Apr 12 18:15:50.744632 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Apr 12 18:15:50.744651 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Apr 12 17:21:24 -00 2024 Apr 12 18:15:50.744659 kernel: efi: EFI v2.70 by EDK II Apr 12 18:15:50.744665 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Apr 12 18:15:50.744670 kernel: random: crng init done Apr 12 18:15:50.744675 kernel: ACPI: Early table checksum verification disabled Apr 12 18:15:50.744682 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Apr 12 18:15:50.744689 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Apr 12 18:15:50.744695 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:15:50.744700 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:15:50.744706 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:15:50.744711 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:15:50.744717 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:15:50.744722 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:15:50.744730 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:15:50.744743 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:15:50.744750 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:15:50.744755 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Apr 12 18:15:50.744761 kernel: NUMA: Failed to initialise from firmware Apr 12 18:15:50.744768 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Apr 12 18:15:50.744774 kernel: NUMA: NODE_DATA [mem 0xdcb0c900-0xdcb11fff] Apr 12 18:15:50.744779 kernel: Zone ranges: Apr 12 18:15:50.744785 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Apr 12 18:15:50.744792 kernel: DMA32 empty Apr 12 18:15:50.744798 kernel: Normal empty Apr 12 18:15:50.744804 kernel: Movable zone start for each node Apr 12 18:15:50.744810 kernel: Early memory node ranges Apr 12 18:15:50.744815 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Apr 12 18:15:50.744821 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Apr 12 18:15:50.744827 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Apr 12 18:15:50.744833 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Apr 12 18:15:50.744839 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Apr 12 18:15:50.744844 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Apr 12 18:15:50.744850 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Apr 12 18:15:50.744856 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Apr 12 18:15:50.744863 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Apr 12 18:15:50.744869 kernel: psci: probing for conduit method from ACPI. Apr 12 18:15:50.744875 kernel: psci: PSCIv1.1 detected in firmware. Apr 12 18:15:50.744881 kernel: psci: Using standard PSCI v0.2 function IDs Apr 12 18:15:50.744887 kernel: psci: Trusted OS migration not required Apr 12 18:15:50.744895 kernel: psci: SMC Calling Convention v1.1 Apr 12 18:15:50.744901 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Apr 12 18:15:50.744909 kernel: ACPI: SRAT not present Apr 12 18:15:50.744916 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Apr 12 18:15:50.744922 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Apr 12 18:15:50.744928 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Apr 12 18:15:50.744935 kernel: Detected PIPT I-cache on CPU0 Apr 12 18:15:50.744941 kernel: CPU features: detected: GIC system register CPU interface Apr 12 18:15:50.744947 kernel: CPU features: detected: Hardware dirty bit management Apr 12 18:15:50.744953 kernel: CPU features: detected: Spectre-v4 Apr 12 18:15:50.744959 kernel: CPU features: detected: Spectre-BHB Apr 12 18:15:50.744967 kernel: CPU features: kernel page table isolation forced ON by KASLR Apr 12 18:15:50.744973 kernel: CPU features: detected: Kernel page table isolation (KPTI) Apr 12 18:15:50.744979 kernel: CPU features: detected: ARM erratum 1418040 Apr 12 18:15:50.744986 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Apr 12 18:15:50.744992 kernel: Policy zone: DMA Apr 12 18:15:50.744999 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:15:50.745006 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:15:50.745012 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 18:15:50.745018 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 18:15:50.745024 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:15:50.745031 kernel: Memory: 2457472K/2572288K available (9792K kernel code, 2092K rwdata, 7568K rodata, 36352K init, 777K bss, 114816K reserved, 0K cma-reserved) Apr 12 18:15:50.745039 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Apr 12 18:15:50.745045 kernel: trace event string verifier disabled Apr 12 18:15:50.745051 kernel: rcu: Preemptible hierarchical RCU implementation. Apr 12 18:15:50.745058 kernel: rcu: RCU event tracing is enabled. Apr 12 18:15:50.745064 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Apr 12 18:15:50.745071 kernel: Trampoline variant of Tasks RCU enabled. Apr 12 18:15:50.745077 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:15:50.745083 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:15:50.745090 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Apr 12 18:15:50.745096 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Apr 12 18:15:50.745102 kernel: GICv3: 256 SPIs implemented Apr 12 18:15:50.745109 kernel: GICv3: 0 Extended SPIs implemented Apr 12 18:15:50.745115 kernel: GICv3: Distributor has no Range Selector support Apr 12 18:15:50.745122 kernel: Root IRQ handler: gic_handle_irq Apr 12 18:15:50.745128 kernel: GICv3: 16 PPIs implemented Apr 12 18:15:50.745134 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Apr 12 18:15:50.745140 kernel: ACPI: SRAT not present Apr 12 18:15:50.745146 kernel: ITS [mem 0x08080000-0x0809ffff] Apr 12 18:15:50.745152 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Apr 12 18:15:50.745158 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Apr 12 18:15:50.745165 kernel: GICv3: using LPI property table @0x00000000400d0000 Apr 12 18:15:50.745171 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Apr 12 18:15:50.745177 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:15:50.745184 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Apr 12 18:15:50.745190 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Apr 12 18:15:50.745197 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Apr 12 18:15:50.745203 kernel: arm-pv: using stolen time PV Apr 12 18:15:50.745209 kernel: Console: colour dummy device 80x25 Apr 12 18:15:50.745215 kernel: ACPI: Core revision 20210730 Apr 12 18:15:50.745222 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Apr 12 18:15:50.745229 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:15:50.745235 kernel: LSM: Security Framework initializing Apr 12 18:15:50.745241 kernel: SELinux: Initializing. Apr 12 18:15:50.745249 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:15:50.745255 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:15:50.745271 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:15:50.745277 kernel: Platform MSI: ITS@0x8080000 domain created Apr 12 18:15:50.745283 kernel: PCI/MSI: ITS@0x8080000 domain created Apr 12 18:15:50.745289 kernel: Remapping and enabling EFI services. Apr 12 18:15:50.745296 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:15:50.745302 kernel: Detected PIPT I-cache on