=244 name=(null) inode=61569 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=245 name=(null) inode=61571 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=246 name=(null) inode=61569 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=247 name=(null) inode=61572 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=248 name=(null) inode=61569 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=249 name=(null) inode=61573 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=250 name=(null) inode=61569 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=251 name=(null) inode=61574 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=252 name=(null) inode=61530 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=253 name=(null) inode=61575 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=254 name=(null) inode=61575 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=255 name=(null) inode=61576 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=256 name=(null) inode=61575 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=257 name=(null) inode=61577 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=258 name=(null) inode=61575 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=259 name=(null) inode=61578 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=260 name=(null) inode=61575 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=261 name=(null) inode=61579 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=262 name=(null) inode=61575 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=263 name=(null) inode=61580 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=264 name=(null) inode=61530 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=265 name=(null) inode=61581 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=266 name=(null) inode=61581 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=267 name=(null) inode=61582 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=268 name=(null) inode=61581 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=269 name=(null) inode=61583 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=270 name=(null) inode=61581 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=271 name=(null) inode=61584 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=272 name=(null) inode=61581 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=273 name=(null) inode=61585 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=274 name=(null) inode=61581 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=275 name=(null) inode=61586 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=276 name=(null) inode=61530 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=277 name=(null) inode=61587 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=278 name=(null) inode=61587 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=279 name=(null) inode=61588 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=280 name=(null) inode=61587 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=281 name=(null) inode=61589 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=282 name=(null) inode=61587 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=283 name=(null) inode=61590 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=284 name=(null) inode=61587 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=285 name=(null) inode=61591 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=286 name=(null) inode=61587 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=287 name=(null) inode=61592 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=288 name=(null) inode=61530 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=289 name=(null) inode=61593 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=290 name=(null) inode=61593 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=291 name=(null) inode=61594 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=292 name=(null) inode=61593 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=293 name=(null) inode=61595 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=294 name=(null) inode=61593 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=295 name=(null) inode=61596 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=296 name=(null) inode=61593 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=297 name=(null) inode=61597 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=298 name=(null) inode=61593 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=299 name=(null) inode=61598 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=300 name=(null) inode=61530 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=301 name=(null) inode=61599 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=302 name=(null) inode=61599 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=303 name=(null) inode=61600 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=304 name=(null) inode=61599 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=305 name=(null) inode=61601 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=306 name=(null) inode=61599 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=307 name=(null) inode=61602 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=308 name=(null) inode=61599 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=309 name=(null) inode=61603 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=310 name=(null) inode=61599 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PATH item=311 name=(null) inode=61604 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:48:54.251000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 19:48:54.281050 kernel: ipmi_ssif: IPMI SSIF Interface driver Apr 12 19:48:54.297225 kernel: ipmi_si: IPMI System Interface driver Apr 12 19:48:54.297239 kernel: ipmi_si: Unable to find any System Interface(s) Apr 12 19:48:54.332656 systemd-networkd[1927]: bond0: netdev ready Apr 12 19:48:54.335889 systemd-networkd[1927]: lo: Link UP Apr 12 19:48:54.335894 systemd-networkd[1927]: lo: Gained carrier Apr 12 19:48:54.340819 systemd-networkd[1927]: Enumeration completed Apr 12 19:48:54.340890 systemd[1]: Started systemd-networkd.service. Apr 12 19:48:54.341249 systemd-networkd[1927]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Apr 12 19:48:54.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:54.348434 systemd-networkd[1927]: enP1p1s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:49:ce:01.network. Apr 12 19:48:54.358361 systemd[1]: Finished systemd-udev-settle.service. Apr 12 19:48:54.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:54.362709 systemd[1]: Starting lvm2-activation-early.service... Apr 12 19:48:54.373824 lvm[2011]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 19:48:54.405759 systemd[1]: Finished lvm2-activation-early.service. Apr 12 19:48:54.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:54.408848 systemd[1]: Reached target cryptsetup.target. Apr 12 19:48:54.412980 systemd[1]: Starting lvm2-activation.service... Apr 12 19:48:54.417973 lvm[2012]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 19:48:54.448772 systemd[1]: Finished lvm2-activation.service. Apr 12 19:48:54.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:54.451839 systemd[1]: Reached target local-fs-pre.target. Apr 12 19:48:54.454859 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 19:48:54.454878 systemd[1]: Reached target local-fs.target. Apr 12 19:48:54.457838 systemd[1]: Reached target machines.target. Apr 12 19:48:54.461968 systemd[1]: Starting ldconfig.service... Apr 12 19:48:54.465134 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 19:48:54.465179 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 19:48:54.466330 systemd[1]: Starting systemd-boot-update.service... Apr 12 19:48:54.470329 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 19:48:54.474540 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 19:48:54.477657 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 19:48:54.477688 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 19:48:54.478890 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 19:48:54.483808 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 19:48:54.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:54.486975 systemd[1]: boot.automount: Got automount request for /boot, triggered by 2014 (bootctl) Apr 12 19:48:54.488136 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 19:48:54.489909 systemd-tmpfiles[2021]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 19:48:54.491307 systemd-tmpfiles[2021]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 19:48:54.492779 systemd-tmpfiles[2021]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 19:48:54.525648 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 19:48:54.526139 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 19:48:54.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:54.536191 systemd-fsck[2027]: fsck.fat 4.2 (2021-01-31) Apr 12 19:48:54.536191 systemd-fsck[2027]: /dev/nvme0n1p1: 236 files, 117047/258078 clusters Apr 12 19:48:54.537569 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 19:48:54.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:54.542104 systemd[1]: Mounting boot.mount... Apr 12 19:48:54.552296 systemd[1]: Mounted boot.mount. Apr 12 19:48:54.563657 systemd[1]: Finished systemd-boot-update.service. Apr 12 19:48:54.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:54.618855 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 19:48:54.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:48:54.623291 systemd[1]: Starting audit-rules.service... Apr 12 19:48:54.627591 systemd[1]: Starting clean-ca-certificates.service... Apr 12 19:48:54.632143 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 19:48:54.636000 audit: BPF prog-id=30 op=LOAD Apr 12 19:48:54.637325 systemd[1]: Starting systemd-resolved.service... Apr 12 19:48:54.641000 audit: BPF prog-id=31 op=LOAD Apr 12 19:48:54.642518 systemd[1]: Starting systemd-timesyncd.service... Apr 12 19:48:54.646958 systemd[1]: Starting systemd-update-utmp.service... Apr 12 19:48:54.650532 systemd[1]: Finished clean-ca-certificates.service. Apr 12 19:48:54.652000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 19:48:54.652000 audit[2050]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc13bf040 a2=420 a3=0 items=0 ppid=2030 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:48:54.652000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 19:48:54.653256 augenrules[2050]: No rules Apr 12 19:48:54.653821 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 19:48:54.656909 systemd[1]: Finished audit-rules.service. Apr 12 19:48:54.661631 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 19:48:54.662495 systemd[1]: Finished systemd-update-utmp.service. Apr 12 19:48:54.662970 ldconfig[2013]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 19:48:54.665720 systemd[1]: Finished ldconfig.service. Apr 12 19:48:54.669923 systemd[1]: Starting systemd-update-done.service... Apr 12 19:48:54.676501 systemd[1]: Finished systemd-update-done.service. Apr 12 19:48:54.698533 systemd[1]: Started systemd-timesyncd.service. Apr 12 19:48:54.700951 systemd-resolved[2042]: Positive Trust Anchors: Apr 12 19:48:54.700959 systemd-resolved[2042]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 19:48:54.700986 systemd-resolved[2042]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 19:48:54.701390 systemd[1]: Reached target time-set.target. Apr 12 19:48:54.704273 systemd-resolved[2042]: Using system hostname 'ci-3510.3.3-a-bd0b40f5b0'. Apr 12 19:48:56.392058 kernel: mlx5_core 0001:01:00.1 enP1p1s0f1np1: Link up Apr 12 19:48:56.408059 kernel: bond0: (slave enP1p1s0f1np1): Enslaving as a backup interface with an up link Apr 12 19:48:56.408512 systemd-networkd[1927]: enP1p1s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:49:ce:00.network. Apr 12 19:48:56.433056 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 19:48:56.553054 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 19:48:56.986055 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 19:48:57.208058 kernel: mlx5_core 0001:01:00.0 enP1p1s0f0np0: Link up Apr 12 19:48:57.224049 kernel: bond0: (slave enP1p1s0f0np0): Enslaving as a backup interface with an up link Apr 12 19:48:57.224112 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Apr 12 19:48:57.234669 systemd-networkd[1927]: bond0: Link UP Apr 12 19:48:57.234984 systemd-networkd[1927]: enP1p1s0f1np1: Link UP Apr 12 19:48:57.235224 systemd-networkd[1927]: enP1p1s0f1np1: Gained carrier Apr 12 19:48:57.235274 systemd[1]: Started systemd-resolved.service. Apr 12 19:48:57.235834 systemd[1]: Reached target network.target. Apr 12 19:48:57.236280 systemd-networkd[1927]: enP1p1s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:49:ce:00.network. Apr 12 19:48:57.238047 kernel: bond0: (slave enP1p1s0f1np1): link status definitely up, 25000 Mbps full duplex Apr 12 19:48:57.238086 kernel: bond0: active interface up! Apr 12 19:48:57.239053 kernel: bond0: (slave enP1p1s0f0np0): link status definitely up, 25000 Mbps full duplex Apr 12 19:48:57.271406 systemd[1]: Reached target nss-lookup.target. Apr 12 19:48:57.275369 systemd[1]: Reached target sysinit.target. Apr 12 19:48:57.279288 systemd[1]: Started motdgen.path. Apr 12 19:48:57.283126 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 19:48:57.287181 systemd[1]: Started logrotate.timer. Apr 12 19:48:57.291205 systemd[1]: Started mdadm.timer. Apr 12 19:48:57.295079 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 19:48:57.298946 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 19:48:57.298971 systemd[1]: Reached target paths.target. Apr 12 19:48:57.302827 systemd[1]: Reached target timers.target. Apr 12 19:48:57.306930 systemd[1]: Listening on dbus.socket. Apr 12 19:48:57.312036 systemd[1]: Starting docker.socket... Apr 12 19:48:57.318465 systemd[1]: Listening on sshd.socket. Apr 12 19:48:57.322435 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 19:48:57.322848 systemd[1]: Listening on docker.socket. Apr 12 19:48:57.327118 systemd[1]: Reached target sockets.target. Apr 12 19:48:57.331181 systemd[1]: Reached target basic.target. Apr 12 19:48:57.334980 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 19:48:57.335001 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 19:48:57.336103 systemd[1]: Starting containerd.service... Apr 12 19:48:57.341251 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 19:48:57.347376 systemd[1]: Starting coreos-metadata.service... Apr 12 19:48:57.359046 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:57.362048 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:57.380874 coreos-metadata[2061]: Apr 12 19:48:57.380 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 19:48:57.383228 coreos-metadata[2061]: Apr 12 19:48:57.383 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Apr 12 19:48:57.385878 coreos-metadata[2064]: Apr 12 19:48:57.385 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 19:48:57.386732 coreos-metadata[2064]: Apr 12 19:48:57.386 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Apr 12 19:48:57.390048 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:57.391687 systemd[1]: Starting dbus.service... Apr 12 19:48:57.405046 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:57.407008 dbus-daemon[2069]: [system] SELinux support is enabled Apr 12 19:48:57.408047 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:57.434045 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:57.434310 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 19:48:57.437046 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:57.439870 jq[2070]: false Apr 12 19:48:57.463045 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:57.464261 systemd[1]: Starting extend-filesystems.service... Apr 12 19:48:57.466045 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:57.468061 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:57.476216 extend-filesystems[2071]: Found nvme0n1 Apr 12 19:48:57.556892 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:57.556932 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 233815889 blocks Apr 12 19:48:57.556975 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:57.557001 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:57.557054 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:57.528796 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 19:48:57.557168 extend-filesystems[2071]: Found nvme0n1p1 Apr 12 19:48:57.557168 extend-filesystems[2071]: Found nvme0n1p2 Apr 12 19:48:57.557168 extend-filesystems[2071]: Found nvme0n1p3 Apr 12 19:48:57.557168 extend-filesystems[2071]: Found usr Apr 12 19:48:57.557168 extend-filesystems[2071]: Found nvme0n1p4 Apr 12 19:48:57.557168 extend-filesystems[2071]: Found nvme0n1p6 Apr 12 19:48:57.557168 extend-filesystems[2071]: Found nvme0n1p7 Apr 12 19:48:57.557168 extend-filesystems[2071]: Found nvme0n1p9 Apr 12 19:48:57.557168 extend-filesystems[2071]: Checking size of /dev/nvme0n1p9 Apr 12 19:48:57.557168 extend-filesystems[2071]: Resized partition /dev/nvme0n1p9 Apr 12 19:48:58.183249 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183310 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183326 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183340 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183353 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183365 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183390 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183403 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183435 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183447 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183460 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183483 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183496 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183511 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183524 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183536 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183549 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183561 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183574 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183587 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183615 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183628 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183674 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183709 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183722 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183752 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183767 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183780 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183793 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183806 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183819 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183831 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183849 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183862 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183875 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183887 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183917 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183930 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183943 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183956 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183968 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.183981 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:57.531002 systemd[1]: Starting motdgen.service... Apr 12 19:48:58.184214 extend-filesystems[2079]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 19:48:58.244780 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.244810 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.244836 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.244850 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:57.586970 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 19:48:58.223456 dbus-daemon[2069]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 19:48:57.644319 systemd[1]: Starting prepare-critools.service... Apr 12 19:48:57.703970 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 19:48:57.777004 systemd[1]: Starting sshd-keygen.service... Apr 12 19:48:57.839443 systemd[1]: Starting systemd-logind.service... Apr 12 19:48:57.896614 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 19:48:58.245752 update_engine[2099]: I0412 19:48:57.932318 2099 main.cc:92] Flatcar Update Engine starting Apr 12 19:48:58.245752 update_engine[2099]: I0412 19:48:57.935950 2099 update_check_scheduler.cc:74] Next update check in 5m3s Apr 12 19:48:57.896806 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 19:48:58.246025 jq[2100]: true Apr 12 19:48:57.897551 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 19:48:57.899060 systemd[1]: Starting update-engine.service... Apr 12 19:48:58.246356 tar[2102]: ./ Apr 12 19:48:58.246356 tar[2102]: ./loopback Apr 12 19:48:58.246356 tar[2102]: ./bandwidth Apr 12 19:48:58.246356 tar[2102]: ./ptp Apr 12 19:48:58.246356 tar[2102]: ./vlan Apr 12 19:48:57.959197 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 19:48:58.246694 tar[2103]: crictl Apr 12 19:48:57.988485 systemd-logind[2098]: Watching system buttons on /dev/input/event0 (Power Button) Apr 12 19:48:58.249732 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.249766 jq[2106]: true Apr 12 19:48:58.017883 systemd-logind[2098]: New seat seat0. Apr 12 19:48:58.019216 systemd[1]: Started dbus.service. Apr 12 19:48:58.083324 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 19:48:58.083563 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 19:48:58.084040 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 19:48:58.084240 systemd[1]: Finished motdgen.service. Apr 12 19:48:58.156243 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 19:48:58.156471 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 19:48:58.227143 systemd[1]: Started systemd-logind.service. Apr 12 19:48:58.256596 bash[2127]: Updated "/home/core/.ssh/authorized_keys" Apr 12 19:48:58.269988 env[2107]: time="2024-04-12T19:48:58.269949040Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 19:48:58.276049 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.276201 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 19:48:58.278047 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.278249 tar[2102]: ./host-device Apr 12 19:48:58.280055 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.285518 env[2107]: time="2024-04-12T19:48:58.285491520Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 19:48:58.285633 env[2107]: time="2024-04-12T19:48:58.285621720Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:48:58.286828 env[2107]: time="2024-04-12T19:48:58.286803920Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 19:48:58.286854 env[2107]: time="2024-04-12T19:48:58.286829880Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:48:58.287031 env[2107]: time="2024-04-12T19:48:58.287014800Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 19:48:58.287059 env[2107]: time="2024-04-12T19:48:58.287032360Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 19:48:58.287059 env[2107]: time="2024-04-12T19:48:58.287049640Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 19:48:58.287096 env[2107]: time="2024-04-12T19:48:58.287060280Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 19:48:58.287145 env[2107]: time="2024-04-12T19:48:58.287133960Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:48:58.287406 env[2107]: time="2024-04-12T19:48:58.287392600Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 19:48:58.287520 env[2107]: time="2024-04-12T19:48:58.287505920Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 19:48:58.287543 env[2107]: time="2024-04-12T19:48:58.287521400Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 19:48:58.287587 env[2107]: time="2024-04-12T19:48:58.287574920Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 19:48:58.287614 env[2107]: time="2024-04-12T19:48:58.287589440Z" level=info msg="metadata content store policy set" policy=shared Apr 12 19:48:58.296632 env[2107]: time="2024-04-12T19:48:58.296615280Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 19:48:58.296655 env[2107]: time="2024-04-12T19:48:58.296640040Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 19:48:58.296675 env[2107]: time="2024-04-12T19:48:58.296653960Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 19:48:58.296695 env[2107]: time="2024-04-12T19:48:58.296679200Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 19:48:58.296722 env[2107]: time="2024-04-12T19:48:58.296694000Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 19:48:58.296722 env[2107]: time="2024-04-12T19:48:58.296707680Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 19:48:58.296758 env[2107]: time="2024-04-12T19:48:58.296721520Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 19:48:58.297006 env[2107]: time="2024-04-12T19:48:58.296994880Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 19:48:58.297027 env[2107]: time="2024-04-12T19:48:58.297011880Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 19:48:58.297049 env[2107]: time="2024-04-12T19:48:58.297031920Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 19:48:58.297069 env[2107]: time="2024-04-12T19:48:58.297051040Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 19:48:58.297114 env[2107]: time="2024-04-12T19:48:58.297065400Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 19:48:58.297203 env[2107]: time="2024-04-12T19:48:58.297191760Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 19:48:58.297316 env[2107]: time="2024-04-12T19:48:58.297305960Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 19:48:58.297550 env[2107]: time="2024-04-12T19:48:58.297538080Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 19:48:58.297570 env[2107]: time="2024-04-12T19:48:58.297562760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 19:48:58.297589 env[2107]: time="2024-04-12T19:48:58.297576200Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 19:48:58.297829 env[2107]: time="2024-04-12T19:48:58.297819680Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 19:48:58.297850 env[2107]: time="2024-04-12T19:48:58.297833120Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 19:48:58.297869 env[2107]: time="2024-04-12T19:48:58.297859840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 19:48:58.297888 env[2107]: time="2024-04-12T19:48:58.297871040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 19:48:58.297888 env[2107]: time="2024-04-12T19:48:58.297882480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 19:48:58.297923 env[2107]: time="2024-04-12T19:48:58.297895280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 19:48:58.297923 env[2107]: time="2024-04-12T19:48:58.297906400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 19:48:58.297923 env[2107]: time="2024-04-12T19:48:58.297917520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 19:48:58.297982 env[2107]: time="2024-04-12T19:48:58.297929600Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 19:48:58.298058 env[2107]: time="2024-04-12T19:48:58.298047040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 19:48:58.298080 env[2107]: time="2024-04-12T19:48:58.298063400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 19:48:58.298080 env[2107]: time="2024-04-12T19:48:58.298075080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 19:48:58.298122 env[2107]: time="2024-04-12T19:48:58.298085480Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 19:48:58.298122 env[2107]: time="2024-04-12T19:48:58.298099600Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 19:48:58.298122 env[2107]: time="2024-04-12T19:48:58.298109720Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 19:48:58.298176 env[2107]: time="2024-04-12T19:48:58.298126800Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 19:48:58.298176 env[2107]: time="2024-04-12T19:48:58.298158080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 19:48:58.298375 env[2107]: time="2024-04-12T19:48:58.298335040Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 19:48:58.299169 env[2107]: time="2024-04-12T19:48:58.298386840Z" level=info msg="Connect containerd service" Apr 12 19:48:58.299169 env[2107]: time="2024-04-12T19:48:58.298416880Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 19:48:58.299169 env[2107]: time="2024-04-12T19:48:58.298968080Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 19:48:58.299250 env[2107]: time="2024-04-12T19:48:58.299199960Z" level=info msg="Start subscribing containerd event" Apr 12 19:48:58.299275 env[2107]: time="2024-04-12T19:48:58.299253400Z" level=info msg="Start recovering state" Apr 12 19:48:58.299339 env[2107]: time="2024-04-12T19:48:58.299328920Z" level=info msg="Start event monitor" Apr 12 19:48:58.299360 env[2107]: time="2024-04-12T19:48:58.299340240Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 19:48:58.299360 env[2107]: time="2024-04-12T19:48:58.299351160Z" level=info msg="Start snapshots syncer" Apr 12 19:48:58.299397 env[2107]: time="2024-04-12T19:48:58.299361360Z" level=info msg="Start cni network conf syncer for default" Apr 12 19:48:58.299397 env[2107]: time="2024-04-12T19:48:58.299370600Z" level=info msg="Start streaming server" Apr 12 19:48:58.299397 env[2107]: time="2024-04-12T19:48:58.299376840Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 19:48:58.299453 env[2107]: time="2024-04-12T19:48:58.299417880Z" level=info msg="containerd successfully booted in 0.030162s" Apr 12 19:48:58.312123 tar[2102]: ./tuning Apr 12 19:48:58.319912 systemd[1]: Started containerd.service. Apr 12 19:48:58.320051 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.323045 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.325047 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.336882 tar[2102]: ./vrf Apr 12 19:48:58.362383 tar[2102]: ./sbr Apr 12 19:48:58.364045 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.368275 systemd[1]: Started update-engine.service. Apr 12 19:48:58.378046 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.381045 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.383543 coreos-metadata[2061]: Apr 12 19:48:58.383 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 19:48:58.383935 coreos-metadata[2061]: Apr 12 19:48:58.383 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Apr 12 19:48:58.386878 coreos-metadata[2064]: Apr 12 19:48:58.386 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 19:48:58.387153 coreos-metadata[2064]: Apr 12 19:48:58.387 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Apr 12 19:48:58.387534 tar[2102]: ./tap Apr 12 19:48:58.408050 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.411479 systemd[1]: Started locksmithd.service. Apr 12 19:48:58.416430 tar[2102]: ./dhcp Apr 12 19:48:58.423049 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.426046 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.452673 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 19:48:58.452798 systemd[1]: Reached target system-config.target. Apr 12 19:48:58.453049 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.455046 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.459573 locksmithd[2140]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 19:48:58.482323 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 19:48:58.482435 systemd[1]: Reached target user-config.target. Apr 12 19:48:58.483051 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.486046 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.487167 tar[2102]: ./static Apr 12 19:48:58.507930 tar[2102]: ./firewall Apr 12 19:48:58.512045 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.527050 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.539350 tar[2102]: ./macvlan Apr 12 19:48:58.541049 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.555049 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.555684 systemd[1]: Finished prepare-critools.service. Apr 12 19:48:58.557048 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.559061 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.567916 tar[2102]: ./dummy Apr 12 19:48:58.596013 tar[2102]: ./bridge Apr 12 19:48:58.597050 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.611047 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.625049 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.626646 tar[2102]: ./ipvlan Apr 12 19:48:58.639050 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.653049 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.654773 tar[2102]: ./portmap Apr 12 19:48:58.676241 kernel: bond0: (slave enP1p1s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 19:48:58.676276 kernel: bond0: (slave enP1p1s0f1np1): invalid new link 1 on slave Apr 12 19:48:58.676401 systemd-networkd[1927]: enP1p1s0f0np0: Link UP Apr 12 19:48:58.676782 systemd-networkd[1927]: bond0: Gained carrier Apr 12 19:48:58.676949 systemd-timesyncd[2045]: Network configuration changed, trying to establish connection. Apr 12 19:48:58.676969 systemd-networkd[1927]: enP1p1s0f0np0: Gained carrier Apr 12 19:48:58.681525 tar[2102]: ./host-local Apr 12 19:48:58.693235 systemd-timesyncd[2045]: Network configuration changed, trying to establish connection. Apr 12 19:48:58.693310 systemd-timesyncd[2045]: Network configuration changed, trying to establish connection. Apr 12 19:48:58.693562 systemd-networkd[1927]: enP1p1s0f1np1: Link DOWN Apr 12 19:48:58.693567 systemd-networkd[1927]: enP1p1s0f1np1: Lost carrier Apr 12 19:48:58.714325 systemd-timesyncd[2045]: Network configuration changed, trying to establish connection. Apr 12 19:48:58.714400 systemd-timesyncd[2045]: Network configuration changed, trying to establish connection. Apr 12 19:48:58.714666 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 19:48:58.714684 systemd-timesyncd[2045]: Network configuration changed, trying to establish connection. Apr 12 19:48:58.816056 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 233815889 Apr 12 19:48:58.830766 extend-filesystems[2079]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Apr 12 19:48:58.830766 extend-filesystems[2079]: old_desc_blocks = 1, new_desc_blocks = 112 Apr 12 19:48:58.830766 extend-filesystems[2079]: The filesystem on /dev/nvme0n1p9 is now 233815889 (4k) blocks long. Apr 12 19:48:58.850212 extend-filesystems[2071]: Resized filesystem in /dev/nvme0n1p9 Apr 12 19:48:58.850212 extend-filesystems[2071]: Found nvme1n1 Apr 12 19:48:58.832021 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 19:48:58.832211 systemd[1]: Finished extend-filesystems.service. Apr 12 19:48:59.553056 kernel: mlx5_core 0001:01:00.1 enP1p1s0f1np1: Link up Apr 12 19:48:59.565052 kernel: bond0: (slave enP1p1s0f1np1): link status up again after 200 ms Apr 12 19:48:59.565087 kernel: bond0: (slave enP1p1s0f1np1): speed changed to 0 on port 1 Apr 12 19:48:59.575046 kernel: bond0: (slave enP1p1s0f1np1): link status up again after 200 ms Apr 12 19:48:59.575754 systemd-networkd[1927]: enP1p1s0f1np1: Link UP Apr 12 19:48:59.575936 