CPU1 Apr 12 18:15:50.745308 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Apr 12 18:15:50.745316 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Apr 12 18:15:50.745323 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:15:50.745329 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Apr 12 18:15:50.745335 kernel: Detected PIPT I-cache on CPU2 Apr 12 18:15:50.745342 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Apr 12 18:15:50.745348 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Apr 12 18:15:50.745355 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:15:50.745361 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Apr 12 18:15:50.745367 kernel: Detected PIPT I-cache on CPU3 Apr 12 18:15:50.745374 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Apr 12 18:15:50.745381 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Apr 12 18:15:50.745387 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:15:50.745394 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Apr 12 18:15:50.745400 kernel: smp: Brought up 1 node, 4 CPUs Apr 12 18:15:50.745411 kernel: SMP: Total of 4 processors activated. Apr 12 18:15:50.745419 kernel: CPU features: detected: 32-bit EL0 Support Apr 12 18:15:50.745425 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Apr 12 18:15:50.745432 kernel: CPU features: detected: Common not Private translations Apr 12 18:15:50.745439 kernel: CPU features: detected: CRC32 instructions Apr 12 18:15:50.745445 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Apr 12 18:15:50.745452 kernel: CPU features: detected: LSE atomic instructions Apr 12 18:15:50.745458 kernel: CPU features: detected: Privileged Access Never Apr 12 18:15:50.745466 kernel: CPU features: detected: RAS Extension Support Apr 12 18:15:50.745473 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Apr 12 18:15:50.745479 kernel: CPU: All CPU(s) started at EL1 Apr 12 18:15:50.745486 kernel: alternatives: patching kernel code Apr 12 18:15:50.745494 kernel: devtmpfs: initialized Apr 12 18:15:50.745500 kernel: KASLR enabled Apr 12 18:15:50.745507 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:15:50.745514 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Apr 12 18:15:50.745520 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:15:50.745527 kernel: SMBIOS 3.0.0 present. Apr 12 18:15:50.745533 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Apr 12 18:15:50.745540 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:15:50.745546 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Apr 12 18:15:50.745553 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Apr 12 18:15:50.745561 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Apr 12 18:15:50.745568 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:15:50.745574 kernel: audit: type=2000 audit(0.032:1): state=initialized audit_enabled=0 res=1 Apr 12 18:15:50.745581 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:15:50.745587 kernel: cpuidle: using governor menu Apr 12 18:15:50.745594 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Apr 12 18:15:50.745600 kernel: ASID allocator initialised with 32768 entries Apr 12 18:15:50.745607 kernel: ACPI: bus type PCI registered Apr 12 18:15:50.745614 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:15:50.745622 kernel: Serial: AMBA PL011 UART driver Apr 12 18:15:50.745628 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:15:50.745635 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Apr 12 18:15:50.745641 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:15:50.745648 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Apr 12 18:15:50.745654 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:15:50.745661 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Apr 12 18:15:50.745668 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:15:50.745675 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:15:50.745682 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:15:50.745689 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:15:50.745696 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:15:50.745702 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:15:50.745709 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:15:50.745715 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Apr 12 18:15:50.745722 kernel: ACPI: Interpreter enabled Apr 12 18:15:50.745728 kernel: ACPI: Using GIC for interrupt routing Apr 12 18:15:50.745739 kernel: ACPI: MCFG table detected, 1 entries Apr 12 18:15:50.745748 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Apr 12 18:15:50.745755 kernel: printk: console [ttyAMA0] enabled Apr 12 18:15:50.745761 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Apr 12 18:15:50.745882 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 18:15:50.745948 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Apr 12 18:15:50.746008 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Apr 12 18:15:50.746067 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Apr 12 18:15:50.746128 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Apr 12 18:15:50.746136 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Apr 12 18:15:50.746143 kernel: PCI host bridge to bus 0000:00 Apr 12 18:15:50.746211 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Apr 12 18:15:50.746276 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Apr 12 18:15:50.746331 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Apr 12 18:15:50.746385 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 18:15:50.746462 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Apr 12 18:15:50.746537 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Apr 12 18:15:50.746600 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Apr 12 18:15:50.746661 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Apr 12 18:15:50.746722 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Apr 12 18:15:50.746792 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Apr 12 18:15:50.746855 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Apr 12 18:15:50.746919 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Apr 12 18:15:50.746974 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Apr 12 18:15:50.747028 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Apr 12 18:15:50.747082 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Apr 12 18:15:50.747091 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Apr 12 18:15:50.747098 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Apr 12 18:15:50.747104 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Apr 12 18:15:50.747113 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Apr 12 18:15:50.747119 kernel: iommu: Default domain type: Translated Apr 12 18:15:50.747126 kernel: iommu: DMA domain TLB invalidation policy: strict mode Apr 12 18:15:50.747133 kernel: vgaarb: loaded Apr 12 18:15:50.747139 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:15:50.747146 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:15:50.747152 kernel: PTP clock support registered Apr 12 18:15:50.747159 kernel: Registered efivars operations Apr 12 18:15:50.747166 kernel: clocksource: Switched to clocksource arch_sys_counter Apr 12 18:15:50.747174 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:15:50.747181 