systemd-timesyncd[2045]: Network configuration changed, trying to establish connection. Apr 12 19:48:59.576064 systemd-timesyncd[2045]: Network configuration changed, trying to establish connection. Apr 12 19:48:59.576081 systemd-networkd[1927]: enP1p1s0f1np1: Gained carrier Apr 12 19:48:59.599052 kernel: bond0: (slave enP1p1s0f1np1): link status definitely up, 25000 Mbps full duplex Apr 12 19:48:59.604286 systemd-timesyncd[2045]: Network configuration changed, trying to establish connection. Apr 12 19:48:59.604344 systemd-timesyncd[2045]: Network configuration changed, trying to establish connection. Apr 12 19:48:59.604504 systemd-timesyncd[2045]: Network configuration changed, trying to establish connection. Apr 12 19:48:59.679359 sshd_keygen[2097]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 19:48:59.682091 systemd-networkd[1927]: bond0: Gained IPv6LL Apr 12 19:48:59.682260 systemd-timesyncd[2045]: Network configuration changed, trying to establish connection. Apr 12 19:48:59.696553 systemd[1]: Finished sshd-keygen.service. Apr 12 19:48:59.701669 systemd[1]: Starting issuegen.service... Apr 12 19:48:59.708776 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 19:48:59.708920 systemd[1]: Finished issuegen.service. Apr 12 19:48:59.713748 systemd[1]: Starting systemd-user-sessions.service... Apr 12 19:48:59.720485 systemd[1]: Finished systemd-user-sessions.service. Apr 12 19:48:59.725189 systemd[1]: Started getty@tty1.service. Apr 12 19:48:59.729880 systemd[1]: Started serial-getty@ttyAMA0.service. Apr 12 19:48:59.733267 systemd[1]: Reached target getty.target. Apr 12 19:49:00.384070 coreos-metadata[2061]: Apr 12 19:49:00.384 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Apr 12 19:49:00.387285 coreos-metadata[2064]: Apr 12 19:49:00.387 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Apr 12 19:49:00.578429 systemd-timesyncd[2045]: Network configuration changed, trying to establish connection. Apr 12 19:49:00.578627 systemd-timesyncd[2045]: Network configuration changed, trying to establish connection. Apr 12 19:49:01.474055 kernel: mlx5_core 0001:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Apr 12 19:49:04.746527 login[2164]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Apr 12 19:49:04.747962 login[2165]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 19:49:04.760944 systemd-logind[2098]: New session 2 of user core. Apr 12 19:49:04.761996 systemd[1]: Created slice user-500.slice. Apr 12 19:49:04.763209 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 19:49:04.770501 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 19:49:04.771971 systemd[1]: Starting user@500.service... Apr 12 19:49:04.774641 (systemd)[2169]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:49:04.848317 kernel: mlx5_core 0001:01:00.0: modify lag map port 1:2 port 2:2 Apr 12 19:49:04.848584 kernel: mlx5_core 0001:01:00.0: modify lag map port 1:1 port 2:2 Apr 12 19:49:04.861087 systemd[2169]: Queued start job for default target default.target. Apr 12 19:49:04.861557 systemd[2169]: Reached target paths.target. Apr 12 19:49:04.861575 systemd[2169]: Reached target sockets.target. Apr 12 19:49:04.861586 systemd[2169]: Reached target timers.target. Apr 12 19:49:04.861595 systemd[2169]: Reached target basic.target. Apr 12 19:49:04.861633 systemd[2169]: Reached target default.target. Apr 12 19:49:04.861656 systemd[2169]: Startup finished in 82ms. Apr 12 19:49:04.861704 systemd[1]: Started user@500.service. Apr 12 19:49:04.862712 systemd[1]: Started session-2.scope. Apr 12 19:49:05.528218 coreos-metadata[2061]: Apr 12 19:49:05.528 INFO Fetch successful Apr 12 19:49:05.528564 coreos-metadata[2064]: Apr 12 19:49:05.528 INFO Fetch successful Apr 12 19:49:05.566810 systemd[1]: Finished coreos-metadata.service. Apr 12 19:49:05.566960 unknown[2061]: wrote ssh authorized keys file for user: core Apr 12 19:49:05.568350 systemd[1]: Started packet-phone-home.service. Apr 12 19:49:05.574931 curl[2184]: % Total % Received % Xferd Average Speed Time Time Time Current Apr 12 19:49:05.575142 curl[2184]: Dload Upload Total Spent Left Speed Apr 12 19:49:05.578792 systemd[1]: Created slice system-sshd.slice. Apr 12 19:49:05.579915 systemd[1]: Started sshd@0-147.28.162.119:22-139.178.89.65:40418.service. Apr 12 19:49:05.580072 update-ssh-keys[2185]: Updated "/home/core/.ssh/authorized_keys" Apr 12 19:49:05.580495 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 19:49:05.580807 systemd[1]: Reached target multi-user.target. Apr 12 19:49:05.582088 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 19:49:05.588112 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 19:49:05.588258 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 19:49:05.592084 systemd[1]: Startup finished in 3.232s (kernel) + 15.416s (initrd) + 14.939s (userspace) = 33.589s. Apr 12 19:49:05.697419 curl[2184]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Apr 12 19:49:05.699393 systemd[1]: packet-phone-home.service: Deactivated successfully. Apr 12 19:49:05.746960 login[2164]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 19:49:05.749619 systemd-logind[2098]: New session 1 of user core. Apr 12 19:49:05.750558 systemd[1]: Started session-1.scope. Apr 12 19:49:06.026157 sshd[2187]: Accepted publickey for core from 139.178.89.65 port 40418 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:49:06.027364 sshd[2187]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:49:06.029540 systemd-logind[2098]: New session 3 of user core. Apr 12 19:49:06.030499 systemd[1]: Started session-3.scope. Apr 12 19:49:06.421155 systemd[1]: Started sshd@1-147.28.162.119:22-139.178.89.65:40434.service. Apr 12 19:49:06.891358 sshd[2201]: Accepted publickey for core from 139.178.89.65 port 40434 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:49:06.892412 sshd[2201]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:49:06.894643 systemd-logind[2098]: New session 4 of user core. Apr 12 19:49:06.895606 systemd[1]: Started session-4.scope. Apr 12 19:49:07.229235 sshd[2201]: pam_unix(sshd:session): session closed for user core Apr 12 19:49:07.231730 systemd[1]: sshd@1-147.28.162.119:22-139.178.89.65:40434.service: Deactivated successfully. Apr 12 19:49:07.232432 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 19:49:07.232878 systemd-logind[2098]: Session 4 logged out. Waiting for processes to exit. Apr 12 19:49:07.233372 systemd-logind[2098]: Removed session 4. Apr 12 19:49:07.304488 systemd[1]: Started sshd@2-147.28.162.119:22-139.178.89.65:40450.service. Apr 12 19:49:07.767412 sshd[2207]: Accepted publickey for core from 139.178.89.65 port 40450 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:49:07.768504 sshd[2207]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:49:07.770710 systemd-logind[2098]: New session 5 of user core. Apr 12 19:49:07.771649 systemd[1]: Started session-5.scope. Apr 12 19:49:08.100339 sshd[2207]: pam_unix(sshd:session): session closed for user core Apr 12 19:49:08.102815 systemd[1]: sshd@2-147.28.162.119:22-139.178.89.65:40450.service: Deactivated successfully. Apr 12 19:49:08.103491 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 19:49:08.103941 systemd-logind[2098]: Session 5 logged out. Waiting for processes to exit. Apr 12 19:49:08.104459 systemd-logind[2098]: Removed session 5. Apr 12 19:49:08.178399 systemd[1]: Started sshd@3-147.28.162.119:22-139.178.89.65:56262.service. Apr 12 19:49:08.640102 sshd[2213]: Accepted publickey for core from 139.178.89.65 port 56262 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:49:08.641176 sshd[2213]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:49:08.643374 systemd-logind[2098]: New session 6 of user core. Apr 12 19:49:08.644362 systemd[1]: Started session-6.scope. Apr 12 19:49:08.981082 sshd[2213]: pam_unix(sshd:session): session closed for user core Apr 12 19:49:08.983704 systemd[1]: sshd@3-147.28.162.119:22-139.178.89.65:56262.service: Deactivated successfully. Apr 12 19:49:08.984376 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 19:49:08.984825 systemd-logind[2098]: Session 6 logged out. Waiting for processes to exit. Apr 12 19:49:08.985333 systemd-logind[2098]: Removed session 6. Apr 12 19:49:09.054780 systemd[1]: Started sshd@4-147.28.162.119:22-139.178.89.65:56278.service. Apr 12 19:49:09.515113 sshd[2219]: Accepted publickey for core from 139.178.89.65 port 56278 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:49:09.516185 sshd[2219]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:49:09.518336 systemd-logind[2098]: New session 7 of user core. Apr 12 19:49:09.519256 systemd[1]: Started session-7.scope. Apr 12 19:49:09.790136 sudo[2222]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 19:49:09.790326 sudo[2222]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:49:09.807233 dbus-daemon[2069]: avc: received setenforce notice (enforcing=1) Apr 12 19:49:09.809063 sudo[2222]: pam_unix(sudo:session): session closed for user root Apr 12 19:49:09.885166 sshd[2219]: pam_unix(sshd:session): session closed for user core Apr 12 19:49:09.887539 systemd[1]: sshd@4-147.28.162.119:22-139.178.89.65:56278.service: Deactivated successfully. Apr 12 19:49:09.888263 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 19:49:09.888693 systemd-logind[2098]: Session 7 logged out. Waiting for processes to exit. Apr 12 19:49:09.889203 systemd-logind[2098]: Removed session 7. Apr 12 19:49:09.956523 systemd[1]: Started sshd@5-147.28.162.119:22-139.178.89.65:56290.service. Apr 12 19:49:10.412310 sshd[2226]: Accepted publickey for core from 139.178.89.65 port 56290 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:49:10.413421 sshd[2226]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:49:10.415672 systemd-logind[2098]: New session 8 of user core. Apr 12 19:49:10.416603 systemd[1]: Started session-8.scope. Apr 12 19:49:10.671543 sudo[2230]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 19:49:10.671740 sudo[2230]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:49:10.673606 sudo[2230]: pam_unix(sudo:session): session closed for user root Apr 12 19:49:10.677547 sudo[2229]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 19:49:10.677727 sudo[2229]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:49:10.684698 systemd[1]: Stopping audit-rules.service... Apr 12 19:49:10.685000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 19:49:10.685969 auditctl[2233]: No rules Apr 12 19:49:10.686112 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 19:49:10.686260 systemd[1]: Stopped audit-rules.service. Apr 12 19:49:10.687834 systemd[1]: Starting audit-rules.service... Apr 12 19:49:10.691237 kernel: kauditd_printk_skb: 390 callbacks suppressed Apr 12 19:49:10.691406 kernel: audit: type=1305 audit(1712951350.685:173): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 19:49:10.702962 augenrules[2250]: No rules Apr 12 19:49:10.703526 systemd[1]: Finished audit-rules.service. Apr 12 19:49:10.704213 sudo[2229]: pam_unix(sudo:session): session closed for user root Apr 12 19:49:10.685000 audit[2233]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe7479450 a2=420 a3=0 items=0 ppid=1 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:10.736840 kernel: audit: type=1300 audit(1712951350.685:173): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe7479450 a2=420 a3=0 items=0 ppid=1 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:10.736897 kernel: audit: type=1327 audit(1712951350.685:173): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 19:49:10.685000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 19:49:10.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:10.768089 kernel: audit: type=1131 audit(1712951350.686:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:10.768116 kernel: audit: type=1130 audit(1712951350.703:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:10.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:10.775917 sshd[2226]: pam_unix(sshd:session): session closed for user core Apr 12 19:49:10.777865 systemd[1]: sshd@5-147.28.162.119:22-139.178.89.65:56290.service: Deactivated successfully. Apr 12 19:49:10.778478 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 19:49:10.778883 systemd-logind[2098]: Session 8 logged out. Waiting for processes to exit. Apr 12 19:49:10.779307 systemd-logind[2098]: Removed session 8. Apr 12 19:49:10.704000 audit[2229]: USER_END pid=2229 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:49:10.815407 kernel: audit: type=1106 audit(1712951350.704:176): pid=2229 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:49:10.815441 kernel: audit: type=1104 audit(1712951350.704:177): pid=2229 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:49:10.704000 audit[2229]: CRED_DISP pid=2229 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:49:10.776000 audit[2226]: USER_END pid=2226 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:10.856097 systemd[1]: Started sshd@6-147.28.162.119:22-139.178.89.65:56294.service. Apr 12 19:49:10.893654 kernel: audit: type=1106 audit(1712951350.776:178): pid=2226 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:10.893728 kernel: audit: type=1104 audit(1712951350.776:179): pid=2226 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:10.776000 audit[2226]: CRED_DISP pid=2226 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:10.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-147.28.162.119:22-139.178.89.65:56290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:10.974393 kernel: audit: type=1131 audit(1712951350.778:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-147.28.162.119:22-139.178.89.65:56290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:10.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.28.162.119:22-139.178.89.65:56294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:11.318000 audit[2256]: USER_ACCT pid=2256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:11.318254 sshd[2256]: Accepted publickey for core from 139.178.89.65 port 56294 ssh2: RSA SHA256:75LdsdS056oj4EZzFO8D7QLzqafpee+hz4LDxceu6MQ Apr 12 19:49:11.318000 audit[2256]: CRED_ACQ pid=2256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:11.318000 audit[2256]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc904dca0 a2=3 a3=1 items=0 ppid=1 pid=2256 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:11.318000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 19:49:11.319162 sshd[2256]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 19:49:11.321387 systemd-logind[2098]: New session 9 of user core. Apr 12 19:49:11.322314 systemd[1]: Started session-9.scope. Apr 12 19:49:11.324000 audit[2256]: USER_START pid=2256 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:11.325000 audit[2258]: CRED_ACQ pid=2258 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:11.581000 audit[2259]: USER_ACCT pid=2259 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:49:11.581270 sudo[2259]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 19:49:11.581000 audit[2259]: CRED_REFR pid=2259 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:49:11.581476 sudo[2259]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 19:49:11.582000 audit[2259]: USER_START pid=2259 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:49:12.231535 systemd[1]: Reloading. Apr 12 19:49:12.266823 /usr/lib/systemd/system-generators/torcx-generator[2291]: time="2024-04-12T19:49:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 19:49:12.266846 /usr/lib/systemd/system-generators/torcx-generator[2291]: time="2024-04-12T19:49:12Z" level=info msg="torcx already run" Apr 12 19:49:12.336721 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 19:49:12.336734 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 19:49:12.353081 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 19:49:12.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.409000 audit: BPF prog-id=37 op=LOAD Apr 12 19:49:12.409000 audit: BPF prog-id=31 op=UNLOAD Apr 12 19:49:12.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit: BPF prog-id=38 op=LOAD Apr 12 19:49:12.411000 audit: BPF prog-id=27 op=UNLOAD Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit: BPF prog-id=39 op=LOAD Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit: BPF prog-id=40 op=LOAD Apr 12 19:49:12.411000 audit: BPF prog-id=28 op=UNLOAD Apr 12 19:49:12.411000 audit: BPF prog-id=29 op=UNLOAD Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit: BPF prog-id=41 op=LOAD Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.412000 audit: BPF prog-id=42 op=LOAD Apr 12 19:49:12.412000 audit: BPF prog-id=24 op=UNLOAD Apr 12 19:49:12.412000 audit: BPF prog-id=25 op=UNLOAD Apr 12 19:49:12.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.413000 audit: BPF prog-id=43 op=LOAD Apr 12 19:49:12.413000 audit: BPF prog-id=32 op=UNLOAD Apr 12 19:49:12.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.413000 audit: BPF prog-id=44 op=LOAD Apr 12 19:49:12.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.413000 audit: BPF prog-id=45 op=LOAD Apr 12 19:49:12.413000 audit: BPF prog-id=33 op=UNLOAD Apr 12 19:49:12.413000 audit: BPF prog-id=34 op=UNLOAD Apr 12 19:49:12.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.414000 audit: BPF prog-id=46 op=LOAD Apr 12 19:49:12.414000 audit: BPF prog-id=30 op=UNLOAD Apr 12 19:49:12.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.414000 audit: BPF prog-id=47 op=LOAD Apr 12 19:49:12.414000 audit: BPF prog-id=35 op=UNLOAD Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit: BPF prog-id=48 op=LOAD Apr 12 19:49:12.415000 audit: BPF prog-id=21 op=UNLOAD Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit: BPF prog-id=49 op=LOAD Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.416000 audit: BPF prog-id=50 op=LOAD Apr 12 19:49:12.416000 audit: BPF prog-id=22 op=UNLOAD Apr 12 19:49:12.416000 audit: BPF prog-id=23 op=UNLOAD Apr 12 19:49:12.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.418000 audit: BPF prog-id=51 op=LOAD Apr 12 19:49:12.418000 audit: BPF prog-id=26 op=UNLOAD Apr 12 19:49:12.425589 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 19:49:12.431280 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 19:49:12.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:12.431662 systemd[1]: Reached target network-online.target. Apr 12 19:49:12.433068 systemd[1]: Started kubelet.service. Apr 12 19:49:12.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:12.494517 kubelet[2346]: E0412 19:49:12.494444 2346 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 19:49:12.496357 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 19:49:12.496472 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 19:49:12.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 19:49:12.665172 systemd[1]: Stopped kubelet.service. Apr 12 19:49:12.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:12.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:12.676920 systemd[1]: Reloading. Apr 12 19:49:12.708345 /usr/lib/systemd/system-generators/torcx-generator[2457]: time="2024-04-12T19:49:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 19:49:12.708368 /usr/lib/systemd/system-generators/torcx-generator[2457]: time="2024-04-12T19:49:12Z" level=info msg="torcx already run" Apr 12 19:49:12.777515 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 19:49:12.777527 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 19:49:12.793871 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 19:49:12.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.850000 audit: BPF prog-id=52 op=LOAD Apr 12 19:49:12.850000 audit: BPF prog-id=37 op=UNLOAD Apr 12 19:49:12.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.851000 audit: BPF prog-id=53 op=LOAD Apr 12 19:49:12.851000 audit: BPF prog-id=38 op=UNLOAD Apr 12 19:49:12.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit: BPF prog-id=54 op=LOAD Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit: BPF prog-id=55 op=LOAD Apr 12 19:49:12.852000 audit: BPF prog-id=39 op=UNLOAD Apr 12 19:49:12.852000 audit: BPF prog-id=40 op=UNLOAD Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit: BPF prog-id=56 op=LOAD Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.852000 audit: BPF prog-id=57 op=LOAD Apr 12 19:49:12.852000 audit: BPF prog-id=41 op=UNLOAD Apr 12 19:49:12.852000 audit: BPF prog-id=42 op=UNLOAD Apr 12 19:49:12.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit: BPF prog-id=58 op=LOAD Apr 12 19:49:12.854000 audit: BPF prog-id=43 op=UNLOAD Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit: BPF prog-id=59 op=LOAD Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit: BPF prog-id=60 op=LOAD Apr 12 19:49:12.854000 audit: BPF prog-id=44 op=UNLOAD Apr 12 19:49:12.854000 audit: BPF prog-id=45 op=UNLOAD Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.855000 audit: BPF prog-id=61 op=LOAD Apr 12 19:49:12.855000 audit: BPF prog-id=46 op=UNLOAD Apr 12 19:49:12.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.855000 audit: BPF prog-id=62 op=LOAD Apr 12 19:49:12.855000 audit: BPF prog-id=47 op=UNLOAD Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit: BPF prog-id=63 op=LOAD Apr 12 19:49:12.856000 audit: BPF prog-id=48 op=UNLOAD Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit: BPF prog-id=64 op=LOAD Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.856000 audit: BPF prog-id=65 op=LOAD Apr 12 19:49:12.856000 audit: BPF prog-id=49 op=UNLOAD Apr 12 19:49:12.856000 audit: BPF prog-id=50 op=UNLOAD Apr 12 19:49:12.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:12.859000 audit: BPF prog-id=66 op=LOAD Apr 12 19:49:12.859000 audit: BPF prog-id=51 op=UNLOAD Apr 12 19:49:12.869818 systemd[1]: Started kubelet.service. Apr 12 19:49:12.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:12.902493 kubelet[2512]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 19:49:12.902493 kubelet[2512]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 19:49:12.902493 kubelet[2512]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 19:49:12.902808 kubelet[2512]: I0412 19:49:12.902538 2512 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 19:49:13.526688 kubelet[2512]: I0412 19:49:13.526661 2512 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Apr 12 19:49:13.526688 kubelet[2512]: I0412 19:49:13.526687 2512 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 19:49:13.526857 kubelet[2512]: I0412 19:49:13.526848 2512 server.go:919] "Client rotation is on, will bootstrap in background" Apr 12 19:49:13.531221 kubelet[2512]: I0412 19:49:13.531201 2512 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 19:49:13.551637 kubelet[2512]: I0412 19:49:13.551613 2512 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 19:49:13.551813 kubelet[2512]: I0412 19:49:13.551803 2512 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 19:49:13.551960 kubelet[2512]: I0412 19:49:13.551948 2512 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 19:49:13.552036 kubelet[2512]: I0412 19:49:13.551966 2512 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 19:49:13.552036 kubelet[2512]: I0412 19:49:13.551975 2512 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 19:49:13.552088 kubelet[2512]: I0412 19:49:13.552074 2512 state_mem.go:36] "Initialized new in-memory state store" Apr 12 19:49:13.552414 kubelet[2512]: I0412 19:49:13.552406 2512 kubelet.go:396] "Attempting to sync node with API server" Apr 12 19:49:13.552436 kubelet[2512]: I0412 19:49:13.552421 2512 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 19:49:13.552455 kubelet[2512]: I0412 19:49:13.552442 2512 kubelet.go:312] "Adding apiserver pod source" Apr 12 19:49:13.552455 kubelet[2512]: I0412 19:49:13.552454 2512 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 19:49:13.552549 kubelet[2512]: E0412 19:49:13.552527 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:13.552574 kubelet[2512]: E0412 19:49:13.552560 2512 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:13.553117 kubelet[2512]: I0412 19:49:13.553105 2512 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 19:49:13.553535 kubelet[2512]: I0412 19:49:13.553525 2512 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Apr 12 19:49:13.553632 kubelet[2512]: W0412 19:49:13.553625 2512 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 19:49:13.554311 kubelet[2512]: I0412 19:49:13.554300 2512 server.go:1256] "Started kubelet" Apr 12 19:49:13.554530 kubelet[2512]: I0412 19:49:13.554516 2512 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Apr 12 19:49:13.554551 kubelet[2512]: I0412 19:49:13.554518 2512 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 19:49:13.554768 kubelet[2512]: I0412 19:49:13.554741 2512 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 19:49:13.555000 audit[2512]: AVC avc: denied { mac_admin } for pid=2512 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:13.555000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:49:13.555000 audit[2512]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d92c30 a1=4000a128d0 a2=4000d92c00 a3=25 items=0 ppid=1 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:13.555000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:49:13.555000 audit[2512]: AVC avc: denied { mac_admin } for pid=2512 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:13.555000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:49:13.555000 audit[2512]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000506fe0 a1=4000a128e8 a2=4000d92cc0 a3=25 items=0 ppid=1 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:13.555000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:49:13.555367 kubelet[2512]: I0412 19:49:13.555117 2512 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 19:49:13.555367 kubelet[2512]: I0412 19:49:13.555148 2512 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 19:49:13.555367 kubelet[2512]: I0412 19:49:13.555210 2512 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 19:49:13.555367 kubelet[2512]: I0412 19:49:13.555284 2512 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 19:49:13.555367 kubelet[2512]: I0412 19:49:13.555318 2512 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 19:49:13.555460 kubelet[2512]: I0412 19:49:13.555377 2512 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 19:49:13.556116 kubelet[2512]: E0412 19:49:13.556103 2512 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 19:49:13.556492 kubelet[2512]: I0412 19:49:13.556476 2512 server.go:461] "Adding debug handlers to kubelet server" Apr 12 19:49:13.556779 kubelet[2512]: I0412 19:49:13.556766 2512 factory.go:221] Registration of the containerd container factory successfully Apr 12 19:49:13.556800 kubelet[2512]: I0412 19:49:13.556781 2512 factory.go:221] Registration of the systemd container factory successfully Apr 12 19:49:13.557713 kubelet[2512]: I0412 19:49:13.557635 2512 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Apr 12 19:49:13.562858 kubelet[2512]: E0412 19:49:13.562840 2512 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.26.37.141\" not found" node="10.26.37.141" Apr 12 19:49:13.567997 kubelet[2512]: I0412 19:49:13.567980 2512 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 19:49:13.567997 kubelet[2512]: I0412 19:49:13.567997 2512 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 19:49:13.568118 kubelet[2512]: I0412 19:49:13.568014 2512 state_mem.go:36] "Initialized new in-memory state store" Apr 12 19:49:13.568656 kubelet[2512]: I0412 19:49:13.568643 2512 policy_none.go:49] "None policy: Start" Apr 12 19:49:13.569062 kubelet[2512]: I0412 19:49:13.569050 2512 memory_manager.go:170] "Starting memorymanager" policy="None" Apr 12 19:49:13.569090 kubelet[2512]: I0412 19:49:13.569086 2512 state_mem.go:35] "Initializing new in-memory state store" Apr 12 19:49:13.572426 systemd[1]: Created slice kubepods.slice. Apr 12 19:49:13.575828 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 19:49:13.576000 audit[2541]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2541 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:13.576000 audit[2541]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcbd45890 a2=0 a3=1 items=0 ppid=2512 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:13.576000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 19:49:13.577000 audit[2544]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2544 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:13.577000 audit[2544]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffd0bcd2b0 a2=0 a3=1 items=0 ppid=2512 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:13.577000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 19:49:13.578118 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 19:49:13.591689 kubelet[2512]: I0412 19:49:13.591672 2512 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 19:49:13.591000 audit[2512]: AVC avc: denied { mac_admin } for pid=2512 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:13.591000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 19:49:13.591000 audit[2512]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40018a4a20 a1=4000e409a8 a2=40018a49f0 a3=25 items=0 ppid=1 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:13.591000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 19:49:13.591826 kubelet[2512]: I0412 19:49:13.591732 2512 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 19:49:13.591907 kubelet[2512]: I0412 19:49:13.591897 2512 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 19:49:13.592577 kubelet[2512]: E0412 19:49:13.592564 2512 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.26.37.141\" not found" Apr 12 19:49:13.579000 audit[2546]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2546 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:13.579000 audit[2546]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc7d1c120 a2=0 a3=1 items=0 ppid=2512 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:13.579000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:49:13.602000 audit[2551]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2551 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:13.602000 audit[2551]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdbf31540 a2=0 a3=1 items=0 ppid=2512 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:13.602000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:49:13.632000 audit[2556]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2556 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:13.632000 audit[2556]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffe9922890 a2=0 a3=1 items=0 ppid=2512 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:13.632000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 19:49:13.632405 kubelet[2512]: I0412 19:49:13.632389 2512 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 19:49:13.633000 audit[2557]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2557 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:13.633000 audit[2557]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffec85ac60 a2=0 a3=1 items=0 ppid=2512 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:13.633000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 19:49:13.633000 audit[2558]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2558 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:13.633000 audit[2558]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdc5df990 a2=0 a3=1 items=0 ppid=2512 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:13.633000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 19:49:13.633327 kubelet[2512]: I0412 19:49:13.633263 2512 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 19:49:13.633327 kubelet[2512]: I0412 19:49:13.633278 2512 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 19:49:13.633327 kubelet[2512]: I0412 19:49:13.633296 2512 kubelet.go:2329] "Starting kubelet main sync loop" Apr 12 19:49:13.633382 kubelet[2512]: E0412 19:49:13.633331 2512 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Apr 12 19:49:13.634000 audit[2560]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=2560 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:13.634000 audit[2560]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffffabb8a0 a2=0 a3=1 items=0 ppid=2512 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:13.634000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 19:49:13.634000 audit[2559]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=2559 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:13.634000 audit[2559]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd8e09a00 a2=0 a3=1 items=0 ppid=2512 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:13.634000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 19:49:13.634000 audit[2561]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=2561 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:13.634000 audit[2561]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff90054c0 a2=0 a3=1 items=0 ppid=2512 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:13.634000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 19:49:13.634000 audit[2562]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=2562 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:13.634000 audit[2562]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd9b760f0 a2=0 a3=1 items=0 ppid=2512 pid=2562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:13.634000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 19:49:13.635000 audit[2563]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2563 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:13.635000 audit[2563]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcca97d20 a2=0 a3=1 items=0 ppid=2512 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:13.635000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 19:49:13.656511 kubelet[2512]: I0412 19:49:13.656493 2512 kubelet_node_status.go:73] "Attempting to register node" node="10.26.37.141" Apr 12 19:49:13.659203 kubelet[2512]: I0412 19:49:13.659186 2512 kubelet_node_status.go:76] "Successfully registered node" node="10.26.37.141" Apr 12 19:49:13.664266 kubelet[2512]: I0412 19:49:13.664250 2512 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Apr 12 19:49:13.664494 env[2107]: time="2024-04-12T19:49:13.664463480Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 19:49:13.664680 kubelet[2512]: I0412 19:49:13.664605 2512 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Apr 12 19:49:14.389473 sudo[2259]: pam_unix(sudo:session): session closed for user root Apr 12 19:49:14.389000 audit[2259]: USER_END pid=2259 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:49:14.389000 audit[2259]: CRED_DISP pid=2259 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 19:49:14.462503 sshd[2256]: pam_unix(sshd:session): session closed for user core Apr 12 19:49:14.462000 audit[2256]: USER_END pid=2256 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:14.463000 audit[2256]: CRED_DISP pid=2256 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 19:49:14.464533 systemd[1]: sshd@6-147.28.162.119:22-139.178.89.65:56294.service: Deactivated successfully. Apr 12 19:49:14.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.28.162.119:22-139.178.89.65:56294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 19:49:14.465209 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 19:49:14.465664 systemd-logind[2098]: Session 9 logged out. Waiting for processes to exit. Apr 12 19:49:14.466161 systemd-logind[2098]: Removed session 9. Apr 12 19:49:14.528944 kubelet[2512]: I0412 19:49:14.528899 2512 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Apr 12 19:49:14.529345 kubelet[2512]: W0412 19:49:14.529124 2512 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Apr 12 19:49:14.529345 kubelet[2512]: W0412 19:49:14.529148 2512 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.Service ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Apr 12 19:49:14.529345 kubelet[2512]: W0412 19:49:14.529170 2512 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.CSIDriver ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Apr 12 19:49:14.553106 kubelet[2512]: I0412 19:49:14.553077 2512 apiserver.go:52] "Watching apiserver" Apr 12 19:49:14.553166 kubelet[2512]: E0412 19:49:14.553116 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:14.555150 kubelet[2512]: I0412 19:49:14.555133 2512 topology_manager.go:215] "Topology Admit Handler" podUID="0e039361-94a7-4001-aace-e17f9e7f2cf7" podNamespace="kube-system" podName="kube-proxy-lvkc9" Apr 12 19:49:14.555209 kubelet[2512]: I0412 19:49:14.555200 2512 topology_manager.go:215] "Topology Admit Handler" podUID="5a018bc1-6d93-4e53-9375-8c24efe6f832" podNamespace="calico-system" podName="calico-node-6wlxb" Apr 12 19:49:14.555468 kubelet[2512]: I0412 19:49:14.555448 2512 topology_manager.go:215] "Topology Admit Handler" podUID="dad67a8f-5bcf-45e8-a1e7-0affbec778a5" podNamespace="calico-system" podName="csi-node-driver-xghtm" Apr 12 19:49:14.555624 kubelet[2512]: E0412 19:49:14.555613 2512 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xghtm" podUID="dad67a8f-5bcf-45e8-a1e7-0affbec778a5" Apr 12 19:49:14.560756 systemd[1]: Created slice kubepods-besteffort-pod0e039361_94a7_4001_aace_e17f9e7f2cf7.slice. Apr 12 19:49:14.561159 kubelet[2512]: I0412 19:49:14.561139 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-76gxl\" (UniqueName: \"kubernetes.io/projected/0e039361-94a7-4001-aace-e17f9e7f2cf7-kube-api-access-76gxl\") pod \"kube-proxy-lvkc9\" (UID: \"0e039361-94a7-4001-aace-e17f9e7f2cf7\") " pod="kube-system/kube-proxy-lvkc9" Apr 12 19:49:14.561197 kubelet[2512]: I0412 19:49:14.561176 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5a018bc1-6d93-4e53-9375-8c24efe6f832-tigera-ca-bundle\") pod \"calico-node-6wlxb\" (UID: \"5a018bc1-6d93-4e53-9375-8c24efe6f832\") " pod="calico-system/calico-node-6wlxb" Apr 12 19:49:14.561220 kubelet[2512]: I0412 19:49:14.561200 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/5a018bc1-6d93-4e53-9375-8c24efe6f832-cni-net-dir\") pod \"calico-node-6wlxb\" (UID: \"5a018bc1-6d93-4e53-9375-8c24efe6f832\") " pod="calico-system/calico-node-6wlxb" Apr 12 19:49:14.561266 kubelet[2512]: I0412 19:49:14.561250 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/dad67a8f-5bcf-45e8-a1e7-0affbec778a5-kubelet-dir\") pod \"csi-node-driver-xghtm\" (UID: \"dad67a8f-5bcf-45e8-a1e7-0affbec778a5\") " pod="calico-system/csi-node-driver-xghtm" Apr 12 19:49:14.561329 kubelet[2512]: I0412 19:49:14.561312 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ffcv6\" (UniqueName: \"kubernetes.io/projected/5a018bc1-6d93-4e53-9375-8c24efe6f832-kube-api-access-ffcv6\") pod \"calico-node-6wlxb\" (UID: \"5a018bc1-6d93-4e53-9375-8c24efe6f832\") " pod="calico-system/calico-node-6wlxb" Apr 12 19:49:14.561356 kubelet[2512]: I0412 19:49:14.561347 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0e039361-94a7-4001-aace-e17f9e7f2cf7-lib-modules\") pod \"kube-proxy-lvkc9\" (UID: \"0e039361-94a7-4001-aace-e17f9e7f2cf7\") " pod="kube-system/kube-proxy-lvkc9" Apr 12 19:49:14.561393 kubelet[2512]: I0412 19:49:14.561380 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5a018bc1-6d93-4e53-9375-8c24efe6f832-lib-modules\") pod \"calico-node-6wlxb\" (UID: \"5a018bc1-6d93-4e53-9375-8c24efe6f832\") " pod="calico-system/calico-node-6wlxb" Apr 12 19:49:14.561417 kubelet[2512]: I0412 19:49:14.561402 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/5a018bc1-6d93-4e53-9375-8c24efe6f832-var-run-calico\") pod \"calico-node-6wlxb\" (UID: \"5a018bc1-6d93-4e53-9375-8c24efe6f832\") " pod="calico-system/calico-node-6wlxb" Apr 12 19:49:14.561439 kubelet[2512]: I0412 19:49:14.561423 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/5a018bc1-6d93-4e53-9375-8c24efe6f832-cni-bin-dir\") pod \"calico-node-6wlxb\" (UID: \"5a018bc1-6d93-4e53-9375-8c24efe6f832\") " pod="calico-system/calico-node-6wlxb" Apr 12 19:49:14.561465 kubelet[2512]: I0412 19:49:14.561458 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/5a018bc1-6d93-4e53-9375-8c24efe6f832-cni-log-dir\") pod \"calico-node-6wlxb\" (UID: \"5a018bc1-6d93-4e53-9375-8c24efe6f832\") " pod="calico-system/calico-node-6wlxb" Apr 12 19:49:14.561508 kubelet[2512]: I0412 19:49:14.561498 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/dad67a8f-5bcf-45e8-a1e7-0affbec778a5-registration-dir\") pod \"csi-node-driver-xghtm\" (UID: \"dad67a8f-5bcf-45e8-a1e7-0affbec778a5\") " pod="calico-system/csi-node-driver-xghtm" Apr 12 19:49:14.561573 kubelet[2512]: I0412 19:49:14.561556 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j8whx\" (UniqueName: \"kubernetes.io/projected/dad67a8f-5bcf-45e8-a1e7-0affbec778a5-kube-api-access-j8whx\") pod \"csi-node-driver-xghtm\" (UID: \"dad67a8f-5bcf-45e8-a1e7-0affbec778a5\") " pod="calico-system/csi-node-driver-xghtm" Apr 12 19:49:14.561633 kubelet[2512]: I0412 19:49:14.561620 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/0e039361-94a7-4001-aace-e17f9e7f2cf7-kube-proxy\") pod \"kube-proxy-lvkc9\" (UID: \"0e039361-94a7-4001-aace-e17f9e7f2cf7\") " pod="kube-system/kube-proxy-lvkc9" Apr 12 19:49:14.561658 kubelet[2512]: I0412 19:49:14.561652 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/5a018bc1-6d93-4e53-9375-8c24efe6f832-policysync\") pod \"calico-node-6wlxb\" (UID: \"5a018bc1-6d93-4e53-9375-8c24efe6f832\") " pod="calico-system/calico-node-6wlxb" Apr 12 19:49:14.561731 kubelet[2512]: I0412 19:49:14.561714 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/5a018bc1-6d93-4e53-9375-8c24efe6f832-node-certs\") pod \"calico-node-6wlxb\" (UID: \"5a018bc1-6d93-4e53-9375-8c24efe6f832\") " pod="calico-system/calico-node-6wlxb" Apr 12 19:49:14.561761 kubelet[2512]: I0412 19:49:14.561754 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5a018bc1-6d93-4e53-9375-8c24efe6f832-var-lib-calico\") pod \"calico-node-6wlxb\" (UID: \"5a018bc1-6d93-4e53-9375-8c24efe6f832\") " pod="calico-system/calico-node-6wlxb" Apr 12 19:49:14.561787 kubelet[2512]: I0412 19:49:14.561781 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/dad67a8f-5bcf-45e8-a1e7-0affbec778a5-socket-dir\") pod \"csi-node-driver-xghtm\" (UID: \"dad67a8f-5bcf-45e8-a1e7-0affbec778a5\") " pod="calico-system/csi-node-driver-xghtm" Apr 12 19:49:14.561809 kubelet[2512]: I0412 19:49:14.561802 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0e039361-94a7-4001-aace-e17f9e7f2cf7-xtables-lock\") pod \"kube-proxy-lvkc9\" (UID: \"0e039361-94a7-4001-aace-e17f9e7f2cf7\") " pod="kube-system/kube-proxy-lvkc9" Apr 12 19:49:14.561831 kubelet[2512]: I0412 19:49:14.561820 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5a018bc1-6d93-4e53-9375-8c24efe6f832-xtables-lock\") pod \"calico-node-6wlxb\" (UID: \"5a018bc1-6d93-4e53-9375-8c24efe6f832\") " pod="calico-system/calico-node-6wlxb" Apr 12 19:49:14.561853 kubelet[2512]: I0412 19:49:14.561840 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/5a018bc1-6d93-4e53-9375-8c24efe6f832-flexvol-driver-host\") pod \"calico-node-6wlxb\" (UID: \"5a018bc1-6d93-4e53-9375-8c24efe6f832\") " pod="calico-system/calico-node-6wlxb" Apr 12 19:49:14.561880 kubelet[2512]: I0412 19:49:14.561865 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/dad67a8f-5bcf-45e8-a1e7-0affbec778a5-varrun\") pod \"csi-node-driver-xghtm\" (UID: \"dad67a8f-5bcf-45e8-a1e7-0affbec778a5\") " pod="calico-system/csi-node-driver-xghtm" Apr 12 19:49:14.584395 systemd[1]: Created slice kubepods-besteffort-pod5a018bc1_6d93_4e53_9375_8c24efe6f832.slice. Apr 12 19:49:14.656069 kubelet[2512]: I0412 19:49:14.655974 2512 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 19:49:14.663527 kubelet[2512]: E0412 19:49:14.663511 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.663556 kubelet[2512]: W0412 19:49:14.663529 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.663556 kubelet[2512]: E0412 19:49:14.663550 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.663748 kubelet[2512]: E0412 19:49:14.663739 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.663771 kubelet[2512]: W0412 19:49:14.663748 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.663771 kubelet[2512]: E0412 19:49:14.663762 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.663973 kubelet[2512]: E0412 19:49:14.663965 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.663995 kubelet[2512]: W0412 19:49:14.663974 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.663995 kubelet[2512]: E0412 19:49:14.663987 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.664169 kubelet[2512]: E0412 19:49:14.664160 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.664192 kubelet[2512]: W0412 19:49:14.664170 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.664192 kubelet[2512]: E0412 19:49:14.664184 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.664312 kubelet[2512]: E0412 19:49:14.664304 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.664333 kubelet[2512]: W0412 19:49:14.664312 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.664333 kubelet[2512]: E0412 19:49:14.664324 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.664536 kubelet[2512]: E0412 19:49:14.664519 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.664558 kubelet[2512]: W0412 19:49:14.664538 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.664584 kubelet[2512]: E0412 19:49:14.664558 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.664755 kubelet[2512]: E0412 19:49:14.664747 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.664814 kubelet[2512]: W0412 19:49:14.664756 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.664814 kubelet[2512]: E0412 19:49:14.664787 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.664940 kubelet[2512]: E0412 19:49:14.664931 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.664965 kubelet[2512]: W0412 19:49:14.664940 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.664965 kubelet[2512]: E0412 19:49:14.664961 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.665128 kubelet[2512]: E0412 19:49:14.665119 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.665151 kubelet[2512]: W0412 19:49:14.665128 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.665151 kubelet[2512]: E0412 19:49:14.665146 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.665289 kubelet[2512]: E0412 19:49:14.665280 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.665316 kubelet[2512]: W0412 19:49:14.665289 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.665316 kubelet[2512]: E0412 19:49:14.665302 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.665467 kubelet[2512]: E0412 19:49:14.665457 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.665492 kubelet[2512]: W0412 19:49:14.665467 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.665492 kubelet[2512]: E0412 19:49:14.665481 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.665710 kubelet[2512]: E0412 19:49:14.665701 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.665731 kubelet[2512]: W0412 19:49:14.665710 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.665731 kubelet[2512]: E0412 19:49:14.665723 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.665913 kubelet[2512]: E0412 19:49:14.665903 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.665935 kubelet[2512]: W0412 19:49:14.665913 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.665935 kubelet[2512]: E0412 19:49:14.665926 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.666156 kubelet[2512]: E0412 19:49:14.666148 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.666179 kubelet[2512]: W0412 19:49:14.666156 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.666179 kubelet[2512]: E0412 19:49:14.666169 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.666310 kubelet[2512]: E0412 19:49:14.666301 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.666332 kubelet[2512]: W0412 19:49:14.666310 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.666332 kubelet[2512]: E0412 19:49:14.666328 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.666515 kubelet[2512]: E0412 19:49:14.666507 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.666537 kubelet[2512]: W0412 19:49:14.666515 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.666561 kubelet[2512]: E0412 19:49:14.666534 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.666726 kubelet[2512]: E0412 19:49:14.666718 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.666748 kubelet[2512]: W0412 19:49:14.666726 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.666748 kubelet[2512]: E0412 19:49:14.666742 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.666927 kubelet[2512]: E0412 19:49:14.666918 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.666949 kubelet[2512]: W0412 19:49:14.666927 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.666949 kubelet[2512]: E0412 19:49:14.666940 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.667173 kubelet[2512]: E0412 19:49:14.667165 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.667195 kubelet[2512]: W0412 19:49:14.667173 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.667195 kubelet[2512]: E0412 19:49:14.667185 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.667418 kubelet[2512]: E0412 19:49:14.667410 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.667441 kubelet[2512]: W0412 19:49:14.667419 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.667467 kubelet[2512]: E0412 19:49:14.667439 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.667632 kubelet[2512]: E0412 19:49:14.667624 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.667654 kubelet[2512]: W0412 19:49:14.667632 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.667654 kubelet[2512]: E0412 19:49:14.667651 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.667852 kubelet[2512]: E0412 19:49:14.667844 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.667875 kubelet[2512]: W0412 19:49:14.667853 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.667875 kubelet[2512]: E0412 19:49:14.667871 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.668033 kubelet[2512]: E0412 19:49:14.668024 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.668060 kubelet[2512]: W0412 19:49:14.668033 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.668060 kubelet[2512]: E0412 19:49:14.668054 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.668255 kubelet[2512]: E0412 19:49:14.668246 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.668277 kubelet[2512]: W0412 19:49:14.668255 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.668277 kubelet[2512]: E0412 19:49:14.668273 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.668426 kubelet[2512]: E0412 19:49:14.668418 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.668451 kubelet[2512]: W0412 19:49:14.668426 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.668451 kubelet[2512]: E0412 19:49:14.668444 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.668608 kubelet[2512]: E0412 19:49:14.668599 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.668632 kubelet[2512]: W0412 19:49:14.668608 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.668632 kubelet[2512]: E0412 19:49:14.668621 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.668830 kubelet[2512]: E0412 19:49:14.668822 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.668854 kubelet[2512]: W0412 19:49:14.668830 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.668854 kubelet[2512]: E0412 19:49:14.668842 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.669104 kubelet[2512]: E0412 19:49:14.669096 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.669130 kubelet[2512]: W0412 19:49:14.669104 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.669130 kubelet[2512]: E0412 19:49:14.669124 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.669273 kubelet[2512]: E0412 19:49:14.669264 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.669297 kubelet[2512]: W0412 19:49:14.669273 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.669297 kubelet[2512]: E0412 19:49:14.669290 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.669487 kubelet[2512]: E0412 19:49:14.669479 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.669509 kubelet[2512]: W0412 19:49:14.669487 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.669509 kubelet[2512]: E0412 19:49:14.669504 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.669696 kubelet[2512]: E0412 19:49:14.669688 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.669719 kubelet[2512]: W0412 19:49:14.669696 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.669785 kubelet[2512]: E0412 19:49:14.669770 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.669857 kubelet[2512]: E0412 19:49:14.669849 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.669879 kubelet[2512]: W0412 19:49:14.669857 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.669901 kubelet[2512]: E0412 19:49:14.669890 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.670049 kubelet[2512]: E0412 19:49:14.670039 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.670076 kubelet[2512]: W0412 19:49:14.670049 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.670101 kubelet[2512]: E0412 19:49:14.670080 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.670187 kubelet[2512]: E0412 19:49:14.670178 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.670209 kubelet[2512]: W0412 19:49:14.670187 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.670209 kubelet[2512]: E0412 19:49:14.670201 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.670400 kubelet[2512]: E0412 19:49:14.670392 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.670422 kubelet[2512]: W0412 19:49:14.670400 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.670422 kubelet[2512]: E0412 19:49:14.670412 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.670692 kubelet[2512]: E0412 19:49:14.670681 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.670714 kubelet[2512]: W0412 19:49:14.670693 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.670714 kubelet[2512]: E0412 19:49:14.670710 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.670889 kubelet[2512]: E0412 19:49:14.670880 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.670911 kubelet[2512]: W0412 19:49:14.670889 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.670911 kubelet[2512]: E0412 19:49:14.670902 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.671131 kubelet[2512]: E0412 19:49:14.671117 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.671157 kubelet[2512]: W0412 19:49:14.671132 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.671157 kubelet[2512]: E0412 19:49:14.671153 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.671296 kubelet[2512]: E0412 19:49:14.671288 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.671319 kubelet[2512]: W0412 19:49:14.671297 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.671340 kubelet[2512]: E0412 19:49:14.671319 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.671430 kubelet[2512]: E0412 19:49:14.671422 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.671453 kubelet[2512]: W0412 19:49:14.671430 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.671453 kubelet[2512]: E0412 19:49:14.671450 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.671603 kubelet[2512]: E0412 19:49:14.671595 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.671625 kubelet[2512]: W0412 19:49:14.671603 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.671625 kubelet[2512]: E0412 19:49:14.671621 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.671770 kubelet[2512]: E0412 19:49:14.671762 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.671792 kubelet[2512]: W0412 19:49:14.671770 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.671792 kubelet[2512]: E0412 19:49:14.671783 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.671960 kubelet[2512]: E0412 19:49:14.671951 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.671982 kubelet[2512]: W0412 19:49:14.671960 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.671982 kubelet[2512]: E0412 19:49:14.671973 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.672221 kubelet[2512]: E0412 19:49:14.672209 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.672244 kubelet[2512]: W0412 19:49:14.672222 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.672244 kubelet[2512]: E0412 19:49:14.672238 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.672396 kubelet[2512]: E0412 19:49:14.672387 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.672418 kubelet[2512]: W0412 19:49:14.672396 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.672418 kubelet[2512]: E0412 19:49:14.672414 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.672613 kubelet[2512]: E0412 19:49:14.672599 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.672637 kubelet[2512]: W0412 19:49:14.672614 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.672637 kubelet[2512]: E0412 19:49:14.672634 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.672807 kubelet[2512]: E0412 19:49:14.672797 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.672829 kubelet[2512]: W0412 19:49:14.672807 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.672829 kubelet[2512]: E0412 19:49:14.672822 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.672961 kubelet[2512]: E0412 19:49:14.672952 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.672985 kubelet[2512]: W0412 19:49:14.672962 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.672985 kubelet[2512]: E0412 19:49:14.672973 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.674318 kubelet[2512]: E0412 19:49:14.674306 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.674342 kubelet[2512]: W0412 19:49:14.674319 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.674342 kubelet[2512]: E0412 19:49:14.674333 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.679388 kubelet[2512]: E0412 19:49:14.679373 2512 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 19:49:14.679436 kubelet[2512]: W0412 19:49:14.679388 2512 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 19:49:14.679436 kubelet[2512]: E0412 19:49:14.679403 2512 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 19:49:14.884171 env[2107]: time="2024-04-12T19:49:14.884133520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-lvkc9,Uid:0e039361-94a7-4001-aace-e17f9e7f2cf7,Namespace:kube-system,Attempt:0,}" Apr 12 19:49:14.886966 env[2107]: time="2024-04-12T19:49:14.886932080Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6wlxb,Uid:5a018bc1-6d93-4e53-9375-8c24efe6f832,Namespace:calico-system,Attempt:0,}" Apr 12 19:49:15.170519 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3451093955.mount: Deactivated successfully. Apr 12 19:49:15.171239 env[2107]: time="2024-04-12T19:49:15.171208200Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:15.172017 env[2107]: time="2024-04-12T19:49:15.171989600Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:15.174073 env[2107]: time="2024-04-12T19:49:15.174052240Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:15.175976 env[2107]: time="2024-04-12T19:49:15.175959320Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:15.178172 env[2107]: time="2024-04-12T19:49:15.178150280Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:15.178792 env[2107]: time="2024-04-12T19:49:15.178776280Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:15.179397 env[2107]: time="2024-04-12T19:49:15.179381920Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:15.180030 env[2107]: time="2024-04-12T19:49:15.180013080Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:15.189033 env[2107]: time="2024-04-12T19:49:15.188988040Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:49:15.189033 env[2107]: time="2024-04-12T19:49:15.189026240Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:49:15.189117 env[2107]: time="2024-04-12T19:49:15.189014160Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:49:15.189117 env[2107]: time="2024-04-12T19:49:15.189037800Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:49:15.189117 env[2107]: time="2024-04-12T19:49:15.189053000Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:49:15.189117 env[2107]: time="2024-04-12T19:49:15.189065040Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:49:15.189235 env[2107]: time="2024-04-12T19:49:15.189216560Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8a4476fc512cc4d15df0db066298dd75c7d405d8abec810c0aec410e73c2d7c5 pid=2646 runtime=io.containerd.runc.v2 Apr 12 19:49:15.189235 env[2107]: time="2024-04-12T19:49:15.189214320Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/563aa5af16dbbba3fe08cc93a29785bfba0649e2ea62cb045c1c71c636f6de36 pid=2645 runtime=io.containerd.runc.v2 Apr 12 19:49:15.203426 systemd[1]: Started cri-containerd-563aa5af16dbbba3fe08cc93a29785bfba0649e2ea62cb045c1c71c636f6de36.scope. Apr 12 19:49:15.204598 systemd[1]: Started cri-containerd-8a4476fc512cc4d15df0db066298dd75c7d405d8abec810c0aec410e73c2d7c5.scope. Apr 12 19:49:15.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.219000 audit: BPF prog-id=67 op=LOAD Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2646 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:15.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861343437366663353132636334643135646630646230363632393864 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2646 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:15.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861343437366663353132636334643135646630646230363632393864 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit: BPF prog-id=68 op=LOAD Apr 12 19:49:15.220000 audit[2664]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2646 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:15.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861343437366663353132636334643135646630646230363632393864 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit: BPF prog-id=69 op=LOAD Apr 12 19:49:15.220000 audit[2664]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2646 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:15.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861343437366663353132636334643135646630646230363632393864 Apr 12 19:49:15.220000 audit: BPF prog-id=69 op=UNLOAD Apr 12 19:49:15.220000 audit: BPF prog-id=68 op=UNLOAD Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit: BPF prog-id=70 op=LOAD Apr 12 19:49:15.220000 audit[2664]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2646 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:15.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861343437366663353132636334643135646630646230363632393864 Apr 12 19:49:15.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.220000 audit: BPF prog-id=71 op=LOAD Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2645 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:15.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536336161356166313664626262613366653038636339336132393738 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2645 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:15.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536336161356166313664626262613366653038636339336132393738 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit: BPF prog-id=72 op=LOAD Apr 12 19:49:15.221000 audit[2665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2645 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:15.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536336161356166313664626262613366653038636339336132393738 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit: BPF prog-id=73 op=LOAD Apr 12 19:49:15.221000 audit[2665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2645 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:15.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536336161356166313664626262613366653038636339336132393738 Apr 12 19:49:15.221000 audit: BPF prog-id=73 op=UNLOAD Apr 12 19:49:15.221000 audit: BPF prog-id=72 op=UNLOAD Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:15.221000 audit: BPF prog-id=74 op=LOAD Apr 12 19:49:15.221000 audit[2665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2645 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:15.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536336161356166313664626262613366653038636339336132393738 Apr 12 19:49:15.228167 env[2107]: time="2024-04-12T19:49:15.228138360Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-lvkc9,Uid:0e039361-94a7-4001-aace-e17f9e7f2cf7,Namespace:kube-system,Attempt:0,} returns sandbox id \"8a4476fc512cc4d15df0db066298dd75c7d405d8abec810c0aec410e73c2d7c5\"" Apr 12 19:49:15.229559 env[2107]: time="2024-04-12T19:49:15.229523840Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6wlxb,Uid:5a018bc1-6d93-4e53-9375-8c24efe6f832,Namespace:calico-system,Attempt:0,} returns sandbox id \"563aa5af16dbbba3fe08cc93a29785bfba0649e2ea62cb045c1c71c636f6de36\"" Apr 12 19:49:15.231108 env[2107]: time="2024-04-12T19:49:15.231083040Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\"" Apr 12 19:49:15.553946 kubelet[2512]: E0412 19:49:15.553919 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:16.072794 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount490476340.mount: Deactivated successfully. Apr 12 19:49:16.554032 kubelet[2512]: E0412 19:49:16.554006 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:16.633676 kubelet[2512]: E0412 19:49:16.633649 2512 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xghtm" podUID="dad67a8f-5bcf-45e8-a1e7-0affbec778a5" Apr 12 19:49:16.648077 env[2107]: time="2024-04-12T19:49:16.648027520Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:16.648733 env[2107]: time="2024-04-12T19:49:16.648709160Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0e9b4a0d1e86d942f5ed93eaf751771e7602104cac5e15256c36967770ad2775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:16.649723 env[2107]: time="2024-04-12T19:49:16.649703520Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:16.650610 env[2107]: time="2024-04-12T19:49:16.650594880Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fa87cba052adcb992bd59bd1304115c6f3b3fb370407805ba52af3d9ff3f0863,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:16.651093 env[2107]: time="2024-04-12T19:49:16.651069160Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\" returns image reference \"sha256:0e9b4a0d1e86d942f5ed93eaf751771e7602104cac5e15256c36967770ad2775\"" Apr 12 19:49:16.651619 env[2107]: time="2024-04-12T19:49:16.651597800Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 19:49:16.652792 env[2107]: time="2024-04-12T19:49:16.652767200Z" level=info msg="CreateContainer within sandbox \"8a4476fc512cc4d15df0db066298dd75c7d405d8abec810c0aec410e73c2d7c5\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 19:49:16.662012 env[2107]: time="2024-04-12T19:49:16.661980840Z" level=info msg="CreateContainer within sandbox \"8a4476fc512cc4d15df0db066298dd75c7d405d8abec810c0aec410e73c2d7c5\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"5210863ce8ef848b6a003a88af8eb56909076985bf6dd1b8a0946f0ece2f42bc\"" Apr 12 19:49:16.662569 env[2107]: time="2024-04-12T19:49:16.662544680Z" level=info msg="StartContainer for \"5210863ce8ef848b6a003a88af8eb56909076985bf6dd1b8a0946f0ece2f42bc\"" Apr 12 19:49:16.676406 systemd[1]: Started cri-containerd-5210863ce8ef848b6a003a88af8eb56909076985bf6dd1b8a0946f0ece2f42bc.scope. Apr 12 19:49:16.692000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.703129 kernel: kauditd_printk_skb: 528 callbacks suppressed Apr 12 19:49:16.703211 kernel: audit: type=1400 audit(1712951356.692:596): avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.692000 audit[2753]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2646 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:16.796375 kernel: audit: type=1300 audit(1712951356.692:596): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2646 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:16.796419 kernel: audit: type=1327 audit(1712951356.692:596): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313038363363653865663834386236613030336138386166386562 Apr 12 19:49:16.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313038363363653865663834386236613030336138386166386562 Apr 12 19:49:16.693000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.857551 env[2107]: time="2024-04-12T19:49:16.857500320Z" level=info msg="StartContainer for \"5210863ce8ef848b6a003a88af8eb56909076985bf6dd1b8a0946f0ece2f42bc\" returns successfully" Apr 12 19:49:16.887366 kernel: audit: type=1400 audit(1712951356.693:597): avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.887386 kernel: audit: type=1400 audit(1712951356.693:597): avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.693000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.693000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.964326 kernel: audit: type=1400 audit(1712951356.693:597): avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.964376 kernel: audit: type=1400 audit(1712951356.693:597): avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.693000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.693000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.040372 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1937369451.mount: Deactivated successfully. Apr 12 19:49:17.041385 kernel: audit: type=1400 audit(1712951356.693:597): avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.041415 kernel: audit: type=1400 audit(1712951356.693:597): avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.693000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.693000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.096606 env[2107]: time="2024-04-12T19:49:17.096577680Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:17.097233 env[2107]: time="2024-04-12T19:49:17.097204280Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:17.098238 env[2107]: time="2024-04-12T19:49:17.098216000Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:17.102607 env[2107]: time="2024-04-12T19:49:17.102558040Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:17.102887 env[2107]: time="2024-04-12T19:49:17.102857560Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607\"" Apr 12 19:49:17.104195 env[2107]: time="2024-04-12T19:49:17.104170440Z" level=info msg="CreateContainer within sandbox \"563aa5af16dbbba3fe08cc93a29785bfba0649e2ea62cb045c1c71c636f6de36\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 19:49:17.118020 kernel: audit: type=1400 audit(1712951356.693:597): avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.693000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.693000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.693000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.693000 audit: BPF prog-id=75 op=LOAD Apr 12 19:49:16.693000 audit[2753]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2646 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:16.