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:15:50.747187 kernel: pnp: PnP ACPI init Apr 12 18:15:50.747253 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Apr 12 18:15:50.747271 kernel: pnp: PnP ACPI: found 1 devices Apr 12 18:15:50.747278 kernel: NET: Registered PF_INET protocol family Apr 12 18:15:50.747285 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 18:15:50.747292 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Apr 12 18:15:50.747299 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:15:50.747308 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 18:15:50.747315 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Apr 12 18:15:50.747321 kernel: TCP: Hash tables configured (established 32768 bind 32768) Apr 12 18:15:50.747328 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:15:50.747335 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:15:50.747342 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:15:50.747349 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:15:50.747355 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Apr 12 18:15:50.747363 kernel: kvm [1]: HYP mode not available Apr 12 18:15:50.747370 kernel: Initialise system trusted keyrings Apr 12 18:15:50.747377 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Apr 12 18:15:50.747383 kernel: Key type asymmetric registered Apr 12 18:15:50.747390 kernel: Asymmetric key parser 'x509' registered Apr 12 18:15:50.747397 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:15:50.747403 kernel: io scheduler mq-deadline registered Apr 12 18:15:50.747410 kernel: io scheduler kyber registered Apr 12 18:15:50.747416 kernel: io scheduler bfq registered Apr 12 18:15:50.747423 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Apr 12 18:15:50.747431 kernel: ACPI: button: Power Button [PWRB] Apr 12 18:15:50.747438 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Apr 12 18:15:50.747513 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Apr 12 18:15:50.747522 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:15:50.747529 kernel: thunder_xcv, ver 1.0 Apr 12 18:15:50.747535 kernel: thunder_bgx, ver 1.0 Apr 12 18:15:50.747542 kernel: nicpf, ver 1.0 Apr 12 18:15:50.747548 kernel: nicvf, ver 1.0 Apr 12 18:15:50.747618 kernel: rtc-efi rtc-efi.0: registered as rtc0 Apr 12 18:15:50.747679 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-04-12T18:15:50 UTC (1712945750) Apr 12 18:15:50.747687 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 18:15:50.747694 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:15:50.747701 kernel: Segment Routing with IPv6 Apr 12 18:15:50.747707 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:15:50.747714 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:15:50.747720 kernel: Key type dns_resolver registered Apr 12 18:15:50.747727 kernel: registered taskstats version 1 Apr 12 18:15:50.747740 kernel: Loading compiled-in X.509 certificates Apr 12 18:15:50.747748 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 8c258d82bbd8df4a9da2c0ea4108142f04be6b34' Apr 12 18:15:50.747754 kernel: Key type .fscrypt registered Apr 12 18:15:50.747761 kernel: Key type fscrypt-provisioning registered Apr 12 18:15:50.747768 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 18:15:50.747775 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:15:50.747781 kernel: ima: No architecture policies found Apr 12 18:15:50.747788 kernel: Freeing unused kernel memory: 36352K Apr 12 18:15:50.747796 kernel: Run /init as init process Apr 12 18:15:50.747803 kernel: with arguments: Apr 12 18:15:50.747809 kernel: /init Apr 12 18:15:50.747816 kernel: with environment: Apr 12 18:15:50.747822 kernel: HOME=/ Apr 12 18:15:50.747829 kernel: TERM=linux Apr 12 18:15:50.747835 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:15:50.747844 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:15:50.747853 systemd[1]: Detected virtualization kvm. Apr 12 18:15:50.747861 systemd[1]: Detected architecture arm64. Apr 12 18:15:50.747868 systemd[1]: Running in initrd. Apr 12 18:15:50.747876 systemd[1]: No hostname configured, using default hostname. Apr 12 18:15:50.747882 systemd[1]: Hostname set to . Apr 12 18:15:50.747890 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:15:50.747897 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:15:50.747904 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:15:50.747911 systemd[1]: Reached target cryptsetup.target. Apr 12 18:15:50.747919 systemd[1]: Reached target paths.target. Apr 12 18:15:50.747925 systemd[1]: Reached target slices.target. Apr 12 18:15:50.747932 systemd[1]: Reached target swap.target. Apr 12 18:15:50.747939 systemd[1]: Reached target timers.target. Apr 12 18:15:50.747947 systemd[1]: Listening on iscsid.socket. Apr 12 18:15:50.747954 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:15:50.747961 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:15:50.747970 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:15:50.747977 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:15:50.747984 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:15:50.747991 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:15:50.747998 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:15:50.748005 systemd[1]: Reached target sockets.target. Apr 12 18:15:50.748012 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:15:50.748019 systemd[1]: Finished network-cleanup.service. Apr 12 18:15:50.748027 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:15:50.748035 systemd[1]: Starting systemd-journald.service... Apr 12 18:15:50.748042 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:15:50.748049 systemd[1]: Starting systemd-resolved.service... Apr 12 18:15:50.748056 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:15:50.748063 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:15:50.748070 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:15:50.748077 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:15:50.748084 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:15:50.748091 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:15:50.748103 systemd-journald[250]: Journal started Apr 12 18:15:50.748144 systemd-journald[250]: Runtime Journal (/run/log/journal/fcc26dc5cdbc46d4982297968a35e3ac) is 6.0M, max 48.7M, 42.6M free. Apr 12 18:15:50.740296 systemd-modules-load[251]: Inserted module 'overlay' Apr 12 18:15:50.751562 systemd[1]: Started systemd-journald.service. Apr 12 18:15:50.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:50.760256 kernel: audit: type=1130 audit(1712945750.752:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:50.760303 kernel: audit: type=1130 audit(1712945750.759:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:50.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:50.759288 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:15:50.768136 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:15:50.768156 kernel: audit: type=1130 audit(1712945750.764:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:50.