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313038363363653865663834386236613030336138386166386562 Apr 12 19:49:16.703000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.703000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.703000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.703000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.703000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.703000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.703000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.703000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.703000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.703000 audit: BPF prog-id=76 op=LOAD Apr 12 19:49:16.703000 audit[2753]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2646 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:16.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313038363363653865663834386236613030336138386166386562 Apr 12 19:49:16.741000 audit: BPF prog-id=76 op=UNLOAD Apr 12 19:49:16.741000 audit: BPF prog-id=75 op=UNLOAD Apr 12 19:49:16.741000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.741000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.741000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.741000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.741000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.741000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.741000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.741000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.741000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.741000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:16.741000 audit: BPF prog-id=77 op=LOAD Apr 12 19:49:16.741000 audit[2753]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2646 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:16.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532313038363363653865663834386236613030336138386166386562 Apr 12 19:49:17.119190 env[2107]: time="2024-04-12T19:49:17.119161640Z" level=info msg="CreateContainer within sandbox \"563aa5af16dbbba3fe08cc93a29785bfba0649e2ea62cb045c1c71c636f6de36\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"a0e2393f79e37fb1ba4fd3a46ce70dcc915315af6806810dd81aeb55d60e7e17\"" Apr 12 19:49:17.119545 env[2107]: time="2024-04-12T19:49:17.119515680Z" level=info msg="StartContainer for \"a0e2393f79e37fb1ba4fd3a46ce70dcc915315af6806810dd81aeb55d60e7e17\"" Apr 12 19:49:17.132662 systemd[1]: Started cri-containerd-a0e2393f79e37fb1ba4fd3a46ce70dcc915315af6806810dd81aeb55d60e7e17.scope. Apr 12 19:49:17.140000 audit[2840]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.140000 audit[2840]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc35250b0 a2=0 a3=1 items=0 ppid=2764 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.140000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 19:49:17.140000 audit[2841]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.140000 audit[2841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc758e690 a2=0 a3=1 items=0 ppid=2764 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.140000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 19:49:17.141000 audit[2842]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2842 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.141000 audit[2842]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdd5db5b0 a2=0 a3=1 items=0 ppid=2764 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.141000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 19:49:17.142000 audit[2843]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=2843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.142000 audit[2843]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff554f7e0 a2=0 a3=1 items=0 ppid=2764 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.142000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 19:49:17.143000 audit[2849]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=2849 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.143000 audit[2849]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffef265090 a2=0 a3=1 items=0 ppid=2764 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.143000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 19:49:17.143000 audit[2850]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2850 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.143000 audit[2850]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe7b7e500 a2=0 a3=1 items=0 ppid=2764 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.143000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130653233393366373965333766623162613466643361343663653730 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit: BPF prog-id=78 op=LOAD Apr 12 19:49:17.149000 audit[2797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130653233393366373965333766623162613466643361343663653730 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit: BPF prog-id=79 op=LOAD Apr 12 19:49:17.149000 audit[2797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130653233393366373965333766623162613466643361343663653730 Apr 12 19:49:17.149000 audit: BPF prog-id=79 op=UNLOAD Apr 12 19:49:17.149000 audit: BPF prog-id=78 op=UNLOAD Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:17.149000 audit: BPF prog-id=80 op=LOAD Apr 12 19:49:17.149000 audit[2797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2645 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130653233393366373965333766623162613466643361343663653730 Apr 12 19:49:17.157741 env[2107]: time="2024-04-12T19:49:17.157708280Z" level=info msg="StartContainer for \"a0e2393f79e37fb1ba4fd3a46ce70dcc915315af6806810dd81aeb55d60e7e17\" returns successfully" Apr 12 19:49:17.165154 systemd[1]: cri-containerd-a0e2393f79e37fb1ba4fd3a46ce70dcc915315af6806810dd81aeb55d60e7e17.scope: Deactivated successfully. Apr 12 19:49:17.176000 audit: BPF prog-id=80 op=UNLOAD Apr 12 19:49:17.242000 audit[2875]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2875 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.242000 audit[2875]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffec09b540 a2=0 a3=1 items=0 ppid=2764 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.242000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 19:49:17.244000 audit[2877]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2877 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.244000 audit[2877]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcc68b640 a2=0 a3=1 items=0 ppid=2764 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.244000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 19:49:17.247000 audit[2880]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2880 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.247000 audit[2880]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffe9363c0 a2=0 a3=1 items=0 ppid=2764 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.247000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 19:49:17.248000 audit[2881]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2881 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.248000 audit[2881]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffca63ca90 a2=0 a3=1 items=0 ppid=2764 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.248000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 19:49:17.250000 audit[2883]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2883 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.250000 audit[2883]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd7d0da00 a2=0 a3=1 items=0 ppid=2764 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.250000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 19:49:17.251000 audit[2884]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2884 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.251000 audit[2884]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd0127910 a2=0 a3=1 items=0 ppid=2764 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.251000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 19:49:17.253000 audit[2886]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2886 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.253000 audit[2886]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe397c6c0 a2=0 a3=1 items=0 ppid=2764 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.253000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 19:49:17.256000 audit[2889]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2889 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.256000 audit[2889]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffedf8e8f0 a2=0 a3=1 items=0 ppid=2764 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.256000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 19:49:17.256000 audit[2890]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2890 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.256000 audit[2890]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd88100a0 a2=0 a3=1 items=0 ppid=2764 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.256000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 19:49:17.258000 audit[2892]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2892 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.258000 audit[2892]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc5deef80 a2=0 a3=1 items=0 ppid=2764 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.258000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 19:49:17.259000 audit[2893]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2893 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.259000 audit[2893]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffce6a1900 a2=0 a3=1 items=0 ppid=2764 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.259000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 19:49:17.261000 audit[2895]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2895 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.261000 audit[2895]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc75b2df0 a2=0 a3=1 items=0 ppid=2764 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.261000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 19:49:17.264000 audit[2898]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2898 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.264000 audit[2898]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc861e2a0 a2=0 a3=1 items=0 ppid=2764 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.264000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 19:49:17.267000 audit[2901]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2901 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.267000 audit[2901]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdfd465a0 a2=0 a3=1 items=0 ppid=2764 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.267000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 19:49:17.268000 audit[2902]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2902 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.268000 audit[2902]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffc526060 a2=0 a3=1 items=0 ppid=2764 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.268000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 19:49:17.275494 env[2107]: time="2024-04-12T19:49:17.275453080Z" level=info msg="shim disconnected" id=a0e2393f79e37fb1ba4fd3a46ce70dcc915315af6806810dd81aeb55d60e7e17 Apr 12 19:49:17.275552 env[2107]: time="2024-04-12T19:49:17.275501680Z" level=warning msg="cleaning up after shim disconnected" id=a0e2393f79e37fb1ba4fd3a46ce70dcc915315af6806810dd81aeb55d60e7e17 namespace=k8s.io Apr 12 19:49:17.275552 env[2107]: time="2024-04-12T19:49:17.275510760Z" level=info msg="cleaning up dead shim" Apr 12 19:49:17.281214 env[2107]: time="2024-04-12T19:49:17.281191080Z" level=warning msg="cleanup warnings time=\"2024-04-12T19:49:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2905 runtime=io.containerd.runc.v2\n" Apr 12 19:49:17.270000 audit[2904]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2904 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.270000 audit[2904]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd07c8ac0 a2=0 a3=1 items=0 ppid=2764 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.270000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:49:17.296000 audit[2922]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2922 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.296000 audit[2922]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd0e845f0 a2=0 a3=1 items=0 ppid=2764 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.296000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:49:17.297000 audit[2923]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2923 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.297000 audit[2923]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffa0a36d0 a2=0 a3=1 items=0 ppid=2764 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.297000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 19:49:17.299000 audit[2925]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2925 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 19:49:17.299000 audit[2925]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd39f59f0 a2=0 a3=1 items=0 ppid=2764 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 19:49:17.308000 audit[2931]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=2931 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:49:17.308000 audit[2931]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffce7a1830 a2=0 a3=1 items=0 ppid=2764 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.308000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:49:17.339000 audit[2931]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=2931 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:49:17.339000 audit[2931]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30940 a0=3 a1=ffffce7a1830 a2=0 a3=1 items=0 ppid=2764 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.339000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:49:17.354000 audit[2939]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2939 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.354000 audit[2939]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffb190b10 a2=0 a3=1 items=0 ppid=2764 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.354000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 19:49:17.356000 audit[2941]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2941 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.356000 audit[2941]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffff306020 a2=0 a3=1 items=0 ppid=2764 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.356000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 19:49:17.360000 audit[2944]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2944 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.360000 audit[2944]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc12398e0 a2=0 a3=1 items=0 ppid=2764 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.360000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 19:49:17.361000 audit[2945]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2945 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.361000 audit[2945]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffec6ef290 a2=0 a3=1 items=0 ppid=2764 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.361000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 19:49:17.363000 audit[2947]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2947 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.363000 audit[2947]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe1e877b0 a2=0 a3=1 items=0 ppid=2764 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.363000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 19:49:17.364000 audit[2948]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2948 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.364000 audit[2948]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd18b65e0 a2=0 a3=1 items=0 ppid=2764 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.364000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 19:49:17.366000 audit[2950]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2950 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.366000 audit[2950]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff90fab50 a2=0 a3=1 items=0 ppid=2764 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.366000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 19:49:17.369000 audit[2953]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2953 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.369000 audit[2953]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffcba58ff0 a2=0 a3=1 items=0 ppid=2764 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.369000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 19:49:17.370000 audit[2954]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2954 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.370000 audit[2954]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffda1a2850 a2=0 a3=1 items=0 ppid=2764 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.370000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 19:49:17.372000 audit[2956]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2956 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.372000 audit[2956]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc5bb92d0 a2=0 a3=1 items=0 ppid=2764 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.372000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 19:49:17.373000 audit[2957]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2957 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.373000 audit[2957]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd8e2bb60 a2=0 a3=1 items=0 ppid=2764 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.373000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 19:49:17.375000 audit[2959]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2959 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.375000 audit[2959]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc28a85e0 a2=0 a3=1 items=0 ppid=2764 pid=2959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.375000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 19:49:17.378000 audit[2962]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2962 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.378000 audit[2962]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffca9c1340 a2=0 a3=1 items=0 ppid=2764 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.378000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 19:49:17.381000 audit[2965]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2965 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.381000 audit[2965]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffefcb3af0 a2=0 a3=1 items=0 ppid=2764 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.381000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 19:49:17.382000 audit[2966]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2966 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.382000 audit[2966]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd6b01550 a2=0 a3=1 items=0 ppid=2764 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.382000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 19:49:17.383000 audit[2968]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2968 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.383000 audit[2968]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffcc427eb0 a2=0 a3=1 items=0 ppid=2764 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.383000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:49:17.386000 audit[2971]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2971 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.386000 audit[2971]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe46af660 a2=0 a3=1 items=0 ppid=2764 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.386000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 19:49:17.387000 audit[2972]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2972 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.387000 audit[2972]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdb14b7d0 a2=0 a3=1 items=0 ppid=2764 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.387000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 19:49:17.389000 audit[2974]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2974 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.389000 audit[2974]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff2c0b4c0 a2=0 a3=1 items=0 ppid=2764 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.389000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 19:49:17.390000 audit[2975]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2975 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.390000 audit[2975]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff96e3a50 a2=0 a3=1 items=0 ppid=2764 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.390000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 19:49:17.392000 audit[2977]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2977 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.392000 audit[2977]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffda98a860 a2=0 a3=1 items=0 ppid=2764 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.392000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:49:17.395000 audit[2980]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2980 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 19:49:17.395000 audit[2980]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff7d9d300 a2=0 a3=1 items=0 ppid=2764 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.395000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 19:49:17.397000 audit[2982]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2982 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 19:49:17.397000 audit[2982]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=fffff59c3ce0 a2=0 a3=1 items=0 ppid=2764 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.397000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:49:17.398000 audit[2982]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2982 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 19:49:17.398000 audit[2982]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=fffff59c3ce0 a2=0 a3=1 items=0 ppid=2764 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:17.398000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:49:17.554896 kubelet[2512]: E0412 19:49:17.554874 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:17.640491 env[2107]: time="2024-04-12T19:49:17.640426480Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 19:49:17.661005 kubelet[2512]: I0412 19:49:17.660979 2512 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-lvkc9" podStartSLOduration=4.24021392 podStartE2EDuration="5.66091888s" podCreationTimestamp="2024-04-12 19:49:12 +0000 UTC" firstStartedPulling="2024-04-12 19:49:15.23069832 +0000 UTC m=+2.357314761" lastFinishedPulling="2024-04-12 19:49:16.65140324 +0000 UTC m=+3.778019721" observedRunningTime="2024-04-12 19:49:17.66090072 +0000 UTC m=+4.787517201" watchObservedRunningTime="2024-04-12 19:49:17.66091888 +0000 UTC m=+4.787535361" Apr 12 19:49:17.885673 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1658339247.mount: Deactivated successfully. Apr 12 19:49:18.555852 kubelet[2512]: E0412 19:49:18.555821 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:18.633644 kubelet[2512]: E0412 19:49:18.633620 2512 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xghtm" podUID="dad67a8f-5bcf-45e8-a1e7-0affbec778a5" Apr 12 19:49:19.556694 kubelet[2512]: E0412 19:49:19.556665 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:19.772765 env[2107]: time="2024-04-12T19:49:19.772722800Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:19.773490 env[2107]: time="2024-04-12T19:49:19.773464560Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:19.774596 env[2107]: time="2024-04-12T19:49:19.774576040Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:19.775632 env[2107]: time="2024-04-12T19:49:19.775610880Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:19.776104 env[2107]: time="2024-04-12T19:49:19.776083800Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a\"" Apr 12 19:49:19.777526 env[2107]: time="2024-04-12T19:49:19.777501320Z" level=info msg="CreateContainer within sandbox \"563aa5af16dbbba3fe08cc93a29785bfba0649e2ea62cb045c1c71c636f6de36\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 19:49:19.783393 env[2107]: time="2024-04-12T19:49:19.783365000Z" level=info msg="CreateContainer within sandbox \"563aa5af16dbbba3fe08cc93a29785bfba0649e2ea62cb045c1c71c636f6de36\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c53758c7049e2a820d0bf8f881a282954e1933a60da04fa1e35d3983afef1d41\"" Apr 12 19:49:19.783757 env[2107]: time="2024-04-12T19:49:19.783733600Z" level=info msg="StartContainer for \"c53758c7049e2a820d0bf8f881a282954e1933a60da04fa1e35d3983afef1d41\"" Apr 12 19:49:19.798825 systemd[1]: Started cri-containerd-c53758c7049e2a820d0bf8f881a282954e1933a60da04fa1e35d3983afef1d41.scope. Apr 12 19:49:19.813000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.813000 audit[3009]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2645 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:19.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335333735386337303439653261383230643062663866383831613238 Apr 12 19:49:19.813000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.813000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.813000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.813000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.813000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.813000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.813000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.813000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.813000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.813000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.813000 audit: BPF prog-id=81 op=LOAD Apr 12 19:49:19.813000 audit[3009]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2645 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:19.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335333735386337303439653261383230643062663866383831613238 Apr 12 19:49:19.814000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.814000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.814000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.814000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.814000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.814000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.814000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.814000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.814000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.814000 audit: BPF prog-id=82 op=LOAD Apr 12 19:49:19.814000 audit[3009]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2645 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:19.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335333735386337303439653261383230643062663866383831613238 Apr 12 19:49:19.814000 audit: BPF prog-id=82 op=UNLOAD Apr 12 19:49:19.814000 audit: BPF prog-id=81 op=UNLOAD Apr 12 19:49:19.814000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.814000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.814000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.814000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.814000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.814000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.814000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.814000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.814000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.814000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:19.814000 audit: BPF prog-id=83 op=LOAD Apr 12 19:49:19.814000 audit[3009]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2645 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:19.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335333735386337303439653261383230643062663866383831613238 Apr 12 19:49:19.825374 env[2107]: time="2024-04-12T19:49:19.825340120Z" level=info msg="StartContainer for \"c53758c7049e2a820d0bf8f881a282954e1933a60da04fa1e35d3983afef1d41\" returns successfully" Apr 12 19:49:20.120600 systemd[1]: cri-containerd-c53758c7049e2a820d0bf8f881a282954e1933a60da04fa1e35d3983afef1d41.scope: Deactivated successfully. Apr 12 19:49:20.135000 audit: BPF prog-id=83 op=UNLOAD Apr 12 19:49:20.145191 kubelet[2512]: I0412 19:49:20.145170 2512 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Apr 12 19:49:20.290410 env[2107]: time="2024-04-12T19:49:20.290355240Z" level=info msg="shim disconnected" id=c53758c7049e2a820d0bf8f881a282954e1933a60da04fa1e35d3983afef1d41 Apr 12 19:49:20.290517 env[2107]: time="2024-04-12T19:49:20.290411640Z" level=warning msg="cleaning up after shim disconnected" id=c53758c7049e2a820d0bf8f881a282954e1933a60da04fa1e35d3983afef1d41 namespace=k8s.io Apr 12 19:49:20.290517 env[2107]: time="2024-04-12T19:49:20.290427040Z" level=info msg="cleaning up dead shim" Apr 12 19:49:20.296276 env[2107]: time="2024-04-12T19:49:20.296248120Z" level=warning msg="cleanup warnings time=\"2024-04-12T19:49:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3091 runtime=io.containerd.runc.v2\n" Apr 12 19:49:20.557461 kubelet[2512]: E0412 19:49:20.557408 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:20.638903 systemd[1]: Created slice kubepods-besteffort-poddad67a8f_5bcf_45e8_a1e7_0affbec778a5.slice. Apr 12 19:49:20.640503 env[2107]: time="2024-04-12T19:49:20.640475640Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xghtm,Uid:dad67a8f-5bcf-45e8-a1e7-0affbec778a5,Namespace:calico-system,Attempt:0,}" Apr 12 19:49:20.646720 env[2107]: time="2024-04-12T19:49:20.646695160Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 19:49:20.700488 env[2107]: time="2024-04-12T19:49:20.700432920Z" level=error msg="Failed to destroy network for sandbox \"63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:49:20.700808 env[2107]: time="2024-04-12T19:49:20.700780200Z" level=error msg="encountered an error cleaning up failed sandbox \"63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:49:20.700853 env[2107]: time="2024-04-12T19:49:20.700835440Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xghtm,Uid:dad67a8f-5bcf-45e8-a1e7-0affbec778a5,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:49:20.701036 kubelet[2512]: E0412 19:49:20.701015 2512 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:49:20.701087 kubelet[2512]: E0412 19:49:20.701079 2512 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xghtm" Apr 12 19:49:20.701119 kubelet[2512]: E0412 19:49:20.701100 2512 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xghtm" Apr 12 19:49:20.701159 kubelet[2512]: E0412 19:49:20.701151 2512 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xghtm_calico-system(dad67a8f-5bcf-45e8-a1e7-0affbec778a5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xghtm_calico-system(dad67a8f-5bcf-45e8-a1e7-0affbec778a5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xghtm" podUID="dad67a8f-5bcf-45e8-a1e7-0affbec778a5" Apr 12 19:49:20.783472 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c53758c7049e2a820d0bf8f881a282954e1933a60da04fa1e35d3983afef1d41-rootfs.mount: Deactivated successfully. Apr 12 19:49:21.560072 kubelet[2512]: E0412 19:49:21.559853 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:21.652372 kubelet[2512]: I0412 19:49:21.652353 2512 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae" Apr 12 19:49:21.652874 env[2107]: time="2024-04-12T19:49:21.652834640Z" level=info msg="StopPodSandbox for \"63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae\"" Apr 12 19:49:21.674944 env[2107]: time="2024-04-12T19:49:21.674893320Z" level=error msg="StopPodSandbox for \"63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae\" failed" error="failed to destroy network for sandbox \"63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:49:21.675102 kubelet[2512]: E0412 19:49:21.675083 2512 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae" Apr 12 19:49:21.675170 kubelet[2512]: E0412 19:49:21.675159 2512 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae"} Apr 12 19:49:21.675226 kubelet[2512]: E0412 19:49:21.675218 2512 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dad67a8f-5bcf-45e8-a1e7-0affbec778a5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 19:49:21.675281 kubelet[2512]: E0412 19:49:21.675264 2512 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dad67a8f-5bcf-45e8-a1e7-0affbec778a5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xghtm" podUID="dad67a8f-5bcf-45e8-a1e7-0affbec778a5" Apr 12 19:49:22.193737 kubelet[2512]: I0412 19:49:22.193708 2512 topology_manager.go:215] "Topology Admit Handler" podUID="f134d199-7775-484b-b23f-18581c50f11f" podNamespace="default" podName="nginx-deployment-6d5f899847-dhkr4" Apr 12 19:49:22.197719 systemd[1]: Created slice kubepods-besteffort-podf134d199_7775_484b_b23f_18581c50f11f.slice. Apr 12 19:49:22.210050 kubelet[2512]: I0412 19:49:22.210025 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2zzr7\" (UniqueName: \"kubernetes.io/projected/f134d199-7775-484b-b23f-18581c50f11f-kube-api-access-2zzr7\") pod \"nginx-deployment-6d5f899847-dhkr4\" (UID: \"f134d199-7775-484b-b23f-18581c50f11f\") " pod="default/nginx-deployment-6d5f899847-dhkr4" Apr 12 19:49:22.499783 env[2107]: time="2024-04-12T19:49:22.499719720Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-dhkr4,Uid:f134d199-7775-484b-b23f-18581c50f11f,Namespace:default,Attempt:0,}" Apr 12 19:49:22.543180 env[2107]: time="2024-04-12T19:49:22.543135520Z" level=error msg="Failed to destroy network for sandbox \"c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:49:22.543567 env[2107]: time="2024-04-12T19:49:22.543535040Z" level=error msg="encountered an error cleaning up failed sandbox \"c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:49:22.543604 env[2107]: time="2024-04-12T19:49:22.543588000Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-dhkr4,Uid:f134d199-7775-484b-b23f-18581c50f11f,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:49:22.543768 kubelet[2512]: E0412 19:49:22.543751 2512 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:49:22.543811 kubelet[2512]: E0412 19:49:22.543800 2512 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-dhkr4" Apr 12 19:49:22.543839 kubelet[2512]: E0412 19:49:22.543820 2512 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-dhkr4" Apr 12 19:49:22.543882 kubelet[2512]: E0412 19:49:22.543870 2512 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-dhkr4_default(f134d199-7775-484b-b23f-18581c50f11f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-dhkr4_default(f134d199-7775-484b-b23f-18581c50f11f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-dhkr4" podUID="f134d199-7775-484b-b23f-18581c50f11f" Apr 12 19:49:22.544349 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e-shm.mount: Deactivated successfully. Apr 12 19:49:22.560453 kubelet[2512]: E0412 19:49:22.560434 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:22.654574 kubelet[2512]: I0412 19:49:22.654553 2512 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e" Apr 12 19:49:22.654975 env[2107]: time="2024-04-12T19:49:22.654949160Z" level=info msg="StopPodSandbox for \"c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e\"" Apr 12 19:49:22.676629 env[2107]: time="2024-04-12T19:49:22.676562240Z" level=error msg="StopPodSandbox for \"c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e\" failed" error="failed to destroy network for sandbox \"c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 19:49:22.676783 kubelet[2512]: E0412 19:49:22.676764 2512 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e" Apr 12 19:49:22.676826 kubelet[2512]: E0412 19:49:22.676808 2512 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e"} Apr 12 19:49:22.676875 kubelet[2512]: E0412 19:49:22.676866 2512 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f134d199-7775-484b-b23f-18581c50f11f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 19:49:22.676921 kubelet[2512]: E0412 19:49:22.676914 2512 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f134d199-7775-484b-b23f-18581c50f11f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-dhkr4" podUID="f134d199-7775-484b-b23f-18581c50f11f" Apr 12 19:49:23.561220 kubelet[2512]: E0412 19:49:23.561190 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:24.561450 kubelet[2512]: E0412 19:49:24.561428 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:24.576959 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1426379301.mount: Deactivated successfully. Apr 12 19:49:24.599555 env[2107]: time="2024-04-12T19:49:24.599511200Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:24.600245 env[2107]: time="2024-04-12T19:49:24.600221920Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:24.601314 env[2107]: time="2024-04-12T19:49:24.601291440Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:24.602580 env[2107]: time="2024-04-12T19:49:24.602559200Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:24.603010 env[2107]: time="2024-04-12T19:49:24.602987160Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d\"" Apr 12 19:49:24.609024 env[2107]: time="2024-04-12T19:49:24.608996160Z" level=info msg="CreateContainer within sandbox \"563aa5af16dbbba3fe08cc93a29785bfba0649e2ea62cb045c1c71c636f6de36\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 19:49:24.615680 env[2107]: time="2024-04-12T19:49:24.615649760Z" level=info msg="CreateContainer within sandbox \"563aa5af16dbbba3fe08cc93a29785bfba0649e2ea62cb045c1c71c636f6de36\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"9422fab4c58e98def8e872043a5226141e74e7ec421ad064dbc925e0698c9635\"" Apr 12 19:49:24.615993 env[2107]: time="2024-04-12T19:49:24.615969920Z" level=info msg="StartContainer for \"9422fab4c58e98def8e872043a5226141e74e7ec421ad064dbc925e0698c9635\"" Apr 12 19:49:24.628986 systemd[1]: Started cri-containerd-9422fab4c58e98def8e872043a5226141e74e7ec421ad064dbc925e0698c9635.scope. Apr 12 19:49:24.647000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.659193 kernel: kauditd_printk_skb: 274 callbacks suppressed Apr 12 19:49:24.659378 kernel: audit: type=1400 audit(1712951364.647:667): avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.647000 audit[3300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2645 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:24.751987 kernel: audit: type=1300 audit(1712951364.647:667): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2645 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:24.752051 kernel: audit: type=1327 audit(1712951364.647:667): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934323266616234633538653938646566386538373230343361353232 Apr 12 19:49:24.