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:50.760633 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:15:50.769861 kernel: Bridge firewalling registered Apr 12 18:15:50.767445 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:15:50.769146 systemd-modules-load[251]: Inserted module 'br_netfilter' Apr 12 18:15:50.769988 systemd-resolved[252]: Positive Trust Anchors: Apr 12 18:15:50.769995 systemd-resolved[252]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:15:50.770022 systemd-resolved[252]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:15:50.774854 systemd-resolved[252]: Defaulting to hostname 'linux'. Apr 12 18:15:50.777391 systemd[1]: Started systemd-resolved.service. Apr 12 18:15:50.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:50.781808 systemd[1]: Reached target nss-lookup.target. Apr 12 18:15:50.786237 kernel: audit: type=1130 audit(1712945750.781:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:50.786290 kernel: SCSI subsystem initialized Apr 12 18:15:50.787984 dracut-cmdline[269]: dracut-dracut-053 Apr 12 18:15:50.791248 dracut-cmdline[269]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:15:50.798135 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:15:50.798186 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:15:50.798198 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:15:50.800378 systemd-modules-load[251]: Inserted module 'dm_multipath' Apr 12 18:15:50.801140 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:15:50.802675 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:15:50.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:50.806290 kernel: audit: type=1130 audit(1712945750.801:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:50.811663 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:15:50.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:50.816289 kernel: audit: type=1130 audit(1712945750.812:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:50.859279 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:15:50.871282 kernel: iscsi: registered transport (tcp) Apr 12 18:15:50.888294 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:15:50.888333 kernel: QLogic iSCSI HBA Driver Apr 12 18:15:50.922805 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:15:50.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:50.924388 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:15:50.927828 kernel: audit: type=1130 audit(1712945750.923:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:50.968287 kernel: raid6: neonx8 gen() 13819 MB/s Apr 12 18:15:50.985278 kernel: raid6: neonx8 xor() 10831 MB/s Apr 12 18:15:51.002287 kernel: raid6: neonx4 gen() 13562 MB/s Apr 12 18:15:51.019283 kernel: raid6: neonx4 xor() 11267 MB/s Apr 12 18:15:51.036279 kernel: raid6: neonx2 gen() 12949 MB/s Apr 12 18:15:51.053291 kernel: raid6: neonx2 xor() 10395 MB/s Apr 12 18:15:51.070274 kernel: raid6: neonx1 gen() 10533 MB/s Apr 12 18:15:51.087277 kernel: raid6: neonx1 xor() 8791 MB/s Apr 12 18:15:51.104280 kernel: raid6: int64x8 gen() 6268 MB/s Apr 12 18:15:51.121276 kernel: raid6: int64x8 xor() 3541 MB/s Apr 12 18:15:51.138293 kernel: raid6: int64x4 gen() 7218 MB/s Apr 12 18:15:51.155275 kernel: raid6: int64x4 xor() 3850 MB/s Apr 12 18:15:51.172286 kernel: raid6: int64x2 gen() 6149 MB/s Apr 12 18:15:51.189292 kernel: raid6: int64x2 xor() 3316 MB/s Apr 12 18:15:51.206282 kernel: raid6: int64x1 gen() 5040 MB/s Apr 12 18:15:51.223336 kernel: raid6: int64x1 xor() 2642 MB/s Apr 12 18:15:51.223376 kernel: raid6: using algorithm neonx8 gen() 13819 MB/s Apr 12 18:15:51.223385 kernel: raid6: .... xor() 10831 MB/s, rmw enabled Apr 12 18:15:51.224356 kernel: raid6: using neon recovery algorithm Apr 12 18:15:51.235389 kernel: xor: measuring software checksum speed Apr 12 18:15:51.235423 kernel: 8regs : 17293 MB/sec Apr 12 18:15:51.236354 kernel: 32regs : 20749 MB/sec Apr 12 18:15:51.237772 kernel: arm64_neon : 27788 MB/sec Apr 12 18:15:51.237782 kernel: xor: using function: arm64_neon (27788 MB/sec) Apr 12 18:15:51.293295 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Apr 12 18:15:51.303511 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:15:51.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:51.305425 systemd[1]: Starting systemd-udevd.service... Apr 12 18:15:51.309231 kernel: audit: type=1130 audit(1712945751.304:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:51.309253 kernel: audit: type=1334 audit(1712945751.304:10): prog-id=7 op=LOAD Apr 12 18:15:51.304000 audit: BPF prog-id=7 op=LOAD Apr 12 18:15:51.304000 audit: BPF prog-id=8 op=LOAD Apr 12 18:15:51.324098 systemd-udevd[452]: Using default interface naming scheme 'v252'. Apr 12 18:15:51.328714 systemd[1]: Started systemd-udevd.service. Apr 12 18:15:51.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:51.330227 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:15:51.341369 dracut-pre-trigger[456]: rd.md=0: removing MD RAID activation Apr 12 18:15:51.368539 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:15:51.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:51.370073 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:15:51.404762 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:15:51.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:51.437288 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Apr 12 18:15:51.440570 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 18:15:51.440609 kernel: GPT:9289727 != 19775487 Apr 12 18:15:51.440618 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 18:15:51.440634 kernel: GPT:9289727 != 19775487 Apr 12 18:15:51.446000 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 18:15:51.446815 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:15:51.462296 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (502) Apr 12 18:15:51.464465 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:15:51.469632 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:15:51.472475 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:15:51.473489 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:15:51.478002 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:15:51.479756 systemd[1]: Starting disk-uuid.service... Apr 12 18:15:51.485864 disk-uuid[526]: Primary Header is updated. Apr 12 18:15:51.485864 disk-uuid[526]: Secondary Entries is updated. Apr 12 18:15:51.485864 disk-uuid[526]: Secondary Header is updated. Apr 12 18:15:51.490289 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:15:52.503111 disk-uuid[527]: The operation has completed successfully. Apr 12 18:15:52.504241 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:15:52.525481 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:15:52.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:52.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:52.525573 systemd[1]: Finished disk-uuid.service. Apr 12 18:15:52.529582 systemd[1]: Starting verity-setup.service... Apr 12 18:15:52.544286 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Apr 12 18:15:52.567939 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:15:52.570160 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:15:52.571866 systemd[1]: Finished verity-setup.service. Apr 12 18:15:52.