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934323266616234633538653938646566386538373230343361353232 Apr 12 19:49:24.647000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.813471 env[2107]: time="2024-04-12T19:49:24.813408600Z" level=info msg="StartContainer for \"9422fab4c58e98def8e872043a5226141e74e7ec421ad064dbc925e0698c9635\" returns successfully" Apr 12 19:49:24.841998 kernel: audit: type=1400 audit(1712951364.647:668): avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.842032 kernel: audit: type=1400 audit(1712951364.647:668): avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.647000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.647000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.917858 kernel: audit: type=1400 audit(1712951364.647:668): avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.917936 kernel: audit: type=1400 audit(1712951364.647:668): avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.647000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.647000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.994568 kernel: audit: type=1400 audit(1712951364.647:668): avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.994604 kernel: audit: type=1400 audit(1712951364.647:668): avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.647000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.647000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:25.070966 kernel: audit: type=1400 audit(1712951364.647:668): avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.647000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.647000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.647000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.647000 audit: BPF prog-id=84 op=LOAD Apr 12 19:49:24.647000 audit[3300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2645 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:24.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934323266616234633538653938646566386538373230343361353232 Apr 12 19:49:24.659000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.659000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.659000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.659000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.659000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.659000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.659000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.659000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.659000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.659000 audit: BPF prog-id=85 op=LOAD Apr 12 19:49:24.659000 audit[3300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2645 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:24.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934323266616234633538653938646566386538373230343361353232 Apr 12 19:49:24.697000 audit: BPF prog-id=85 op=UNLOAD Apr 12 19:49:24.697000 audit: BPF prog-id=84 op=UNLOAD Apr 12 19:49:24.697000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.697000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.697000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.697000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.697000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.697000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.697000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.697000 audit[3300]: AVC avc: denied { perfmon } for pid=3300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.697000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.697000 audit[3300]: AVC avc: denied { bpf } for pid=3300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:24.697000 audit: BPF prog-id=86 op=LOAD Apr 12 19:49:24.697000 audit[3300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2645 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:24.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934323266616234633538653938646566386538373230343361353232 Apr 12 19:49:25.124716 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 19:49:25.124758 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved. Apr 12 19:49:25.562222 kubelet[2512]: E0412 19:49:25.562173 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:25.672801 kubelet[2512]: I0412 19:49:25.672774 2512 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-6wlxb" podStartSLOduration=4.3003987200000005 podStartE2EDuration="13.67273644s" podCreationTimestamp="2024-04-12 19:49:12 +0000 UTC" firstStartedPulling="2024-04-12 19:49:15.23082576 +0000 UTC m=+2.357442241" lastFinishedPulling="2024-04-12 19:49:24.60316348 +0000 UTC m=+11.729779961" observedRunningTime="2024-04-12 19:49:25.6725112 +0000 UTC m=+12.799127681" watchObservedRunningTime="2024-04-12 19:49:25.67273644 +0000 UTC m=+12.799352881" Apr 12 19:49:26.303000 audit[3458]: AVC avc: denied { write } for pid=3458 comm="tee" name="fd" dev="proc" ino=76993 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:49:26.303000 audit[3460]: AVC avc: denied { write } for pid=3460 comm="tee" name="fd" dev="proc" ino=77889 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:49:26.303000 audit[3457]: AVC avc: denied { write } for pid=3457 comm="tee" name="fd" dev="proc" ino=75806 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:49:26.303000 audit[3459]: AVC avc: denied { write } for pid=3459 comm="tee" name="fd" dev="proc" ino=52291 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:49:26.303000 audit[3458]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffedf5697e a2=241 a3=1b6 items=1 ppid=3424 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.303000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 19:49:26.303000 audit[3460]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffff8ae96e a2=241 a3=1b6 items=1 ppid=3423 pid=3460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.303000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 19:49:26.303000 audit: PATH item=0 name="/dev/fd/63" inode=44075 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:49:26.303000 audit: PATH item=0 name="/dev/fd/63" inode=47148 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:49:26.303000 audit[3457]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff692197d a2=241 a3=1b6 items=1 ppid=3422 pid=3457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.303000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 19:49:26.303000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:49:26.303000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:49:26.303000 audit: PATH item=0 name="/dev/fd/63" inode=31822 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:49:26.303000 audit[3459]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff1e6397f a2=241 a3=1b6 items=1 ppid=3425 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.303000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 19:49:26.303000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:49:26.303000 audit: PATH item=0 name="/dev/fd/63" inode=45283 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:49:26.303000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:49:26.303000 audit[3467]: AVC avc: denied { write } for pid=3467 comm="tee" name="fd" dev="proc" ino=82960 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:49:26.303000 audit[3467]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd44cd97d a2=241 a3=1b6 items=1 ppid=3427 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.303000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 19:49:26.303000 audit: PATH item=0 name="/dev/fd/63" inode=46124 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:49:26.303000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:49:26.303000 audit[3469]: AVC avc: denied { write } for pid=3469 comm="tee" name="fd" dev="proc" ino=85025 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:49:26.303000 audit[3469]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff943297d a2=241 a3=1b6 items=1 ppid=3428 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.303000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 19:49:26.303000 audit: PATH item=0 name="/dev/fd/63" inode=49180 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:49:26.303000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:49:26.303000 audit[3472]: AVC avc: denied { write } for pid=3472 comm="tee" name="fd" dev="proc" ino=88122 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 19:49:26.303000 audit[3472]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd8f4896d a2=241 a3=1b6 items=1 ppid=3429 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.303000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 19:49:26.303000 audit: PATH item=0 name="/dev/fd/63" inode=50247 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:49:26.303000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 19:49:26.391060 kernel: Initializing XFRM netlink socket Apr 12 19:49:26.472728 systemd-timesyncd[2045]: Network configuration changed, trying to establish connection. Apr 12 19:49:26.475000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.475000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.475000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.475000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.475000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.475000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.475000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.475000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.475000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.475000 audit: BPF prog-id=87 op=LOAD Apr 12 19:49:26.475000 audit[3621]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffefe075e8 a2=70 a3=ffffefe07658 items=0 ppid=3436 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.475000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:49:26.476000 audit: BPF prog-id=87 op=UNLOAD Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit: BPF prog-id=88 op=LOAD Apr 12 19:49:26.476000 audit[3621]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffefe075e8 a2=70 a3=4b243c items=0 ppid=3436 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.476000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:49:26.476000 audit: BPF prog-id=88 op=UNLOAD Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit[3621]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffefe075a0 a2=70 a3=ffffefe07610 items=0 ppid=3436 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.476000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit: BPF prog-id=89 op=LOAD Apr 12 19:49:26.476000 audit[3621]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffefe07588 a2=70 a3=ffffefe075f8 items=0 ppid=3436 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.476000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:49:26.476000 audit: BPF prog-id=89 op=UNLOAD Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit[3621]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffefe07658 a2=70 a3=0 items=0 ppid=3436 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.476000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit[3621]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffefe07648 a2=70 a3=0 items=0 ppid=3436 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.476000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:49:26.476000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.476000 audit[3621]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffefe075b8 a2=70 a3=0 items=0 ppid=3436 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.476000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:49:26.477000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.477000 audit[3621]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffefe07690 a2=70 a3=28c3a9ef items=0 ppid=3436 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.477000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:49:26.477000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.477000 audit[3621]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffefe07690 a2=70 a3=28c3a9ef items=0 ppid=3436 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.477000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:49:26.477000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.477000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.477000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.477000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.477000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.477000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.477000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.477000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.477000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.477000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.477000 audit: BPF prog-id=90 op=LOAD Apr 12 19:49:26.477000 audit[3621]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffefe075b8 a2=70 a3=28c3aa09 items=0 ppid=3436 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.477000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 19:49:26.479000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.479000 audit[3625]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff215b638 a2=70 a3=fffff215b6a8 items=0 ppid=3436 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.479000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 19:49:26.479000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:26.479000 audit[3625]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff215b508 a2=70 a3=fffff215b578 items=0 ppid=3436 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.479000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 19:49:26.496000 audit: BPF prog-id=90 op=UNLOAD Apr 12 19:49:26.541000 audit[3808]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=3808 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:49:26.541000 audit[3808]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffcc0a6fe0 a2=0 a3=ffffa2861fa8 items=0 ppid=3436 pid=3808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.541000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:49:26.544000 audit[3806]: NETFILTER_CFG table=raw:66 family=2 entries=19 op=nft_register_chain pid=3806 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:49:26.544000 audit[3806]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=ffffc0281a00 a2=0 a3=ffffbba99fa8 items=0 ppid=3436 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.544000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:49:26.545000 audit[3807]: NETFILTER_CFG table=nat:67 family=2 entries=15 op=nft_register_chain pid=3807 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:49:26.545000 audit[3807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffcdfd70a0 a2=0 a3=ffffa2f22fa8 items=0 ppid=3436 pid=3807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.545000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:49:26.547000 audit[3811]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=3811 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:49:26.547000 audit[3811]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffdab3b050 a2=0 a3=ffffa3155fa8 items=0 ppid=3436 pid=3811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:26.547000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:49:26.563056 kubelet[2512]: E0412 19:49:26.562964 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:25.876145 systemd-resolved[2042]: Clock change detected. Flushing caches. Apr 12 19:49:25.911720 systemd-journald[1898]: Time jumped backwards, rotating. Apr 12 19:49:25.876320 systemd-timesyncd[2045]: Contacted time server [2604:a880:400:d0::83:2002]:123 (2.flatcar.pool.ntp.org). Apr 12 19:49:25.876370 systemd-timesyncd[2045]: Initial clock synchronization to Fri 2024-04-12 19:49:25.876088 UTC. Apr 12 19:49:26.614130 systemd-networkd[1927]: vxlan.calico: Link UP Apr 12 19:49:26.614135 systemd-networkd[1927]: vxlan.calico: Gained carrier Apr 12 19:49:26.778422 kubelet[2512]: E0412 19:49:26.778372 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:27.779484 kubelet[2512]: E0412 19:49:27.779444 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:28.017347 systemd-networkd[1927]: vxlan.calico: Gained IPv6LL Apr 12 19:49:28.779802 kubelet[2512]: E0412 19:49:28.779763 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:29.780503 kubelet[2512]: E0412 19:49:29.780462 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:30.781577 kubelet[2512]: E0412 19:49:30.781553 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:31.782621 kubelet[2512]: E0412 19:49:31.782584 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:32.768022 kubelet[2512]: E0412 19:49:32.767994 2512 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:32.782654 kubelet[2512]: E0412 19:49:32.782636 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:33.783417 kubelet[2512]: E0412 19:49:33.783371 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:33.849216 env[2107]: time="2024-04-12T19:49:33.849154652Z" level=info msg="StopPodSandbox for \"c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e\"" Apr 12 19:49:33.849517 env[2107]: time="2024-04-12T19:49:33.849264172Z" level=info msg="StopPodSandbox for \"63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae\"" Apr 12 19:49:33.931385 env[2107]: 2024-04-12 19:49:33.892 [INFO][3899] k8s.go 585: Cleaning up netns ContainerID="63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae" Apr 12 19:49:33.931385 env[2107]: 2024-04-12 19:49:33.892 [INFO][3899] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae" iface="eth0" netns="/var/run/netns/cni-7f0faa69-1873-2bc7-f266-d32c618b522a" Apr 12 19:49:33.931385 env[2107]: 2024-04-12 19:49:33.892 [INFO][3899] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae" iface="eth0" netns="/var/run/netns/cni-7f0faa69-1873-2bc7-f266-d32c618b522a" Apr 12 19:49:33.931385 env[2107]: 2024-04-12 19:49:33.892 [INFO][3899] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae" iface="eth0" netns="/var/run/netns/cni-7f0faa69-1873-2bc7-f266-d32c618b522a" Apr 12 19:49:33.931385 env[2107]: 2024-04-12 19:49:33.892 [INFO][3899] k8s.go 592: Releasing IP address(es) ContainerID="63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae" Apr 12 19:49:33.931385 env[2107]: 2024-04-12 19:49:33.892 [INFO][3899] utils.go 188: Calico CNI releasing IP address ContainerID="63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae" Apr 12 19:49:33.931385 env[2107]: 2024-04-12 19:49:33.919 [INFO][3935] ipam_plugin.go 415: Releasing address using handleID ContainerID="63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae" HandleID="k8s-pod-network.63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae" Workload="10.26.37.141-k8s-csi--node--driver--xghtm-eth0" Apr 12 19:49:33.931385 env[2107]: 2024-04-12 19:49:33.920 [INFO][3935] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:49:33.931385 env[2107]: 2024-04-12 19:49:33.920 [INFO][3935] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:49:33.931385 env[2107]: 2024-04-12 19:49:33.928 [WARNING][3935] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae" HandleID="k8s-pod-network.63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae" Workload="10.26.37.141-k8s-csi--node--driver--xghtm-eth0" Apr 12 19:49:33.931385 env[2107]: 2024-04-12 19:49:33.928 [INFO][3935] ipam_plugin.go 443: Releasing address using workloadID ContainerID="63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae" HandleID="k8s-pod-network.63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae" Workload="10.26.37.141-k8s-csi--node--driver--xghtm-eth0" Apr 12 19:49:33.931385 env[2107]: 2024-04-12 19:49:33.929 [INFO][3935] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:49:33.931385 env[2107]: 2024-04-12 19:49:33.930 [INFO][3899] k8s.go 598: Teardown processing complete. ContainerID="63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae" Apr 12 19:49:33.931750 env[2107]: time="2024-04-12T19:49:33.931535612Z" level=info msg="TearDown network for sandbox \"63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae\" successfully" Apr 12 19:49:33.931750 env[2107]: time="2024-04-12T19:49:33.931563692Z" level=info msg="StopPodSandbox for \"63b905448735599df09621a245a0d1fce924d295ea4a4df635adcc4162deb3ae\" returns successfully" Apr 12 19:49:33.932065 env[2107]: time="2024-04-12T19:49:33.932044532Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xghtm,Uid:dad67a8f-5bcf-45e8-a1e7-0affbec778a5,Namespace:calico-system,Attempt:1,}" Apr 12 19:49:33.932702 systemd[1]: run-netns-cni\x2d7f0faa69\x2d1873\x2d2bc7\x2df266\x2dd32c618b522a.mount: Deactivated successfully. Apr 12 19:49:33.941348 env[2107]: 2024-04-12 19:49:33.891 [INFO][3900] k8s.go 585: Cleaning up netns ContainerID="c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e" Apr 12 19:49:33.941348 env[2107]: 2024-04-12 19:49:33.891 [INFO][3900] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e" iface="eth0" netns="/var/run/netns/cni-af5c4859-f8a3-b224-3be0-28c486e5d082" Apr 12 19:49:33.941348 env[2107]: 2024-04-12 19:49:33.891 [INFO][3900] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e" iface="eth0" netns="/var/run/netns/cni-af5c4859-f8a3-b224-3be0-28c486e5d082" Apr 12 19:49:33.941348 env[2107]: 2024-04-12 19:49:33.891 [INFO][3900] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e" iface="eth0" netns="/var/run/netns/cni-af5c4859-f8a3-b224-3be0-28c486e5d082" Apr 12 19:49:33.941348 env[2107]: 2024-04-12 19:49:33.891 [INFO][3900] k8s.go 592: Releasing IP address(es) ContainerID="c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e" Apr 12 19:49:33.941348 env[2107]: 2024-04-12 19:49:33.891 [INFO][3900] utils.go 188: Calico CNI releasing IP address ContainerID="c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e" Apr 12 19:49:33.941348 env[2107]: 2024-04-12 19:49:33.919 [INFO][3934] ipam_plugin.go 415: Releasing address using handleID ContainerID="c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e" HandleID="k8s-pod-network.c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e" Workload="10.26.37.141-k8s-nginx--deployment--6d5f899847--dhkr4-eth0" Apr 12 19:49:33.941348 env[2107]: 2024-04-12 19:49:33.920 [INFO][3934] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:49:33.941348 env[2107]: 2024-04-12 19:49:33.929 [INFO][3934] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:49:33.941348 env[2107]: 2024-04-12 19:49:33.936 [WARNING][3934] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e" HandleID="k8s-pod-network.c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e" Workload="10.26.37.141-k8s-nginx--deployment--6d5f899847--dhkr4-eth0" Apr 12 19:49:33.941348 env[2107]: 2024-04-12 19:49:33.937 [INFO][3934] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e" HandleID="k8s-pod-network.c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e" Workload="10.26.37.141-k8s-nginx--deployment--6d5f899847--dhkr4-eth0" Apr 12 19:49:33.941348 env[2107]: 2024-04-12 19:49:33.938 [INFO][3934] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:49:33.941348 env[2107]: 2024-04-12 19:49:33.939 [INFO][3900] k8s.go 598: Teardown processing complete. ContainerID="c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e" Apr 12 19:49:33.941692 env[2107]: time="2024-04-12T19:49:33.941486052Z" level=info msg="TearDown network for sandbox \"c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e\" successfully" Apr 12 19:49:33.941692 env[2107]: time="2024-04-12T19:49:33.941510132Z" level=info msg="StopPodSandbox for \"c33d088c137e473f5ec084fc8b5580ee39eea663de4837f696cc2e1c38b9212e\" returns successfully" Apr 12 19:49:33.941931 env[2107]: time="2024-04-12T19:49:33.941904932Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-dhkr4,Uid:f134d199-7775-484b-b23f-18581c50f11f,Namespace:default,Attempt:1,}" Apr 12 19:49:33.942443 systemd[1]: run-netns-cni\x2daf5c4859\x2df8a3\x2db224\x2d3be0\x2d28c486e5d082.mount: Deactivated successfully. Apr 12 19:49:34.021010 systemd-networkd[1927]: cali0fd90e16d1a: Link UP Apr 12 19:49:34.046362 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 19:49:34.046403 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0fd90e16d1a: link becomes ready Apr 12 19:49:34.046446 systemd-networkd[1927]: cali0fd90e16d1a: Gained carrier Apr 12 19:49:34.047374 systemd-networkd[1927]: cali2cedd128e5c: Link UP Apr 12 19:49:34.053533 env[2107]: 2024-04-12 19:49:33.964 [INFO][3967] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.26.37.141-k8s-csi--node--driver--xghtm-eth0 csi-node-driver- calico-system dad67a8f-5bcf-45e8-a1e7-0affbec778a5 1818 0 2024-04-12 19:49:12 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.26.37.141 csi-node-driver-xghtm eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali0fd90e16d1a [] []}} ContainerID="5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341" Namespace="calico-system" Pod="csi-node-driver-xghtm" WorkloadEndpoint="10.26.37.141-k8s-csi--node--driver--xghtm-" Apr 12 19:49:34.053533 env[2107]: 2024-04-12 19:49:33.964 [INFO][3967] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341" Namespace="calico-system" Pod="csi-node-driver-xghtm" WorkloadEndpoint="10.26.37.141-k8s-csi--node--driver--xghtm-eth0" Apr 12 19:49:34.053533 env[2107]: 2024-04-12 19:49:33.987 [INFO][4017] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341" HandleID="k8s-pod-network.5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341" Workload="10.26.37.141-k8s-csi--node--driver--xghtm-eth0" Apr 12 19:49:34.053533 env[2107]: 2024-04-12 19:49:34.001 [INFO][4017] ipam_plugin.go 268: Auto assigning IP ContainerID="5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341" HandleID="k8s-pod-network.5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341" Workload="10.26.37.141-k8s-csi--node--driver--xghtm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004c5c0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.26.37.141", "pod":"csi-node-driver-xghtm", "timestamp":"2024-04-12 19:49:33.987450692 +0000 UTC"}, Hostname:"10.26.37.141", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:49:34.053533 env[2107]: 2024-04-12 19:49:34.001 [INFO][4017] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:49:34.053533 env[2107]: 2024-04-12 19:49:34.001 [INFO][4017] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:49:34.053533 env[2107]: 2024-04-12 19:49:34.001 [INFO][4017] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.26.37.141' Apr 12 19:49:34.053533 env[2107]: 2024-04-12 19:49:34.002 [INFO][4017] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341" host="10.26.37.141" Apr 12 19:49:34.053533 env[2107]: 2024-04-12 19:49:34.005 [INFO][4017] ipam.go 372: Looking up existing affinities for host host="10.26.37.141" Apr 12 19:49:34.053533 env[2107]: 2024-04-12 19:49:34.008 [INFO][4017] ipam.go 489: Trying affinity for 192.168.29.192/26 host="10.26.37.141" Apr 12 19:49:34.053533 env[2107]: 2024-04-12 19:49:34.009 [INFO][4017] ipam.go 155: Attempting to load block cidr=192.168.29.192/26 host="10.26.37.141" Apr 12 19:49:34.053533 env[2107]: 2024-04-12 19:49:34.011 [INFO][4017] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.29.192/26 host="10.26.37.141" Apr 12 19:49:34.053533 env[2107]: 2024-04-12 19:49:34.011 [INFO][4017] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.29.192/26 handle="k8s-pod-network.5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341" host="10.26.37.141" Apr 12 19:49:34.053533 env[2107]: 2024-04-12 19:49:34.012 [INFO][4017] ipam.go 1682: Creating new handle: k8s-pod-network.5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341 Apr 12 19:49:34.053533 env[2107]: 2024-04-12 19:49:34.014 [INFO][4017] ipam.go 1203: Writing block in order to claim IPs block=192.168.29.192/26 handle="k8s-pod-network.5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341" host="10.26.37.141" Apr 12 19:49:34.053533 env[2107]: 2024-04-12 19:49:34.018 [INFO][4017] ipam.go 1216: Successfully claimed IPs: [192.168.29.193/26] block=192.168.29.192/26 handle="k8s-pod-network.5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341" host="10.26.37.141" Apr 12 19:49:34.053533 env[2107]: 2024-04-12 19:49:34.018 [INFO][4017] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.29.193/26] handle="k8s-pod-network.5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341" host="10.26.37.141" Apr 12 19:49:34.053533 env[2107]: 2024-04-12 19:49:34.018 [INFO][4017] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:49:34.053533 env[2107]: 2024-04-12 19:49:34.018 [INFO][4017] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.29.193/26] IPv6=[] ContainerID="5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341" HandleID="k8s-pod-network.5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341" Workload="10.26.37.141-k8s-csi--node--driver--xghtm-eth0" Apr 12 19:49:34.053896 env[2107]: 2024-04-12 19:49:34.019 [INFO][3967] k8s.go 385: Populated endpoint ContainerID="5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341" Namespace="calico-system" Pod="csi-node-driver-xghtm" WorkloadEndpoint="10.26.37.141-k8s-csi--node--driver--xghtm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.26.37.141-k8s-csi--node--driver--xghtm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"dad67a8f-5bcf-45e8-a1e7-0affbec778a5", ResourceVersion:"1818", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 49, 12, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.26.37.141", ContainerID:"", Pod:"csi-node-driver-xghtm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0fd90e16d1a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:49:34.053896 env[2107]: 2024-04-12 19:49:34.019 [INFO][3967] k8s.go 386: Calico CNI using IPs: [192.168.29.193/32] ContainerID="5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341" Namespace="calico-system" Pod="csi-node-driver-xghtm" WorkloadEndpoint="10.26.37.141-k8s-csi--node--driver--xghtm-eth0" Apr 12 19:49:34.053896 env[2107]: 2024-04-12 19:49:34.019 [INFO][3967] dataplane_linux.go 68: Setting the host side veth name to cali0fd90e16d1a ContainerID="5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341" Namespace="calico-system" Pod="csi-node-driver-xghtm" WorkloadEndpoint="10.26.37.141-k8s-csi--node--driver--xghtm-eth0" Apr 12 19:49:34.053896 env[2107]: 2024-04-12 19:49:34.046 [INFO][3967] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341" Namespace="calico-system" Pod="csi-node-driver-xghtm" WorkloadEndpoint="10.26.37.141-k8s-csi--node--driver--xghtm-eth0" Apr 12 19:49:34.053896 env[2107]: 2024-04-12 19:49:34.047 [INFO][3967] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341" Namespace="calico-system" Pod="csi-node-driver-xghtm" WorkloadEndpoint="10.26.37.141-k8s-csi--node--driver--xghtm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.26.37.141-k8s-csi--node--driver--xghtm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"dad67a8f-5bcf-45e8-a1e7-0affbec778a5", ResourceVersion:"1818", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 49, 12, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.26.37.141", ContainerID:"5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341", Pod:"csi-node-driver-xghtm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0fd90e16d1a", MAC:"de:64:dd:cf:f9:32", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:49:34.053896 env[2107]: 2024-04-12 19:49:34.052 [INFO][3967] k8s.go 498: Wrote updated endpoint to datastore ContainerID="5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341" Namespace="calico-system" Pod="csi-node-driver-xghtm" WorkloadEndpoint="10.26.37.141-k8s-csi--node--driver--xghtm-eth0" Apr 12 19:49:34.061407 systemd-networkd[1927]: cali2cedd128e5c: Gained carrier Apr 12 19:49:34.061962 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2cedd128e5c: link becomes ready Apr 12 19:49:34.062444 env[2107]: time="2024-04-12T19:49:34.062399692Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:49:34.062444 env[2107]: time="2024-04-12T19:49:34.062436532Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:49:34.062501 env[2107]: time="2024-04-12T19:49:34.062447172Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:49:34.062598 env[2107]: time="2024-04-12T19:49:34.062572932Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341 pid=4091 runtime=io.containerd.runc.v2 Apr 12 19:49:34.063000 audit[4102]: NETFILTER_CFG table=filter:69 family=2 entries=36 op=nft_register_chain pid=4102 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:49:34.072299 systemd[1]: Started cri-containerd-5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341.scope. Apr 12 19:49:34.075645 kernel: kauditd_printk_skb: 157 callbacks suppressed Apr 12 19:49:34.075675 kernel: audit: type=1325 audit(1712951374.063:700): table=filter:69 family=2 entries=36 op=nft_register_chain pid=4102 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:49:34.076892 env[2107]: 2024-04-12 19:49:33.972 [INFO][3982] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.26.37.141-k8s-nginx--deployment--6d5f899847--dhkr4-eth0 nginx-deployment-6d5f899847- default f134d199-7775-484b-b23f-18581c50f11f 1817 0 2024-04-12 19:49:21 +0000 UTC <nil> <nil> map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.26.37.141 nginx-deployment-6d5f899847-dhkr4 eth0 default [] [] [kns.default ksa.default.default] cali2cedd128e5c [] []}} ContainerID="0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9" Namespace="default" Pod="nginx-deployment-6d5f899847-dhkr4" WorkloadEndpoint="10.26.37.141-k8s-nginx--deployment--6d5f899847--dhkr4-" Apr 12 19:49:34.076892 env[2107]: 2024-04-12 19:49:33.972 [INFO][3982] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9" Namespace="default" Pod="nginx-deployment-6d5f899847-dhkr4" WorkloadEndpoint="10.26.37.141-k8s-nginx--deployment--6d5f899847--dhkr4-eth0" Apr 12 19:49:34.076892 env[2107]: 2024-04-12 19:49:33.992 [INFO][4022] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9" HandleID="k8s-pod-network.0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9" Workload="10.26.37.141-k8s-nginx--deployment--6d5f899847--dhkr4-eth0" Apr 12 19:49:34.076892 env[2107]: 2024-04-12 19:49:34.002 [INFO][4022] ipam_plugin.go 268: Auto assigning IP ContainerID="0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9" HandleID="k8s-pod-network.0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9" Workload="10.26.37.141-k8s-nginx--deployment--6d5f899847--dhkr4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000440590), Attrs:map[string]string{"namespace":"default", "node":"10.26.37.141", "pod":"nginx-deployment-6d5f899847-dhkr4", "timestamp":"2024-04-12 19:49:33.992755132 +0000 UTC"}, Hostname:"10.26.37.141", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:49:34.076892 env[2107]: 2024-04-12 19:49:34.002 [INFO][4022] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:49:34.076892 env[2107]: 2024-04-12 19:49:34.018 [INFO][4022] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:49:34.076892 env[2107]: 2024-04-12 19:49:34.018 [INFO][4022] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.26.37.141' Apr 12 19:49:34.076892 env[2107]: 2024-04-12 19:49:34.019 [INFO][4022] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9" host="10.26.37.141" Apr 12 19:49:34.076892 env[2107]: 2024-04-12 19:49:34.022 [INFO][4022] ipam.go 372: Looking up existing affinities for host host="10.26.37.141" Apr 12 19:49:34.076892 env[2107]: 2024-04-12 19:49:34.025 [INFO][4022] ipam.go 489: Trying affinity for 192.168.29.192/26 host="10.26.37.141" Apr 12 19:49:34.076892 env[2107]: 2024-04-12 19:49:34.026 [INFO][4022] ipam.go 155: Attempting to load block cidr=192.168.29.192/26 host="10.26.37.141" Apr 12 19:49:34.076892 env[2107]: 2024-04-12 19:49:34.028 [INFO][4022] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.29.192/26 host="10.26.37.141" Apr 12 19:49:34.076892 env[2107]: 2024-04-12 19:49:34.028 [INFO][4022] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.29.192/26 handle="k8s-pod-network.0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9" host="10.26.37.141" Apr 12 19:49:34.076892 env[2107]: 2024-04-12 19:49:34.029 [INFO][4022] ipam.go 1682: Creating new handle: k8s-pod-network.0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9 Apr 12 19:49:34.076892 env[2107]: 2024-04-12 19:49:34.032 [INFO][4022] ipam.go 1203: Writing block in order to claim IPs block=192.168.29.192/26 handle="k8s-pod-network.0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9" host="10.26.37.141" Apr 12 19:49:34.076892 env[2107]: 2024-04-12 19:49:34.036 [INFO][4022] ipam.go 1216: Successfully claimed IPs: [192.168.29.194/26] block=192.168.29.192/26 handle="k8s-pod-network.0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9" host="10.26.37.141" Apr 12 19:49:34.076892 env[2107]: 2024-04-12 19:49:34.037 [INFO][4022] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.29.194/26] handle="k8s-pod-network.0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9" host="10.26.37.141" Apr 12 19:49:34.076892 env[2107]: 2024-04-12 19:49:34.037 [INFO][4022] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:49:34.076892 env[2107]: 2024-04-12 19:49:34.037 [INFO][4022] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.29.194/26] IPv6=[] ContainerID="0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9" HandleID="k8s-pod-network.0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9" Workload="10.26.37.141-k8s-nginx--deployment--6d5f899847--dhkr4-eth0" Apr 12 19:49:34.077245 env[2107]: 2024-04-12 19:49:34.039 [INFO][3982] k8s.go 385: Populated endpoint ContainerID="0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9" Namespace="default" Pod="nginx-deployment-6d5f899847-dhkr4" WorkloadEndpoint="10.26.37.141-k8s-nginx--deployment--6d5f899847--dhkr4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.26.37.141-k8s-nginx--deployment--6d5f899847--dhkr4-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"f134d199-7775-484b-b23f-18581c50f11f", ResourceVersion:"1817", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 49, 21, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.26.37.141", ContainerID:"", Pod:"nginx-deployment-6d5f899847-dhkr4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2cedd128e5c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:49:34.077245 env[2107]: 2024-04-12 19:49:34.039 [INFO][3982] k8s.go 386: Calico CNI using IPs: [192.168.29.194/32] ContainerID="0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9" Namespace="default" Pod="nginx-deployment-6d5f899847-dhkr4" WorkloadEndpoint="10.26.37.141-k8s-nginx--deployment--6d5f899847--dhkr4-eth0" Apr 12 19:49:34.077245 env[2107]: 2024-04-12 19:49:34.039 [INFO][3982] dataplane_linux.go 68: Setting the host side veth name to cali2cedd128e5c ContainerID="0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9" Namespace="default" Pod="nginx-deployment-6d5f899847-dhkr4" WorkloadEndpoint="10.26.37.141-k8s-nginx--deployment--6d5f899847--dhkr4-eth0" Apr 12 19:49:34.077245 env[2107]: 2024-04-12 19:49:34.061 [INFO][3982] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9" Namespace="default" Pod="nginx-deployment-6d5f899847-dhkr4" WorkloadEndpoint="10.26.37.141-k8s-nginx--deployment--6d5f899847--dhkr4-eth0" Apr 12 19:49:34.077245 env[2107]: 2024-04-12 19:49:34.061 [INFO][3982] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9" Namespace="default" Pod="nginx-deployment-6d5f899847-dhkr4" WorkloadEndpoint="10.26.37.141-k8s-nginx--deployment--6d5f899847--dhkr4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.26.37.141-k8s-nginx--deployment--6d5f899847--dhkr4-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"f134d199-7775-484b-b23f-18581c50f11f", ResourceVersion:"1817", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 49, 21, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.26.37.141", ContainerID:"0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9", Pod:"nginx-deployment-6d5f899847-dhkr4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2cedd128e5c", MAC:"92:4e:b8:9d:d9:fd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:49:34.077245 env[2107]: 2024-04-12 19:49:34.065 [INFO][3982] k8s.go 498: Wrote updated endpoint to datastore ContainerID="0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9" Namespace="default" Pod="nginx-deployment-6d5f899847-dhkr4" WorkloadEndpoint="10.26.37.141-k8s-nginx--deployment--6d5f899847--dhkr4-eth0" Apr 12 19:49:34.088386 env[2107]: time="2024-04-12T19:49:34.088335372Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:49:34.088386 env[2107]: time="2024-04-12T19:49:34.088368412Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:49:34.088509 env[2107]: time="2024-04-12T19:49:34.088485732Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:49:34.088699 env[2107]: time="2024-04-12T19:49:34.088668052Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9 pid=4130 runtime=io.containerd.runc.v2 Apr 12 19:49:34.097434 systemd[1]: Started cri-containerd-0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9.scope. Apr 12 19:49:34.063000 audit[4102]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20404 a0=3 a1=ffffe5e6fed0 a2=0 a3=ffff99f6efa8 items=0 ppid=3436 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:34.158138 kernel: audit: type=1300 audit(1712951374.063:700): arch=c00000b7 syscall=211 success=yes exit=20404 a0=3 a1=ffffe5e6fed0 a2=0 a3=ffff99f6efa8 items=0 ppid=3436 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:34.158171 kernel: audit: type=1327 audit(1712951374.063:700): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:49:34.063000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:49:34.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.230180 kernel: audit: type=1400 audit(1712951374.128:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.230200 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 19:49:34.230213 kernel: audit: type=1400 audit(1712951374.128:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.230961 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 19:49:34.230974 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 19:49:34.230990 kernel: audit: backlog limit exceeded Apr 12 19:49:34.241282 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 19:49:34.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.157000 audit: BPF prog-id=91 op=LOAD Apr 12 19:49:34.157000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.157000 audit[4105]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4091 pid=4105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:34.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566363765336535323164303137336230653039646261633830633733 Apr 12 19:49:34.157000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.157000 audit[4105]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4091 pid=4105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:34.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566363765336535323164303137336230653039646261633830633733 Apr 12 19:49:34.157000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.157000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.157000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.157000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.157000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.157000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.157000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.157000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.157000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.192000 audit: BPF prog-id=92 op=LOAD Apr 12 19:49:34.157000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.157000 audit: BPF prog-id=93 op=LOAD Apr 12 19:49:34.157000 audit[4105]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4091 pid=4105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:34.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566363765336535323164303137336230653039646261633830633733 Apr 12 19:49:34.192000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.192000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.192000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.192000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.192000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.192000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.192000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.192000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.192000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.192000 audit[4140]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4130 pid=4140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:34.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064616236393266383835366430316230623663383362323263333038 Apr 12 19:49:34.192000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.192000 audit[4140]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4130 pid=4140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:34.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064616236393266383835366430316230623663383362323263333038 Apr 12 19:49:34.192000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.192000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.192000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.192000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.192000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.192000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.192000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.192000 audit[4105]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4091 pid=4105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:34.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566363765336535323164303137336230653039646261633830633733 Apr 12 19:49:34.321000 audit: BPF prog-id=94 op=UNLOAD Apr 12 19:49:34.192000 audit[4140]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4130 pid=4140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:34.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064616236393266383835366430316230623663383362323263333038 Apr 12 19:49:34.321000 audit: BPF prog-id=93 op=UNLOAD Apr 12 19:49:34.321000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4105]: AVC avc: denied { perfmon } for pid=4105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit: BPF prog-id=96 op=LOAD Apr 12 19:49:34.321000 audit[4140]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4130 pid=4140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:34.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064616236393266383835366430316230623663383362323263333038 Apr 12 19:49:34.321000 audit: BPF prog-id=96 op=UNLOAD Apr 12 19:49:34.321000 audit: BPF prog-id=95 op=UNLOAD Apr 12 19:49:34.321000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4140]: AVC avc: denied { perfmon } for pid=4140 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit[4105]: AVC avc: denied { bpf } for pid=4105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit: BPF prog-id=97 op=LOAD Apr 12 19:49:34.321000 audit[4105]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4091 pid=4105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:34.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566363765336535323164303137336230653039646261633830633733 Apr 12 19:49:34.321000 audit[4140]: AVC avc: denied { bpf } for pid=4140 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.321000 audit: BPF prog-id=98 op=LOAD Apr 12 19:49:34.321000 audit[4140]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4130 pid=4140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:34.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064616236393266383835366430316230623663383362323263333038 Apr 12 19:49:34.329452 env[2107]: time="2024-04-12T19:49:34.329416692Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xghtm,Uid:dad67a8f-5bcf-45e8-a1e7-0affbec778a5,Namespace:calico-system,Attempt:1,} returns sandbox id \"5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341\"" Apr 12 19:49:34.330441 env[2107]: time="2024-04-12T19:49:34.330423412Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 19:49:34.336212 env[2107]: time="2024-04-12T19:49:34.336185372Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-dhkr4,Uid:f134d199-7775-484b-b23f-18581c50f11f,Namespace:default,Attempt:1,} returns sandbox id \"0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9\"" Apr 12 19:49:34.342000 audit[4181]: NETFILTER_CFG table=filter:70 family=2 entries=40 op=nft_register_chain pid=4181 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:49:34.342000 audit[4181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21560 a0=3 a1=ffffd0731f50 a2=0 a3=ffffaa633fa8 items=0 ppid=3436 pid=4181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:34.342000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:49:34.784022 kubelet[2512]: E0412 19:49:34.783993 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:34.792628 env[2107]: time="2024-04-12T19:49:34.792587492Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:34.793255 env[2107]: time="2024-04-12T19:49:34.793225292Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:34.794165 env[2107]: time="2024-04-12T19:49:34.794142892Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:34.795067 env[2107]: time="2024-04-12T19:49:34.795041692Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:34.795591 env[2107]: time="2024-04-12T19:49:34.795561852Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db\"" Apr 12 19:49:34.796111 env[2107]: time="2024-04-12T19:49:34.796090332Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 19:49:34.797019 env[2107]: time="2024-04-12T19:49:34.796995332Z" level=info msg="CreateContainer within sandbox \"5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 19:49:34.803298 env[2107]: time="2024-04-12T19:49:34.803262572Z" level=info msg="CreateContainer within sandbox \"5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"e728f861de6a22c8fb0a66eb871021deb268a3202660c18cd39beeb7d1883d6b\"" Apr 12 19:49:34.803604 env[2107]: time="2024-04-12T19:49:34.803581532Z" level=info msg="StartContainer for \"e728f861de6a22c8fb0a66eb871021deb268a3202660c18cd39beeb7d1883d6b\"" Apr 12 19:49:34.816900 systemd[1]: Started cri-containerd-e728f861de6a22c8fb0a66eb871021deb268a3202660c18cd39beeb7d1883d6b.scope. Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4091 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:34.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537323866383631646536613232633866623061363665623837313032 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit: BPF prog-id=99 op=LOAD Apr 12 19:49:34.832000 audit[4189]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4091 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:34.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537323866383631646536613232633866623061363665623837313032 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit: BPF prog-id=100 op=LOAD Apr 12 19:49:34.832000 audit[4189]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4091 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:34.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537323866383631646536613232633866623061363665623837313032 Apr 12 19:49:34.832000 audit: BPF prog-id=100 op=UNLOAD Apr 12 19:49:34.832000 audit: BPF prog-id=99 op=UNLOAD Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:34.832000 audit: BPF prog-id=101 op=LOAD Apr 12 19:49:34.832000 audit[4189]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4091 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:34.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537323866383631646536613232633866623061363665623837313032 Apr 12 19:49:34.842880 env[2107]: time="2024-04-12T19:49:34.842832172Z" level=info msg="StartContainer for \"e728f861de6a22c8fb0a66eb871021deb268a3202660c18cd39beeb7d1883d6b\" returns successfully" Apr 12 19:49:35.121069 systemd-networkd[1927]: cali0fd90e16d1a: Gained IPv6LL Apr 12 19:49:35.785003 kubelet[2512]: E0412 19:49:35.784971 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:36.055270 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2032678041.mount: Deactivated successfully. Apr 12 19:49:36.081052 systemd-networkd[1927]: cali2cedd128e5c: Gained IPv6LL Apr 12 19:49:36.714190 env[2107]: time="2024-04-12T19:49:36.714150772Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:36.715148 env[2107]: time="2024-04-12T19:49:36.715123412Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:36.716588 env[2107]: time="2024-04-12T19:49:36.716563572Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:36.717921 env[2107]: time="2024-04-12T19:49:36.717897772Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:36.718563 env[2107]: time="2024-04-12T19:49:36.718537332Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56\"" Apr 12 19:49:36.719025 env[2107]: time="2024-04-12T19:49:36.719007292Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 19:49:36.719918 env[2107]: time="2024-04-12T19:49:36.719894452Z" level=info msg="CreateContainer within sandbox \"0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Apr 12 19:49:36.724850 env[2107]: time="2024-04-12T19:49:36.724817492Z" level=info msg="CreateContainer within sandbox \"0dab692f8856d01b0b6c83b22c3083144e31566a575cacad8a4636662a735cd9\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"9402d2bbf32ff361606b6c474c22fbdcc707c26983ffdc24f769f68c1e492c46\"" Apr 12 19:49:36.725311 env[2107]: time="2024-04-12T19:49:36.725283652Z" level=info msg="StartContainer for \"9402d2bbf32ff361606b6c474c22fbdcc707c26983ffdc24f769f68c1e492c46\"" Apr 12 19:49:36.738149 systemd[1]: Started cri-containerd-9402d2bbf32ff361606b6c474c22fbdcc707c26983ffdc24f769f68c1e492c46.scope. Apr 12 19:49:36.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit: BPF prog-id=102 op=LOAD Apr 12 19:49:36.750000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit[4235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4130 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:36.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934303264326262663332666633363136303662366334373463323266 Apr 12 19:49:36.750000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit[4235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4130 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:36.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934303264326262663332666633363136303662366334373463323266 Apr 12 19:49:36.750000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.750000 audit: BPF prog-id=103 op=LOAD Apr 12 19:49:36.750000 audit[4235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4130 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:36.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934303264326262663332666633363136303662366334373463323266 Apr 12 19:49:36.751000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.751000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.751000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.751000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.751000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.751000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.751000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.751000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.751000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.751000 audit: BPF prog-id=104 op=LOAD Apr 12 19:49:36.751000 audit[4235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4130 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:36.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934303264326262663332666633363136303662366334373463323266 Apr 12 19:49:36.751000 audit: BPF prog-id=104 op=UNLOAD Apr 12 19:49:36.751000 audit: BPF prog-id=103 op=UNLOAD Apr 12 19:49:36.751000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.751000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.751000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.751000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.751000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.751000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.751000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.751000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.751000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.751000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:36.751000 audit: BPF prog-id=105 op=LOAD Apr 12 19:49:36.751000 audit[4235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4130 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:36.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934303264326262663332666633363136303662366334373463323266 Apr 12 19:49:36.760114 env[2107]: time="2024-04-12T19:49:36.760077772Z" level=info msg="StartContainer for \"9402d2bbf32ff361606b6c474c22fbdcc707c26983ffdc24f769f68c1e492c46\" returns successfully" Apr 12 19:49:36.785444 kubelet[2512]: E0412 19:49:36.785425 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:36.914537 kubelet[2512]: I0412 19:49:36.914502 2512 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-dhkr4" podStartSLOduration=13.533145292 podStartE2EDuration="15.914467092s" podCreationTimestamp="2024-04-12 19:49:21 +0000 UTC" firstStartedPulling="2024-04-12 19:49:34.337474172 +0000 UTC m=+22.249177761" lastFinishedPulling="2024-04-12 19:49:36.718795932 +0000 UTC m=+24.630499561" observedRunningTime="2024-04-12 19:49:36.914139212 +0000 UTC m=+24.825842841" watchObservedRunningTime="2024-04-12 19:49:36.914467092 +0000 UTC m=+24.826170681" Apr 12 19:49:37.224180 env[2107]: time="2024-04-12T19:49:37.224140332Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:37.224749 env[2107]: time="2024-04-12T19:49:37.224724772Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:37.225674 env[2107]: time="2024-04-12T19:49:37.225655652Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:37.226497 env[2107]: time="2024-04-12T19:49:37.226478852Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:37.226914 env[2107]: time="2024-04-12T19:49:37.226886972Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146\"" Apr 12 19:49:37.229661 env[2107]: time="2024-04-12T19:49:37.229634572Z" level=info msg="CreateContainer within sandbox \"5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 19:49:37.235389 env[2107]: time="2024-04-12T19:49:37.235358252Z" level=info msg="CreateContainer within sandbox \"5f67e3e521d0173b0e09dbac80c73e7c9d329c400dcaef57e9a3b5d74245f341\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"6fa771e63a17e00c12471561a35bbd455fd84aa66a580bac3aa77655b46f8295\"" Apr 12 19:49:37.235749 env[2107]: time="2024-04-12T19:49:37.235722252Z" level=info msg="StartContainer for \"6fa771e63a17e00c12471561a35bbd455fd84aa66a580bac3aa77655b46f8295\"" Apr 12 19:49:37.250465 systemd[1]: Started cri-containerd-6fa771e63a17e00c12471561a35bbd455fd84aa66a580bac3aa77655b46f8295.scope. Apr 12 19:49:37.264000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.264000 audit[4371]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4091 pid=4371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:37.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666613737316536336131376530306331323437313536316133356262 Apr 12 19:49:37.264000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.264000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.264000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.264000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.264000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.264000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.264000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.264000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.264000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.264000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.264000 audit: BPF prog-id=106 op=LOAD Apr 12 19:49:37.264000 audit[4371]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4091 pid=4371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:37.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666613737316536336131376530306331323437313536316133356262 Apr 12 19:49:37.265000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.265000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.265000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.265000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.265000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.265000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.265000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.265000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.265000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.265000 audit: BPF prog-id=107 op=LOAD Apr 12 19:49:37.265000 audit[4371]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4091 pid=4371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:37.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666613737316536336131376530306331323437313536316133356262 Apr 12 19:49:37.265000 audit: BPF prog-id=107 op=UNLOAD Apr 12 19:49:37.265000 audit: BPF prog-id=106 op=UNLOAD Apr 12 19:49:37.265000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.265000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.265000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.265000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.265000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.265000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.265000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.265000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.265000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.265000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:37.265000 audit: BPF prog-id=108 op=LOAD Apr 12 19:49:37.265000 audit[4371]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4091 pid=4371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:37.