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:52.622190 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:15:52.623483 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:15:52.623002 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:15:52.623709 systemd[1]: Starting ignition-setup.service... Apr 12 18:15:52.625912 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:15:52.633944 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:15:52.633978 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:15:52.633988 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:15:52.643780 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:15:52.650514 systemd[1]: Finished ignition-setup.service. Apr 12 18:15:52.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:52.651993 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:15:52.700989 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:15:52.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:52.702000 audit: BPF prog-id=9 op=LOAD Apr 12 18:15:52.703457 systemd[1]: Starting systemd-networkd.service... Apr 12 18:15:52.731137 systemd-networkd[703]: lo: Link UP Apr 12 18:15:52.731148 systemd-networkd[703]: lo: Gained carrier Apr 12 18:15:52.731680 systemd-networkd[703]: Enumeration completed Apr 12 18:15:52.731869 systemd-networkd[703]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:15:52.732951 systemd-networkd[703]: eth0: Link UP Apr 12 18:15:52.732955 systemd-networkd[703]: eth0: Gained carrier Apr 12 18:15:52.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:52.736022 systemd[1]: Started systemd-networkd.service. Apr 12 18:15:52.737145 systemd[1]: Reached target network.target. Apr 12 18:15:52.739100 systemd[1]: Starting iscsiuio.service... Apr 12 18:15:52.745763 ignition[621]: Ignition 2.14.0 Apr 12 18:15:52.745773 ignition[621]: Stage: fetch-offline Apr 12 18:15:52.745814 ignition[621]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:15:52.745823 ignition[621]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:15:52.745963 ignition[621]: parsed url from cmdline: "" Apr 12 18:15:52.745967 ignition[621]: no config URL provided Apr 12 18:15:52.745971 ignition[621]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:15:52.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:52.749712 systemd[1]: Started iscsiuio.service. Apr 12 18:15:52.745978 ignition[621]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:15:52.751944 systemd[1]: Starting iscsid.service... Apr 12 18:15:52.745996 ignition[621]: op(1): [started] loading QEMU firmware config module Apr 12 18:15:52.754338 systemd-networkd[703]: eth0: DHCPv4 address 10.0.0.15/16, gateway 10.0.0.1 acquired from 10.0.0.1 Apr 12 18:15:52.746001 ignition[621]: op(1): executing: "modprobe" "qemu_fw_cfg" Apr 12 18:15:52.757289 iscsid[709]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:15:52.757289 iscsid[709]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:15:52.757289 iscsid[709]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:15:52.757289 iscsid[709]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:15:52.757289 iscsid[709]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:15:52.757289 iscsid[709]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:15:52.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:52.756873 ignition[621]: op(1): [finished] loading QEMU firmware config module Apr 12 18:15:52.759552 systemd[1]: Started iscsid.service. Apr 12 18:15:52.756896 ignition[621]: QEMU firmware config was not found. Ignoring... Apr 12 18:15:52.765430 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:15:52.776455 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:15:52.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:52.777447 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:15:52.778913 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:15:52.780507 systemd[1]: Reached target remote-fs.target. Apr 12 18:15:52.782803 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:15:52.790593 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:15:52.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:52.794850 ignition[621]: parsing config with SHA512: 37b9fe8829f8455ec79c61d0bdfaae391aa37112430ae822b872d3bc470edffdc9aa8bc07eadac5829d52f354ec0ddef8dd4de11e78dfa0a007d20e9d176dc17 Apr 12 18:15:52.820140 unknown[621]: fetched base config from "system" Apr 12 18:15:52.820153 unknown[621]: fetched user config from "qemu" Apr 12 18:15:52.820648 ignition[621]: fetch-offline: fetch-offline passed Apr 12 18:15:52.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:52.821019 systemd-resolved[252]: Detected conflict on linux IN A 10.0.0.15 Apr 12 18:15:52.820718 ignition[621]: Ignition finished successfully Apr 12 18:15:52.821027 systemd-resolved[252]: Hostname conflict, changing published hostname from 'linux' to 'linux2'. Apr 12 18:15:52.821682 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:15:52.822847 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Apr 12 18:15:52.823710 systemd[1]: Starting ignition-kargs.service... Apr 12 18:15:52.832644 ignition[724]: Ignition 2.14.0 Apr 12 18:15:52.832654 ignition[724]: Stage: kargs Apr 12 18:15:52.832756 ignition[724]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:15:52.832766 ignition[724]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:15:52.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:52.834952 systemd[1]: Finished ignition-kargs.service. Apr 12 18:15:52.833558 ignition[724]: kargs: kargs passed Apr 12 18:15:52.836595 systemd[1]: Starting ignition-disks.service... Apr 12 18:15:52.833602 ignition[724]: Ignition finished successfully Apr 12 18:15:52.843903 ignition[730]: Ignition 2.14.0 Apr 12 18:15:52.843913 ignition[730]: Stage: disks Apr 12 18:15:52.844008 ignition[730]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:15:52.844017 ignition[730]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:15:52.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:52.845702 systemd[1]: Finished ignition-disks.service. Apr 12 18:15:52.844893 ignition[730]: disks: disks passed Apr 12 18:15:52.846905 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:15:52.844938 ignition[730]: Ignition finished successfully Apr 12 18:15:52.848377 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:15:52.849674 systemd[1]: Reached target local-fs.target. Apr 12 18:15:52.850867 systemd[1]: Reached target sysinit.target. Apr 12 18:15:52.852173 systemd[1]: Reached target basic.target. Apr 12 18:15:52.854286 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:15:52.865846 systemd-fsck[738]: ROOT: clean, 612/553520 files, 56018/553472 blocks Apr 12 18:15:52.869953 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:15:52.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:52.871643 systemd[1]: Mounting sysroot.mount... Apr 12 18:15:52.877290 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:15:52.877714 systemd[1]: Mounted sysroot.mount. Apr 12 18:15:52.878466 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:15:52.881149 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:15:52.882121 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 18:15:52.882159 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:15:52.882184 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:15:52.884000 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:15:52.885923 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:15:52.890398 initrd-setup-root[748]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:15:52.894836 initrd-setup-root[756]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:15:52.899345 initrd-setup-root[764]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:15:52.903669 initrd-setup-root[772]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:15:52.936491 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:15:52.