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666613737316536336131376530306331323437313536316133356262 Apr 12 19:49:37.274520 env[2107]: time="2024-04-12T19:49:37.274483132Z" level=info msg="StartContainer for \"6fa771e63a17e00c12471561a35bbd455fd84aa66a580bac3aa77655b46f8295\" returns successfully" Apr 12 19:49:37.786483 kubelet[2512]: E0412 19:49:37.786456 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:37.822317 kubelet[2512]: I0412 19:49:37.822300 2512 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 19:49:37.822359 kubelet[2512]: I0412 19:49:37.822331 2512 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 19:49:37.919123 kubelet[2512]: I0412 19:49:37.919099 2512 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-xghtm" podStartSLOduration=23.022178332 podStartE2EDuration="25.919068332s" podCreationTimestamp="2024-04-12 19:49:12 +0000 UTC" firstStartedPulling="2024-04-12 19:49:34.330194212 +0000 UTC m=+22.241897801" lastFinishedPulling="2024-04-12 19:49:37.227084172 +0000 UTC m=+25.138787801" observedRunningTime="2024-04-12 19:49:37.918968572 +0000 UTC m=+25.830672161" watchObservedRunningTime="2024-04-12 19:49:37.919068332 +0000 UTC m=+25.830771921" Apr 12 19:49:38.787337 kubelet[2512]: E0412 19:49:38.787298 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:39.788252 kubelet[2512]: E0412 19:49:39.788211 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:40.789010 kubelet[2512]: E0412 19:49:40.788984 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:41.790101 kubelet[2512]: E0412 19:49:41.790078 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:42.226273 update_engine[2099]: I0412 19:49:42.226182 2099 update_attempter.cc:509] Updating boot flags... Apr 12 19:49:42.790390 kubelet[2512]: E0412 19:49:42.790366 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:42.998000 audit[4427]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=4427 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:49:43.008437 kubelet[2512]: I0412 19:49:43.008418 2512 topology_manager.go:215] "Topology Admit Handler" podUID="07f56b71-dafb-4bf8-b39e-d7921d641bbd" podNamespace="default" podName="nfs-server-provisioner-0" Apr 12 19:49:43.010411 kernel: kauditd_printk_skb: 265 callbacks suppressed Apr 12 19:49:43.010510 kernel: audit: type=1325 audit(1712951382.998:768): table=filter:71 family=2 entries=20 op=nft_register_rule pid=4427 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:49:43.012364 systemd[1]: Created slice kubepods-besteffort-pod07f56b71_dafb_4bf8_b39e_d7921d641bbd.slice. Apr 12 19:49:42.998000 audit[4427]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffdfe0db70 a2=0 a3=1 items=0 ppid=2764 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:43.044016 kubelet[2512]: I0412 19:49:43.043966 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/07f56b71-dafb-4bf8-b39e-d7921d641bbd-data\") pod \"nfs-server-provisioner-0\" (UID: \"07f56b71-dafb-4bf8-b39e-d7921d641bbd\") " pod="default/nfs-server-provisioner-0" Apr 12 19:49:43.044016 kubelet[2512]: I0412 19:49:43.044001 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7r22g\" (UniqueName: \"kubernetes.io/projected/07f56b71-dafb-4bf8-b39e-d7921d641bbd-kube-api-access-7r22g\") pod \"nfs-server-provisioner-0\" (UID: \"07f56b71-dafb-4bf8-b39e-d7921d641bbd\") " pod="default/nfs-server-provisioner-0" Apr 12 19:49:43.089542 kernel: audit: type=1300 audit(1712951382.998:768): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffdfe0db70 a2=0 a3=1 items=0 ppid=2764 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:43.089589 kernel: audit: type=1327 audit(1712951382.998:768): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:49:42.998000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:49:43.126000 audit[4427]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=4427 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:49:43.126000 audit[4427]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffdfe0db70 a2=0 a3=1 items=0 ppid=2764 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:43.207452 kernel: audit: type=1325 audit(1712951383.126:769): table=nat:72 family=2 entries=22 op=nft_register_rule pid=4427 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:49:43.207500 kernel: audit: type=1300 audit(1712951383.126:769): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffdfe0db70 a2=0 a3=1 items=0 ppid=2764 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:43.207537 kernel: audit: type=1327 audit(1712951383.126:769): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:49:43.126000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:49:43.243000 audit[4431]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=4431 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:49:43.243000 audit[4431]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffffd6582e0 a2=0 a3=1 items=0 ppid=2764 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:43.314737 env[2107]: time="2024-04-12T19:49:43.314681452Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:07f56b71-dafb-4bf8-b39e-d7921d641bbd,Namespace:default,Attempt:0,}" Apr 12 19:49:43.325935 kernel: audit: type=1325 audit(1712951383.243:770): table=filter:73 family=2 entries=32 op=nft_register_rule pid=4431 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:49:43.326047 kernel: audit: type=1300 audit(1712951383.243:770): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffffd6582e0 a2=0 a3=1 items=0 ppid=2764 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:43.326095 kernel: audit: type=1327 audit(1712951383.243:770): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:49:43.243000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:49:43.359000 audit[4431]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=4431 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:49:43.359000 audit[4431]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffffd6582e0 a2=0 a3=1 items=0 ppid=2764 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:43.388034 kernel: audit: type=1325 audit(1712951383.359:771): table=nat:74 family=2 entries=22 op=nft_register_rule pid=4431 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:49:43.359000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:49:43.407875 systemd-networkd[1927]: cali60e51b789ff: Link UP Apr 12 19:49:43.433003 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 19:49:43.433034 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Apr 12 19:49:43.433254 systemd-networkd[1927]: cali60e51b789ff: Gained carrier Apr 12 19:49:43.441624 env[2107]: 2024-04-12 19:49:43.349 [INFO][4432] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.26.37.141-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 07f56b71-dafb-4bf8-b39e-d7921d641bbd 1879 0 2024-04-12 19:49:43 +0000 UTC <nil> <nil> map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.26.37.141 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.26.37.141-k8s-nfs--server--provisioner--0-" Apr 12 19:49:43.441624 env[2107]: 2024-04-12 19:49:43.349 [INFO][4432] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.26.37.141-k8s-nfs--server--provisioner--0-eth0" Apr 12 19:49:43.441624 env[2107]: 2024-04-12 19:49:43.373 [INFO][4457] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98" HandleID="k8s-pod-network.5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98" Workload="10.26.37.141-k8s-nfs--server--provisioner--0-eth0" Apr 12 19:49:43.441624 env[2107]: 2024-04-12 19:49:43.384 [INFO][4457] ipam_plugin.go 268: Auto assigning IP ContainerID="5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98" HandleID="k8s-pod-network.5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98" Workload="10.26.37.141-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000348e20), Attrs:map[string]string{"namespace":"default", "node":"10.26.37.141", "pod":"nfs-server-provisioner-0", "timestamp":"2024-04-12 19:49:43.373522052 +0000 UTC"}, Hostname:"10.26.37.141", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:49:43.441624 env[2107]: 2024-04-12 19:49:43.384 [INFO][4457] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:49:43.441624 env[2107]: 2024-04-12 19:49:43.384 [INFO][4457] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:49:43.441624 env[2107]: 2024-04-12 19:49:43.384 [INFO][4457] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.26.37.141' Apr 12 19:49:43.441624 env[2107]: 2024-04-12 19:49:43.385 [INFO][4457] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98" host="10.26.37.141" Apr 12 19:49:43.441624 env[2107]: 2024-04-12 19:49:43.388 [INFO][4457] ipam.go 372: Looking up existing affinities for host host="10.26.37.141" Apr 12 19:49:43.441624 env[2107]: 2024-04-12 19:49:43.392 [INFO][4457] ipam.go 489: Trying affinity for 192.168.29.192/26 host="10.26.37.141" Apr 12 19:49:43.441624 env[2107]: 2024-04-12 19:49:43.393 [INFO][4457] ipam.go 155: Attempting to load block cidr=192.168.29.192/26 host="10.26.37.141" Apr 12 19:49:43.441624 env[2107]: 2024-04-12 19:49:43.395 [INFO][4457] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.29.192/26 host="10.26.37.141" Apr 12 19:49:43.441624 env[2107]: 2024-04-12 19:49:43.396 [INFO][4457] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.29.192/26 handle="k8s-pod-network.5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98" host="10.26.37.141" Apr 12 19:49:43.441624 env[2107]: 2024-04-12 19:49:43.397 [INFO][4457] ipam.go 1682: Creating new handle: k8s-pod-network.5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98 Apr 12 19:49:43.441624 env[2107]: 2024-04-12 19:49:43.401 [INFO][4457] ipam.go 1203: Writing block in order to claim IPs block=192.168.29.192/26 handle="k8s-pod-network.5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98" host="10.26.37.141" Apr 12 19:49:43.441624 env[2107]: 2024-04-12 19:49:43.404 [INFO][4457] ipam.go 1216: Successfully claimed IPs: [192.168.29.195/26] block=192.168.29.192/26 handle="k8s-pod-network.5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98" host="10.26.37.141" Apr 12 19:49:43.441624 env[2107]: 2024-04-12 19:49:43.404 [INFO][4457] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.29.195/26] handle="k8s-pod-network.5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98" host="10.26.37.141" Apr 12 19:49:43.441624 env[2107]: 2024-04-12 19:49:43.404 [INFO][4457] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:49:43.441624 env[2107]: 2024-04-12 19:49:43.404 [INFO][4457] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.29.195/26] IPv6=[] ContainerID="5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98" HandleID="k8s-pod-network.5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98" Workload="10.26.37.141-k8s-nfs--server--provisioner--0-eth0" Apr 12 19:49:43.442036 env[2107]: 2024-04-12 19:49:43.406 [INFO][4432] k8s.go 385: Populated endpoint ContainerID="5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.26.37.141-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.26.37.141-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"07f56b71-dafb-4bf8-b39e-d7921d641bbd", ResourceVersion:"1879", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 49, 43, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.26.37.141", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.29.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:49:43.442036 env[2107]: 2024-04-12 19:49:43.406 [INFO][4432] k8s.go 386: Calico CNI using IPs: [192.168.29.195/32] ContainerID="5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.26.37.141-k8s-nfs--server--provisioner--0-eth0" Apr 12 19:49:43.442036 env[2107]: 2024-04-12 19:49:43.406 [INFO][4432] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.26.37.141-k8s-nfs--server--provisioner--0-eth0" Apr 12 19:49:43.442036 env[2107]: 2024-04-12 19:49:43.433 [INFO][4432] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.26.37.141-k8s-nfs--server--provisioner--0-eth0" Apr 12 19:49:43.442172 env[2107]: 2024-04-12 19:49:43.433 [INFO][4432] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.26.37.141-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.26.37.141-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"07f56b71-dafb-4bf8-b39e-d7921d641bbd", ResourceVersion:"1879", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 49, 43, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.26.37.141", ContainerID:"5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.29.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"26:8b:20:6d:7e:64", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:49:43.442172 env[2107]: 2024-04-12 19:49:43.440 [INFO][4432] k8s.go 498: Wrote updated endpoint to datastore ContainerID="5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.26.37.141-k8s-nfs--server--provisioner--0-eth0" Apr 12 19:49:43.449000 audit[4495]: NETFILTER_CFG table=filter:75 family=2 entries=38 op=nft_register_chain pid=4495 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:49:43.449000 audit[4495]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19820 a0=3 a1=ffffcef57840 a2=0 a3=ffffb7d70fa8 items=0 ppid=3436 pid=4495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:43.449000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:49:43.453743 env[2107]: time="2024-04-12T19:49:43.453697292Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:49:43.453773 env[2107]: time="2024-04-12T19:49:43.453744092Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:49:43.453773 env[2107]: time="2024-04-12T19:49:43.453756412Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:49:43.453888 env[2107]: time="2024-04-12T19:49:43.453871012Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98 pid=4503 runtime=io.containerd.runc.v2 Apr 12 19:49:43.463562 systemd[1]: Started cri-containerd-5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98.scope. Apr 12 19:49:43.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.475000 audit: BPF prog-id=109 op=LOAD Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { bpf } for pid=4512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4503 pid=4512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:43.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537373734353363313964316465303664353431313066643234356437 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { perfmon } for pid=4512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4503 pid=4512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:43.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537373734353363313964316465303664353431313066643234356437 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { bpf } for pid=4512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { bpf } for pid=4512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { bpf } for pid=4512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { perfmon } for pid=4512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { perfmon } for pid=4512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { perfmon } for pid=4512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { perfmon } for pid=4512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { perfmon } for pid=4512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { bpf } for pid=4512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { bpf } for pid=4512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit: BPF prog-id=110 op=LOAD Apr 12 19:49:43.476000 audit[4512]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4503 pid=4512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:43.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537373734353363313964316465303664353431313066643234356437 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { bpf } for pid=4512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { bpf } for pid=4512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { perfmon } for pid=4512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { perfmon } for pid=4512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { perfmon } for pid=4512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { perfmon } for pid=4512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { perfmon } for pid=4512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { bpf } for pid=4512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { bpf } for pid=4512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit: BPF prog-id=111 op=LOAD Apr 12 19:49:43.476000 audit[4512]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4503 pid=4512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:43.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537373734353363313964316465303664353431313066643234356437 Apr 12 19:49:43.476000 audit: BPF prog-id=111 op=UNLOAD Apr 12 19:49:43.476000 audit: BPF prog-id=110 op=UNLOAD Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { bpf } for pid=4512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { bpf } for pid=4512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { bpf } for pid=4512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { perfmon } for pid=4512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { perfmon } for pid=4512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { perfmon } for pid=4512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { perfmon } for pid=4512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { perfmon } for pid=4512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { bpf } for pid=4512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit[4512]: AVC avc: denied { bpf } for pid=4512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:43.476000 audit: BPF prog-id=112 op=LOAD Apr 12 19:49:43.476000 audit[4512]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4503 pid=4512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:43.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537373734353363313964316465303664353431313066643234356437 Apr 12 19:49:43.491512 env[2107]: time="2024-04-12T19:49:43.491473932Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:07f56b71-dafb-4bf8-b39e-d7921d641bbd,Namespace:default,Attempt:0,} returns sandbox id \"5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98\"" Apr 12 19:49:43.492581 env[2107]: time="2024-04-12T19:49:43.492560452Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Apr 12 19:49:43.790607 kubelet[2512]: E0412 19:49:43.790579 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:44.791704 kubelet[2512]: E0412 19:49:44.791670 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:45.361207 systemd-networkd[1927]: cali60e51b789ff: Gained IPv6LL Apr 12 19:49:45.792086 kubelet[2512]: E0412 19:49:45.792056 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:46.792866 kubelet[2512]: E0412 19:49:46.792836 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:47.011811 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3064504976.mount: Deactivated successfully. Apr 12 19:49:47.793982 kubelet[2512]: E0412 19:49:47.793948 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:48.497758 env[2107]: time="2024-04-12T19:49:48.497720092Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:48.498731 env[2107]: time="2024-04-12T19:49:48.498705732Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:48.500351 env[2107]: time="2024-04-12T19:49:48.500327252Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:48.504003 env[2107]: time="2024-04-12T19:49:48.503974932Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:49:48.504764 env[2107]: time="2024-04-12T19:49:48.504736772Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Apr 12 19:49:48.506390 env[2107]: time="2024-04-12T19:49:48.506370692Z" level=info msg="CreateContainer within sandbox \"5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Apr 12 19:49:48.511758 env[2107]: time="2024-04-12T19:49:48.511726292Z" level=info msg="CreateContainer within sandbox \"5777453c19d1de06d54110fd245d727fb4f7550e1664808a284b31ad25ddcb98\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"5de5a66511bc94cab0580c05b6c0c51caa92ddfb7acf363f2284a2ec94e67672\"" Apr 12 19:49:48.512029 env[2107]: time="2024-04-12T19:49:48.512004892Z" level=info msg="StartContainer for \"5de5a66511bc94cab0580c05b6c0c51caa92ddfb7acf363f2284a2ec94e67672\"" Apr 12 19:49:48.526720 systemd[1]: Started cri-containerd-5de5a66511bc94cab0580c05b6c0c51caa92ddfb7acf363f2284a2ec94e67672.scope. Apr 12 19:49:48.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.549467 kernel: kauditd_printk_skb: 62 callbacks suppressed Apr 12 19:49:48.549567 kernel: audit: type=1400 audit(1712951388.537:791): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.623777 kernel: audit: type=1400 audit(1712951388.537:792): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.623850 kernel: audit: type=1400 audit(1712951388.537:793): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.699601 kernel: audit: type=1400 audit(1712951388.537:794): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.699672 kernel: audit: type=1400 audit(1712951388.537:795): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.775608 kernel: audit: type=1400 audit(1712951388.537:796): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.775673 kernel: audit: type=1400 audit(1712951388.537:797): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.783646 env[2107]: time="2024-04-12T19:49:48.783609252Z" level=info msg="StartContainer for \"5de5a66511bc94cab0580c05b6c0c51caa92ddfb7acf363f2284a2ec94e67672\" returns successfully" Apr 12 19:49:48.794302 kubelet[2512]: E0412 19:49:48.794286 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:48.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.851644 kernel: audit: type=1400 audit(1712951388.537:798): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.851665 kernel: audit: type=1400 audit(1712951388.537:799): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.889421 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 19:49:48.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.548000 audit: BPF prog-id=113 op=LOAD Apr 12 19:49:48.548000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.548000 audit[4557]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4503 pid=4557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:48.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564653561363635313162633934636162303538306330356236633063 Apr 12 19:49:48.548000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.548000 audit[4557]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4503 pid=4557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:48.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564653561363635313162633934636162303538306330356236633063 Apr 12 19:49:48.549000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.549000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.549000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.549000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.549000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.549000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.549000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.549000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.549000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.549000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.549000 audit: BPF prog-id=114 op=LOAD Apr 12 19:49:48.549000 audit[4557]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4503 pid=4557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:48.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564653561363635313162633934636162303538306330356236633063 Apr 12 19:49:48.585000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.585000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.585000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.585000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.585000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.585000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.585000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.585000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.585000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.585000 audit: BPF prog-id=115 op=LOAD Apr 12 19:49:48.585000 audit[4557]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4503 pid=4557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:48.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564653561363635313162633934636162303538306330356236633063 Apr 12 19:49:48.622000 audit: BPF prog-id=115 op=UNLOAD Apr 12 19:49:48.622000 audit: BPF prog-id=114 op=UNLOAD Apr 12 19:49:48.622000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.622000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.622000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.622000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.622000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.622000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.622000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.622000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.622000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.622000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:49:48.622000 audit: BPF prog-id=116 op=LOAD Apr 12 19:49:48.622000 audit[4557]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4503 pid=4557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:48.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564653561363635313162633934636162303538306330356236633063 Apr 12 19:49:48.845000 audit[4587]: AVC avc: denied { search } for pid=4587 comm="rpcbind" name="crypto" dev="proc" ino=10199 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c863 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 19:49:48.845000 audit[4587]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9282f000 a2=0 a3=0 items=0 ppid=4568 pid=4587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c863 key=(null) Apr 12 19:49:48.845000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Apr 12 19:49:48.878000 audit[4592]: AVC avc: denied { search } for pid=4592 comm="dbus-daemon" name="crypto" dev="proc" ino=10199 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c863 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 19:49:48.878000 audit[4592]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff83f1f000 a2=0 a3=0 items=0 ppid=4568 pid=4592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c863 key=(null) Apr 12 19:49:48.878000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 19:49:48.881000 audit[4593]: AVC avc: denied { watch } for pid=4593 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538050 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c863 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c362,c863 tclass=dir permissive=0 Apr 12 19:49:48.881000 audit[4593]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaab0f498af0 a2=2c8 a3=aaab0f479a60 items=0 ppid=4568 pid=4593 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c863 key=(null) Apr 12 19:49:48.881000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 19:49:48.900000 audit[4594]: AVC avc: denied { search } for pid=4594 comm="ganesha.nfsd" name="crypto" dev="proc" ino=10199 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c863 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 19:49:48.900000 audit[4594]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8f93f000 a2=0 a3=0 items=0 ppid=4568 pid=4594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c863 key=(null) Apr 12 19:49:48.900000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 19:49:48.940282 kubelet[2512]: I0412 19:49:48.940257 2512 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=0.927612732 podStartE2EDuration="5.940220532s" podCreationTimestamp="2024-04-12 19:49:43 +0000 UTC" firstStartedPulling="2024-04-12 19:49:43.492317332 +0000 UTC m=+31.404020881" lastFinishedPulling="2024-04-12 19:49:48.504925092 +0000 UTC m=+36.416628681" observedRunningTime="2024-04-12 19:49:48.940004572 +0000 UTC m=+36.851708161" watchObservedRunningTime="2024-04-12 19:49:48.940220532 +0000 UTC m=+36.851924121" Apr 12 19:49:48.946000 audit[4612]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=4612 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:49:48.946000 audit[4612]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffffc84ae40 a2=0 a3=1 items=0 ppid=2764 pid=4612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:48.946000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:49:48.959000 audit[4612]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=4612 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 19:49:48.959000 audit[4612]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=fffffc84ae40 a2=0 a3=1 items=0 ppid=2764 pid=4612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:48.959000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 19:49:49.794885 kubelet[2512]: E0412 19:49:49.794856 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:50.795550 kubelet[2512]: E0412 19:49:50.795520 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:51.796245 kubelet[2512]: E0412 19:49:51.796203 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:52.767894 kubelet[2512]: E0412 19:49:52.767850 2512 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:52.796445 kubelet[2512]: E0412 19:49:52.796426 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:53.796923 kubelet[2512]: E0412 19:49:53.796888 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:54.797096 kubelet[2512]: E0412 19:49:54.797045 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:55.798010 kubelet[2512]: E0412 19:49:55.797980 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:56.799011 kubelet[2512]: E0412 19:49:56.798969 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:57.800002 kubelet[2512]: E0412 19:49:57.799970 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:58.600094 kubelet[2512]: I0412 19:49:58.600070 2512 topology_manager.go:215] "Topology Admit Handler" podUID="2cc7f770-258f-4362-b43b-94e657e7dc5d" podNamespace="default" podName="test-pod-1" Apr 12 19:49:58.604052 systemd[1]: Created slice kubepods-besteffort-pod2cc7f770_258f_4362_b43b_94e657e7dc5d.slice. Apr 12 19:49:58.725833 kubelet[2512]: I0412 19:49:58.725778 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-59aa601c-4e1a-4f4e-a878-ca37f97e4dcd\" (UniqueName: \"kubernetes.io/nfs/2cc7f770-258f-4362-b43b-94e657e7dc5d-pvc-59aa601c-4e1a-4f4e-a878-ca37f97e4dcd\") pod \"test-pod-1\" (UID: \"2cc7f770-258f-4362-b43b-94e657e7dc5d\") " pod="default/test-pod-1" Apr 12 19:49:58.726033 kubelet[2512]: I0412 19:49:58.725855 2512 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qt9dj\" (UniqueName: \"kubernetes.io/projected/2cc7f770-258f-4362-b43b-94e657e7dc5d-kube-api-access-qt9dj\") pod \"test-pod-1\" (UID: \"2cc7f770-258f-4362-b43b-94e657e7dc5d\") " pod="default/test-pod-1" Apr 12 19:49:58.800675 kubelet[2512]: E0412 19:49:58.800637 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:58.836000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:58.849859 kernel: Failed to create system directory netfs Apr 12 19:49:58.849947 kernel: kauditd_printk_skb: 68 callbacks suppressed Apr 12 19:49:58.849996 kernel: audit: type=1400 audit(1712951398.836:815): avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:58.850035 kernel: Failed to create system directory netfs Apr 12 19:49:58.850059 kernel: Failed to create system directory netfs Apr 12 19:49:58.850085 kernel: Failed to create system directory netfs Apr 12 19:49:58.836000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:58.900307 kernel: audit: type=1400 audit(1712951398.836:815): avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:58.836000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:58.971062 kernel: Failed to create system directory fscache Apr 12 19:49:58.971113 kernel: audit: type=1400 audit(1712951398.836:815): avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:58.971148 kernel: Failed to create system directory fscache Apr 12 19:49:58.981377 kernel: audit: type=1400 audit(1712951398.836:815): avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:58.836000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.020144 kernel: Failed to create system directory fscache Apr 12 19:49:58.836000 audit[4667]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf9c765e0 a1=12c14 a2=aaaacaa5e028 a3=aaaaf9c67010 items=0 ppid=1106 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:59.069123 kernel: audit: type=1300 audit(1712951398.836:815): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf9c765e0 a1=12c14 a2=aaaacaa5e028 a3=aaaaf9c67010 items=0 ppid=1106 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:59.069170 kernel: Failed to create system directory fscache Apr 12 19:49:59.079323 kernel: audit: type=1327 audit(1712951398.836:815): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 19:49:59.079387 kernel: audit: type=1400 audit(1712951398.903:816): avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:58.836000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 19:49:58.903000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.132184 kernel: Failed to create system directory fscache Apr 12 19:49:59.142379 kernel: audit: type=1400 audit(1712951398.903:816): avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:58.903000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.201932 kernel: Failed to create system directory fscache Apr 12 19:49:59.201981 kernel: audit: type=1400 audit(1712951398.903:816): avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:58.903000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.212063 kernel: Failed to create system directory fscache Apr 12 19:49:58.903000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:58.903000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:58.903000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:58.903000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.250972 kernel: audit: type=1400 audit(1712951398.903:816): avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:58.903000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.358239 kernel: Failed to create system directory fscache Apr 12 19:49:59.358268 kernel: Failed to create system directory fscache Apr 12 19:49:58.903000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:58.903000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.378907 kernel: Failed to create system directory fscache Apr 12 19:49:59.378940 kernel: Failed to create system directory fscache Apr 12 19:49:58.903000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:58.903000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.398969 kernel: Failed to create system directory fscache Apr 12 19:49:59.399017 kernel: Failed to create system directory fscache Apr 12 19:49:58.903000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:58.903000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.418574 kernel: Failed to create system directory fscache Apr 12 19:49:59.426231 kernel: FS-Cache: Loaded Apr 12 19:49:58.903000 audit[4667]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf9e89210 a1=4c344 a2=aaaacaa5e028 a3=aaaaf9c67010 items=0 ppid=1106 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:58.903000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.467945 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.468007 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.468049 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.486307 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.486320 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.504144 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.504170 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.521422 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.521439 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.538127 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.538175 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.554318 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.554346 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.569938 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.569985 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.585209 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.585239 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.599793 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.599826 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.613727 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.613753 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.627219 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.627233 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.640141 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.640190 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.652575 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.652603 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.664405 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.664432 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.675896 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.675944 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.687385 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.687399 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.698863 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.698890 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.710271 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.710298 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.721463 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.721491 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.732659 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.732691 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.743868 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.743912 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.755075 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.755088 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.766273 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.766301 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.777448 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.777499 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.788626 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.788683 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.799813 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.799828 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.800958 kubelet[2512]: E0412 19:49:59.800937 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.810984 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.811012 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.822146 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.822173 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.833318 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.833331 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.844488 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.844518 