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:52.938181 systemd[1]: Starting ignition-mount.service... Apr 12 18:15:52.939603 systemd[1]: Starting sysroot-boot.service... Apr 12 18:15:52.944776 bash[789]: umount: /sysroot/usr/share/oem: not mounted. Apr 12 18:15:52.955116 ignition[791]: INFO : Ignition 2.14.0 Apr 12 18:15:52.955116 ignition[791]: INFO : Stage: mount Apr 12 18:15:52.956659 ignition[791]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:15:52.956659 ignition[791]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:15:52.956659 ignition[791]: INFO : mount: mount passed Apr 12 18:15:52.956659 ignition[791]: INFO : Ignition finished successfully Apr 12 18:15:52.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:52.962167 systemd[1]: Finished ignition-mount.service. Apr 12 18:15:52.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:52.967202 systemd[1]: Finished sysroot-boot.service. Apr 12 18:15:53.582091 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:15:53.590294 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (799) Apr 12 18:15:53.592589 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:15:53.592606 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:15:53.592616 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:15:53.596075 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:15:53.597648 systemd[1]: Starting ignition-files.service... Apr 12 18:15:53.611681 ignition[819]: INFO : Ignition 2.14.0 Apr 12 18:15:53.611681 ignition[819]: INFO : Stage: files Apr 12 18:15:53.613230 ignition[819]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:15:53.613230 ignition[819]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:15:53.615252 ignition[819]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:15:53.618370 ignition[819]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:15:53.618370 ignition[819]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:15:53.624012 ignition[819]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:15:53.625343 ignition[819]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:15:53.626632 ignition[819]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:15:53.626632 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:15:53.626632 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Apr 12 18:15:53.625563 unknown[819]: wrote ssh authorized keys file for user: core Apr 12 18:15:53.957479 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 18:15:54.197080 ignition[819]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Apr 12 18:15:54.199841 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:15:54.199841 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:15:54.199841 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Apr 12 18:15:54.411507 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 18:15:54.533665 ignition[819]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Apr 12 18:15:54.536566 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:15:54.536566 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:15:54.536566 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubeadm: attempt #1 Apr 12 18:15:54.571437 systemd-networkd[703]: eth0: Gained IPv6LL Apr 12 18:15:54.586720 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 18:15:54.904973 ignition[819]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 45b3100984c979ba0f1c0df8f4211474c2d75ebe916e677dff5fc8e3b3697cf7a953da94e356f39684cc860dff6878b772b7514c55651c2f866d9efeef23f970 Apr 12 18:15:54.904973 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:15:54.904973 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:15:54.910868 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubelet: attempt #1 Apr 12 18:15:54.927126 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 18:15:55.537751 ignition[819]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 71857ff499ae135fa478e1827a0ed8865e578a8d2b1e25876e914fd0beba03733801c0654bcd4c0567bafeb16887dafb2dbbe8d1116e6ea28dcd8366c142d348 Apr 12 18:15:55.541119 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:15:55.541119 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:15:55.541119 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:15:55.541119 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:15:55.541119 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:15:55.541119 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:15:55.541119 ignition[819]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:15:55.541119 ignition[819]: INFO : files: op(a): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:15:55.541119 ignition[819]: INFO : files: op(a): op(b): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:15:55.541119 ignition[819]: INFO : files: op(a): op(b): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:15:55.541119 ignition[819]: INFO : files: op(a): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:15:55.541119 ignition[819]: INFO : files: op(c): [started] processing unit "prepare-critools.service" Apr 12 18:15:55.541119 ignition[819]: INFO : files: op(c): op(d): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:15:55.541119 ignition[819]: INFO : files: op(c): op(d): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:15:55.541119 ignition[819]: INFO : files: op(c): [finished] processing unit "prepare-critools.service" Apr 12 18:15:55.541119 ignition[819]: INFO : files: op(e): [started] processing unit "coreos-metadata.service" Apr 12 18:15:55.541119 ignition[819]: INFO : files: op(e): op(f): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Apr 12 18:15:55.570061 ignition[819]: INFO : files: op(e): op(f): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Apr 12 18:15:55.570061 ignition[819]: INFO : files: op(e): [finished] processing unit "coreos-metadata.service" Apr 12 18:15:55.570061 ignition[819]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Apr 12 18:15:55.570061 ignition[819]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Apr 12 18:15:55.577897 ignition[819]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Apr 12 18:15:55.580201 ignition[819]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Apr 12 18:15:55.580201 ignition[819]: INFO : files: op(12): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:15:55.580201 ignition[819]: INFO : files: op(12): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:15:55.580201 ignition[819]: INFO : files: op(13): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:15:55.580201 ignition[819]: INFO : files: op(13): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:15:55.580201 ignition[819]: INFO : files: createResultFile: createFiles: op(14): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:15:55.580201 ignition[819]: INFO : files: createResultFile: createFiles: op(14): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:15:55.580201 ignition[819]: INFO : files: files passed Apr 12 18:15:55.580201 ignition[819]: INFO : Ignition finished successfully Apr 12 18:15:55.606568 kernel: kauditd_printk_skb: 22 callbacks suppressed Apr 12 18:15:55.606591 kernel: audit: type=1130 audit(1712945755.582:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.606602 kernel: audit: type=1130 audit(1712945755.592:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.606612 kernel: audit: type=1130 audit(1712945755.601:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.606621 kernel: audit: type=1131 audit(1712945755.601:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.580234 systemd[1]: Finished ignition-files.service. Apr 12 18:15:55.584403 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:15:55.608630 initrd-setup-root-after-ignition[844]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Apr 12 18:15:55.587300 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:15:55.611674 initrd-setup-root-after-ignition[846]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:15:55.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.588045 systemd[1]: Starting ignition-quench.service... Apr 12 18:15:55.619407 kernel: audit: type=1130 audit(1712945755.612:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.619434 kernel: audit: type=1131 audit(1712945755.612:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.591607 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:15:55.592991 systemd[1]: Reached target ignition-complete.target. Apr 12 18:15:55.599084 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:15:55.600529 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:15:55.600617 systemd[1]: Finished ignition-quench.service. Apr 12 18:15:55.611516 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:15:55.611607 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:15:55.612746 systemd[1]: Reached target initrd-fs.target. Apr 12 18:15:55.618790 systemd[1]: Reached target initrd.target. Apr 12 18:15:55.620070 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:15:55.620839 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:15:55.630735 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:15:55.635295 kernel: audit: type=1130 audit(1712945755.631:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.632308 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:15:55.640329 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:15:55.641154 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:15:55.642497 systemd[1]: Stopped target timers.target. Apr 12 18:15:55.643795 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:15:55.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.643900 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:15:55.649089 kernel: audit: type=1131 audit(1712945755.644:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.645145 systemd[1]: Stopped target initrd.target. Apr 12 18:15:55.648594 systemd[1]: Stopped target basic.target. Apr 12 18:15:55.649831 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:15:55.651456 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:15:55.653374 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:15:55.654842 systemd[1]: Stopped target remote-fs.target. Apr 12 18:15:55.656177 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:15:55.657481 systemd[1]: Stopped target sysinit.target. Apr 12 18:15:55.658682 systemd[1]: Stopped target local-fs.target. Apr 12 18:15:55.659956 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:15:55.661193 systemd[1]: Stopped target swap.target. Apr 12 18:15:55.666300 kernel: audit: type=1131 audit(1712945755.663:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.662342 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:15:55.662457 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:15:55.671304 kernel: audit: type=1131 audit(1712945755.668:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.663791 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:15:55.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.667046 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:15:55.667145 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:15:55.668609 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:15:55.668705 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:15:55.672244 systemd[1]: Stopped target paths.target. Apr 12 18:15:55.673439 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:15:55.678289 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:15:55.679210 systemd[1]: Stopped target slices.target. Apr 12 18:15:55.680578 systemd[1]: Stopped target sockets.target. Apr 12 18:15:55.681821 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:15:55.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.681928 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:15:55.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.683301 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:15:55.683396 systemd[1]: Stopped ignition-files.service. Apr 12 18:15:55.687803 iscsid[709]: iscsid shutting down. Apr 12 18:15:55.685797 systemd[1]: Stopping ignition-mount.service... Apr 12 18:15:55.689509 systemd[1]: Stopping iscsid.service... Apr 12 18:15:55.690902 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:15:55.694123 ignition[860]: INFO : Ignition 2.14.0 Apr 12 18:15:55.694123 ignition[860]: INFO : Stage: umount Apr 12 18:15:55.694123 ignition[860]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:15:55.694123 ignition[860]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:15:55.694123 ignition[860]: INFO : umount: umount passed Apr 12 18:15:55.694123 ignition[860]: INFO : Ignition finished successfully Apr 12 18:15:55.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.693359 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:15:55.693518 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:15:55.695003 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:15:55.695106 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:15:55.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.698297 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:15:55.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.698416 systemd[1]: Stopped iscsid.service. Apr 12 18:15:55.700591 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:15:55.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.700690 systemd[1]: Stopped ignition-mount.service. Apr 12 18:15:55.703475 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:15:55.704026 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:15:55.704157 systemd[1]: Closed iscsid.socket. Apr 12 18:15:55.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.705868 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:15:55.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.705913 systemd[1]: Stopped ignition-disks.service. Apr 12 18:15:55.708248 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:15:55.708305 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:15:55.711126 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:15:55.711170 systemd[1]: Stopped ignition-setup.service. Apr 12 18:15:55.712561 systemd[1]: Stopping iscsiuio.service... Apr 12 18:15:55.715735 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:15:55.715852 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:15:55.717592 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:15:55.717687 systemd[1]: Stopped iscsiuio.service. Apr 12 18:15:55.