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.855655 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.855668 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.866835 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.866882 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.878015 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.878045 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.889205 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.889251 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.900382 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.900396 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.911564 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.911577 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.922747 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.922795 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.933944 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.933973 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.945138 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.945183 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.956333 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.956347 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.967518 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.967532 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.978706 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.978741 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.989906 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.989932 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.001101 kernel: Failed to create system directory sunrpc Apr 12 19:50:00.001114 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.012310 kernel: Failed to create system directory sunrpc Apr 12 19:50:00.012323 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.023524 kernel: Failed to create system directory sunrpc Apr 12 19:50:00.023537 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.034723 kernel: Failed to create system directory sunrpc Apr 12 19:50:00.034750 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.045936 kernel: Failed to create system directory sunrpc Apr 12 19:50:00.045965 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.057133 kernel: Failed to create system directory sunrpc Apr 12 19:50:00.057149 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.068311 kernel: Failed to create system directory sunrpc Apr 12 19:50:00.068328 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.079525 kernel: Failed to create system directory sunrpc Apr 12 19:50:00.079538 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.090718 kernel: Failed to create system directory sunrpc Apr 12 19:50:00.090731 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.101921 kernel: Failed to create system directory sunrpc Apr 12 19:50:00.101947 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.113114 kernel: Failed to create system directory sunrpc Apr 12 19:50:00.113140 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.124320 kernel: Failed to create system directory sunrpc Apr 12 19:50:00.124347 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.135506 kernel: Failed to create system directory sunrpc Apr 12 19:50:00.135534 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.146694 kernel: Failed to create system directory sunrpc Apr 12 19:50:00.146738 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.157883 kernel: Failed to create system directory sunrpc Apr 12 19:50:00.157911 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.169075 kernel: Failed to create system directory sunrpc Apr 12 19:50:00.169108 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.180250 kernel: Failed to create system directory sunrpc Apr 12 19:50:00.180278 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.191428 kernel: Failed to create system directory sunrpc Apr 12 19:50:00.191455 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.202596 kernel: Failed to create system directory sunrpc Apr 12 19:50:00.202609 kernel: Failed to create system directory sunrpc Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:49:59.442000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.213771 kernel: Failed to create system directory sunrpc Apr 12 19:50:00.230143 kernel: RPC: Registered named UNIX socket transport module. Apr 12 19:50:00.230159 kernel: RPC: Registered udp transport module. Apr 12 19:50:00.230172 kernel: RPC: Registered tcp transport module. Apr 12 19:50:00.235616 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Apr 12 19:49:59.442000 audit[4667]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf9ed5560 a1=14a344 a2=aaaacaa5e028 a3=aaaaf9c67010 items=6 ppid=1106 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:49:59.442000 audit: CWD cwd="/" Apr 12 19:49:59.442000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:49:59.442000 audit: PATH item=1 name=(null) inode=51296 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:49:59.442000 audit: PATH item=2 name=(null) inode=51296 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:49:59.442000 audit: PATH item=3 name=(null) inode=51297 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:49:59.442000 audit: PATH item=4 name=(null) inode=51296 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:49:59.442000 audit: PATH item=5 name=(null) inode=51298 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 19:49:59.442000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.282705 kernel: Failed to create system directory nfs Apr 12 19:50:00.282758 kernel: Failed to create system directory nfs Apr 12 19:50:00.282783 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.293979 kernel: Failed to create system directory nfs Apr 12 19:50:00.293992 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.305256 kernel: Failed to create system directory nfs Apr 12 19:50:00.305307 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.316539 kernel: Failed to create system directory nfs Apr 12 19:50:00.316567 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.327818 kernel: Failed to create system directory nfs Apr 12 19:50:00.327843 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.339099 kernel: Failed to create system directory nfs Apr 12 19:50:00.339127 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.350378 kernel: Failed to create system directory nfs Apr 12 19:50:00.350392 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.361657 kernel: Failed to create system directory nfs Apr 12 19:50:00.361671 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.372934 kernel: Failed to create system directory nfs Apr 12 19:50:00.372950 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.384212 kernel: Failed to create system directory nfs Apr 12 19:50:00.384238 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.395472 kernel: Failed to create system directory nfs Apr 12 19:50:00.395486 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.406746 kernel: Failed to create system directory nfs Apr 12 19:50:00.406762 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.418027 kernel: Failed to create system directory nfs Apr 12 19:50:00.418075 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.429308 kernel: Failed to create system directory nfs Apr 12 19:50:00.429322 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.440616 kernel: Failed to create system directory nfs Apr 12 19:50:00.440629 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.451929 kernel: Failed to create system directory nfs Apr 12 19:50:00.451966 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.462988 kernel: Failed to create system directory nfs Apr 12 19:50:00.463001 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.473908 kernel: Failed to create system directory nfs Apr 12 19:50:00.473935 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.484549 kernel: Failed to create system directory nfs Apr 12 19:50:00.484577 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.495195 kernel: Failed to create system directory nfs Apr 12 19:50:00.495228 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.505834 kernel: Failed to create system directory nfs Apr 12 19:50:00.505848 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.516487 kernel: Failed to create system directory nfs Apr 12 19:50:00.516500 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.527125 kernel: Failed to create system directory nfs Apr 12 19:50:00.527139 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.537778 kernel: Failed to create system directory nfs Apr 12 19:50:00.537807 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.548444 kernel: Failed to create system directory nfs Apr 12 19:50:00.548458 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.559097 kernel: Failed to create system directory nfs Apr 12 19:50:00.559111 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.569758 kernel: Failed to create system directory nfs Apr 12 19:50:00.569785 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.580417 kernel: Failed to create system directory nfs Apr 12 19:50:00.580430 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.591077 kernel: Failed to create system directory nfs Apr 12 19:50:00.591091 kernel: Failed to create system directory nfs Apr 12 19:50:00.266000 audit[4667]: AVC avc: denied { confidentiality } for pid=4667 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.266000 audit[4667]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaafa07e4f0 a1=115814 a2=aaaacaa5e028 a3=aaaaf9c67010 items=0 ppid=1106 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:50:00.266000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 19:50:00.615961 kernel: FS-Cache: Netfs 'nfs' registered for caching Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.652365 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.652385 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.652397 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.663570 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.663583 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.674737 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.674763 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.685898 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.685926 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.697055 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.697083 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.708225 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.708239 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.719403 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.719430 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.730577 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.730591 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.741746 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.741760 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.752926 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.752943 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.764096 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.764111 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.775258 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.775284 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.786426 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.786439 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.797595 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.797609 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.801848 kubelet[2512]: E0412 19:50:00.801835 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.808773 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.808802 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.819928 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.819958 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.831110 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.831123 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.842239 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.842265 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.853089 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.853103 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.863938 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.863969 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.874778 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.874792 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.885635 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.885649 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.896481 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.896499 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.907343 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.907356 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.918193 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.918207 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.929047 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.929080 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.939885 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.939898 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.950721 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.950747 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.961554 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.961571 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.972398 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.972411 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.983242 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.983256 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.994074 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.994108 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.004922 kernel: Failed to create system directory nfs4 Apr 12 19:50:01.004938 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.015765 kernel: Failed to create system directory nfs4 Apr 12 19:50:01.015808 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.026594 kernel: Failed to create system directory nfs4 Apr 12 19:50:01.026610 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.037442 kernel: Failed to create system directory nfs4 Apr 12 19:50:01.037456 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.048286 kernel: Failed to create system directory nfs4 Apr 12 19:50:01.048299 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.059133 kernel: Failed to create system directory nfs4 Apr 12 19:50:01.059148 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.069976 kernel: Failed to create system directory nfs4 Apr 12 19:50:01.069990 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.080815 kernel: Failed to create system directory nfs4 Apr 12 19:50:01.080858 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.091655 kernel: Failed to create system directory nfs4 Apr 12 19:50:01.091670 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.102492 kernel: Failed to create system directory nfs4 Apr 12 19:50:01.102505 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.113323 kernel: Failed to create system directory nfs4 Apr 12 19:50:01.113336 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.124151 kernel: Failed to create system directory nfs4 Apr 12 19:50:01.124165 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.134997 kernel: Failed to create system directory nfs4 Apr 12 19:50:01.135024 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.145839 kernel: Failed to create system directory nfs4 Apr 12 19:50:01.145853 kernel: Failed to create system directory nfs4 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:00.633000 audit[4672]: AVC avc: denied { confidentiality } for pid=4672 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.156695 kernel: Failed to create system directory nfs4 Apr 12 19:50:01.265211 kernel: NFS: Registering the id_resolver key type Apr 12 19:50:01.265259 kernel: Key type id_resolver registered Apr 12 19:50:01.265285 kernel: Key type id_legacy registered Apr 12 19:50:00.633000 audit[4672]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff977eb010 a1=19c244 a2=aaaae2c9e028 a3=aaaaf693d010 items=0 ppid=1106 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:50:00.633000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.292793 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.292822 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.292846 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.304615 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.304822 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.316389 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.316417 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.328139 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.328167 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.339878 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.339906 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.351620 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.351647 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.363357 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.363401 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.375086 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.375135 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.386831 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.386876 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.398573 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.398618 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.410291 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.410304 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.422028 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.422055 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.278000 audit[4673]: AVC avc: denied { confidentiality } for pid=4673 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 19:50:01.433789 kernel: Failed to create system directory rpcgss Apr 12 19:50:01.278000 audit[4673]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb46b3010 a1=5ef34 a2=aaaae7dee028 a3=aaaaed57d010 items=0 ppid=1106 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:50:01.278000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Apr 12 19:50:01.472323 nfsidmap[4681]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.3-a-bd0b40f5b0' Apr 12 19:50:01.475119 nfsidmap[4682]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.3-a-bd0b40f5b0' Apr 12 19:50:01.490000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3107 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 19:50:01.490000 audit[2169]: AVC avc: denied { watch_reads } for pid=2169 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3107 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 19:50:01.490000 audit[2169]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab1e816620 a2=10 a3=0 items=0 ppid=1 pid=2169 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:50:01.490000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3107 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 19:50:01.490000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3107 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 19:50:01.490000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 19:50:01.490000 audit[2169]: AVC avc: denied { watch_reads } for pid=2169 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3107 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 19:50:01.490000 audit[2169]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab1e816620 a2=10 a3=0 items=0 ppid=1 pid=2169 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:50:01.490000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 19:50:01.490000 audit[2169]: AVC avc: denied { watch_reads } for pid=2169 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3107 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 19:50:01.490000 audit[2169]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab1e816620 a2=10 a3=0 items=0 ppid=1 pid=2169 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:50:01.490000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 19:50:01.605991 env[2107]: time="2024-04-12T19:50:01.605914905Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:2cc7f770-258f-4362-b43b-94e657e7dc5d,Namespace:default,Attempt:0,}" Apr 12 19:50:01.699355 systemd-networkd[1927]: cali5ec59c6bf6e: Link UP Apr 12 19:50:01.715144 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 19:50:01.715196 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Apr 12 19:50:01.715395 systemd-networkd[1927]: cali5ec59c6bf6e: Gained carrier Apr 12 19:50:01.720375 env[2107]: 2024-04-12 19:50:01.643 [INFO][4684] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.26.37.141-k8s-test--pod--1-eth0 default 2cc7f770-258f-4362-b43b-94e657e7dc5d 1947 0 2024-04-12 19:49:43 +0000 UTC <nil> <nil> map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.26.37.141 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.26.37.141-k8s-test--pod--1-" Apr 12 19:50:01.720375 env[2107]: 2024-04-12 19:50:01.643 [INFO][4684] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.26.37.141-k8s-test--pod--1-eth0" Apr 12 19:50:01.720375 env[2107]: 2024-04-12 19:50:01.667 [INFO][4707] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4" HandleID="k8s-pod-network.a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4" Workload="10.26.37.141-k8s-test--pod--1-eth0" Apr 12 19:50:01.720375 env[2107]: 2024-04-12 19:50:01.678 [INFO][4707] ipam_plugin.go 268: Auto assigning IP ContainerID="a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4" HandleID="k8s-pod-network.a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4" Workload="10.26.37.141-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400034b8f0), Attrs:map[string]string{"namespace":"default", "node":"10.26.37.141", "pod":"test-pod-1", "timestamp":"2024-04-12 19:50:01.667463893 +0000 UTC"}, Hostname:"10.26.37.141", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 19:50:01.720375 env[2107]: 2024-04-12 19:50:01.678 [INFO][4707] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 19:50:01.720375 env[2107]: 2024-04-12 19:50:01.678 [INFO][4707] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 19:50:01.720375 env[2107]: 2024-04-12 19:50:01.678 [INFO][4707] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.26.37.141' Apr 12 19:50:01.720375 env[2107]: 2024-04-12 19:50:01.679 [INFO][4707] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4" host="10.26.37.141" Apr 12 19:50:01.720375 env[2107]: 2024-04-12 19:50:01.682 [INFO][4707] ipam.go 372: Looking up existing affinities for host host="10.26.37.141" Apr 12 19:50:01.720375 env[2107]: 2024-04-12 19:50:01.685 [INFO][4707] ipam.go 489: Trying affinity for 192.168.29.192/26 host="10.26.37.141" Apr 12 19:50:01.720375 env[2107]: 2024-04-12 19:50:01.686 [INFO][4707] ipam.go 155: Attempting to load block cidr=192.168.29.192/26 host="10.26.37.141" Apr 12 19:50:01.720375 env[2107]: 2024-04-12 19:50:01.688 [INFO][4707] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.29.192/26 host="10.26.37.141" Apr 12 19:50:01.720375 env[2107]: 2024-04-12 19:50:01.688 [INFO][4707] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.29.192/26 handle="k8s-pod-network.a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4" host="10.26.37.141" Apr 12 19:50:01.720375 env[2107]: 2024-04-12 19:50:01.689 [INFO][4707] ipam.go 1682: Creating new handle: k8s-pod-network.a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4 Apr 12 19:50:01.720375 env[2107]: 2024-04-12 19:50:01.692 [INFO][4707] ipam.go 1203: Writing block in order to claim IPs block=192.168.29.192/26 handle="k8s-pod-network.a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4" host="10.26.37.141" Apr 12 19:50:01.720375 env[2107]: 2024-04-12 19:50:01.695 [INFO][4707] ipam.go 1216: Successfully claimed IPs: [192.168.29.196/26] block=192.168.29.192/26 handle="k8s-pod-network.a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4" host="10.26.37.141" Apr 12 19:50:01.720375 env[2107]: 2024-04-12 19:50:01.695 [INFO][4707] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.29.196/26] handle="k8s-pod-network.a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4" host="10.26.37.141" Apr 12 19:50:01.720375 env[2107]: 2024-04-12 19:50:01.696 [INFO][4707] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 19:50:01.720375 env[2107]: 2024-04-12 19:50:01.696 [INFO][4707] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.29.196/26] IPv6=[] ContainerID="a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4" HandleID="k8s-pod-network.a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4" Workload="10.26.37.141-k8s-test--pod--1-eth0" Apr 12 19:50:01.720375 env[2107]: 2024-04-12 19:50:01.697 [INFO][4684] k8s.go 385: Populated endpoint ContainerID="a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.26.37.141-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.26.37.141-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"2cc7f770-258f-4362-b43b-94e657e7dc5d", ResourceVersion:"1947", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 49, 43, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.26.37.141", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:50:01.720375 env[2107]: 2024-04-12 19:50:01.698 [INFO][4684] k8s.go 386: Calico CNI using IPs: [192.168.29.196/32] ContainerID="a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.26.37.141-k8s-test--pod--1-eth0" Apr 12 19:50:01.720880 env[2107]: 2024-04-12 19:50:01.698 [INFO][4684] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.26.37.141-k8s-test--pod--1-eth0" Apr 12 19:50:01.720880 env[2107]: 2024-04-12 19:50:01.715 [INFO][4684] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.26.37.141-k8s-test--pod--1-eth0" Apr 12 19:50:01.720880 env[2107]: 2024-04-12 19:50:01.715 [INFO][4684] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.26.37.141-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.26.37.141-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"2cc7f770-258f-4362-b43b-94e657e7dc5d", ResourceVersion:"1947", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 19, 49, 43, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.26.37.141", ContainerID:"a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"3a:da:b4:60:48:9d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 19:50:01.720880 env[2107]: 2024-04-12 19:50:01.719 [INFO][4684] k8s.go 498: Wrote updated endpoint to datastore ContainerID="a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.26.37.141-k8s-test--pod--1-eth0" Apr 12 19:50:01.728000 audit[4745]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=4745 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 19:50:01.728000 audit[4745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19400 a0=3 a1=ffffca6310b0 a2=0 a3=ffffb1336fa8 items=0 ppid=3436 pid=4745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:50:01.728000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 19:50:01.729660 env[2107]: time="2024-04-12T19:50:01.729615724Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 19:50:01.729660 env[2107]: time="2024-04-12T19:50:01.729651846Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 19:50:01.729704 env[2107]: time="2024-04-12T19:50:01.729661967Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 19:50:01.729827 env[2107]: time="2024-04-12T19:50:01.729806138Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4 pid=4746 runtime=io.containerd.runc.v2 Apr 12 19:50:01.738813 systemd[1]: Started cri-containerd-a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4.scope. Apr 12 19:50:01.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit: BPF prog-id=117 op=LOAD Apr 12 19:50:01.752000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit[4755]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4746 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:50:01.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139313365383463326662376161343431343133303534633937353735 Apr 12 19:50:01.752000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit[4755]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4746 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:50:01.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139313365383463326662376161343431343133303534633937353735 Apr 12 19:50:01.752000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit: BPF prog-id=118 op=LOAD Apr 12 19:50:01.752000 audit[4755]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4746 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:50:01.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139313365383463326662376161343431343133303534633937353735 Apr 12 19:50:01.752000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.752000 audit: BPF prog-id=119 op=LOAD Apr 12 19:50:01.752000 audit[4755]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4746 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:50:01.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139313365383463326662376161343431343133303534633937353735 Apr 12 19:50:01.752000 audit: BPF prog-id=119 op=UNLOAD Apr 12 19:50:01.753000 audit: BPF prog-id=118 op=UNLOAD Apr 12 19:50:01.753000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.753000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.753000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.753000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.753000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.753000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.753000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.753000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.753000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.753000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.753000 audit: BPF prog-id=120 op=LOAD Apr 12 19:50:01.753000 audit[4755]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4746 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:50:01.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139313365383463326662376161343431343133303534633937353735 Apr 12 19:50:01.767885 env[2107]: time="2024-04-12T19:50:01.767851914Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:2cc7f770-258f-4362-b43b-94e657e7dc5d,Namespace:default,Attempt:0,} returns sandbox id \"a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4\"" Apr 12 19:50:01.768911 env[2107]: time="2024-04-12T19:50:01.768888909Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 19:50:01.802092 kubelet[2512]: E0412 19:50:01.802069 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:50:01.852775 env[2107]: time="2024-04-12T19:50:01.852742381Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:50:01.853473 env[2107]: time="2024-04-12T19:50:01.853456552Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:50:01.854959 env[2107]: time="2024-04-12T19:50:01.854934259Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:50:01.856424 env[2107]: time="2024-04-12T19:50:01.856377523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 19:50:01.858220 env[2107]: time="2024-04-12T19:50:01.858180452Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56\"" Apr 12 19:50:01.860415 env[2107]: time="2024-04-12T19:50:01.860387171Z" level=info msg="CreateContainer within sandbox \"a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4\" for container &ContainerMetadata{Name:test,Attempt:0,}" Apr 12 19:50:01.865975 env[2107]: time="2024-04-12T19:50:01.865940370Z" level=info msg="CreateContainer within sandbox \"a913e84c2fb7aa441413054c975759c730e62be0d8c26e3ed609a9f8b1be57e4\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"4245190b3d10d855f168d224e550fa81b8ccf413d6663ca2171a3bd078bfc3a3\"" Apr 12 19:50:01.866342 env[2107]: time="2024-04-12T19:50:01.866316958Z" level=info msg="StartContainer for \"4245190b3d10d855f168d224e550fa81b8ccf413d6663ca2171a3bd078bfc3a3\"" Apr 12 19:50:01.878491 systemd[1]: Started cri-containerd-4245190b3d10d855f168d224e550fa81b8ccf413d6663ca2171a3bd078bfc3a3.scope. Apr 12 19:50:01.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit: BPF prog-id=121 op=LOAD Apr 12 19:50:01.892000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit[4785]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4746 pid=4785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:50:01.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432343531393062336431306438353566313638643232346535353066 Apr 12 19:50:01.892000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit[4785]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4746 pid=4785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:50:01.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432343531393062336431306438353566313638643232346535353066 Apr 12 19:50:01.892000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit: BPF prog-id=122 op=LOAD Apr 12 19:50:01.892000 audit[4785]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4746 pid=4785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:50:01.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432343531393062336431306438353566313638643232346535353066 Apr 12 19:50:01.892000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.892000 audit: BPF prog-id=123 op=LOAD Apr 12 19:50:01.892000 audit[4785]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4746 pid=4785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:50:01.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432343531393062336431306438353566313638643232346535353066 Apr 12 19:50:01.893000 audit: BPF prog-id=123 op=UNLOAD Apr 12 19:50:01.893000 audit: BPF prog-id=122 op=UNLOAD Apr 12 19:50:01.893000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.893000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.893000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.893000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.893000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.893000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.893000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.893000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.893000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.893000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 19:50:01.893000 audit: BPF prog-id=124 op=LOAD Apr 12 19:50:01.893000 audit[4785]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4746 pid=4785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 19:50:01.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432343531393062336431306438353566313638643232346535353066 Apr 12 19:50:01.902053 env[2107]: time="2024-04-12T19:50:01.902016646Z" level=info msg="StartContainer for \"4245190b3d10d855f168d224e550fa81b8ccf413d6663ca2171a3bd078bfc3a3\" returns successfully" Apr 12 19:50:02.803294 kubelet[2512]: E0412 19:50:02.803226 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 19:50:03.345253 systemd-networkd[1927]: cali5ec59c6bf6e: Gained IPv6LL Apr 12 19:50:03.804293 kubelet[2512]: E0412 19:50:03.804272 2512 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"