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.719446 systemd[1]: Stopped target network.target. Apr 12 18:15:55.720879 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:15:55.720918 systemd[1]: Closed iscsiuio.socket. Apr 12 18:15:55.722473 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:15:55.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.723955 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:15:55.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.729308 systemd-networkd[703]: eth0: DHCPv6 lease lost Apr 12 18:15:55.741000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:15:55.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.731007 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:15:55.731107 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:15:55.732814 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:15:55.732842 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:15:55.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.734560 systemd[1]: Stopping network-cleanup.service... Apr 12 18:15:55.736892 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:15:55.736954 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:15:55.751000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:15:55.738959 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:15:55.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.739002 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:15:55.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.741107 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:15:55.741149 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:15:55.746229 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:15:55.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.748047 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 18:15:55.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.748611 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:15:55.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.748703 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:15:55.752587 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:15:55.752678 systemd[1]: Stopped network-cleanup.service. Apr 12 18:15:55.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.754082 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:15:55.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.754190 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:15:55.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.755740 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:15:55.755773 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:15:55.757032 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:15:55.757064 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:15:55.760322 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:15:55.760374 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:15:55.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:55.761822 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:15:55.761863 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:15:55.763184 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:15:55.763222 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:15:55.766000 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:15:55.768941 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Apr 12 18:15:55.769030 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Apr 12 18:15:55.771453 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:15:55.771492 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:15:55.772340 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:15:55.772379 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:15:55.774681 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Apr 12 18:15:55.775136 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:15:55.775219 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:15:55.776298 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:15:55.776371 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:15:55.777696 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:15:55.779086 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:15:55.779134 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:15:55.781144 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:15:55.787638 systemd[1]: Switching root. Apr 12 18:15:55.802793 systemd-journald[250]: Journal stopped Apr 12 18:15:57.872134 systemd-journald[250]: Received SIGTERM from PID 1 (systemd). Apr 12 18:15:57.872195 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:15:57.872208 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:15:57.872218 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:15:57.872228 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:15:57.872237 kernel: SELinux: policy capability open_perms=1 Apr 12 18:15:57.872247 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:15:57.872279 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:15:57.872290 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:15:57.872301 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:15:57.872311 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:15:57.872321 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:15:57.872332 systemd[1]: Successfully loaded SELinux policy in 33.933ms. Apr 12 18:15:57.872350 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.873ms. Apr 12 18:15:57.872362 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:15:57.872373 systemd[1]: Detected virtualization kvm. Apr 12 18:15:57.872384 systemd[1]: Detected architecture arm64. Apr 12 18:15:57.872396 systemd[1]: Detected first boot. Apr 12 18:15:57.872406 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:15:57.872417 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:15:57.872427 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:15:57.872439 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:15:57.872450 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:15:57.872462 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:15:57.872474 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:15:57.872486 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:15:57.872496 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:15:57.872508 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:15:57.872519 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:15:57.872529 systemd[1]: Created slice system-getty.slice. Apr 12 18:15:57.872540 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:15:57.872551 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:15:57.872562 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:15:57.872574 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:15:57.872584 systemd[1]: Created slice user.slice. Apr 12 18:15:57.872595 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:15:57.872605 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:15:57.872616 systemd[1]: Set up automount boot.automount. Apr 12 18:15:57.872627 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:15:57.872637 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:15:57.872648 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:15:57.872661 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:15:57.872672 systemd[1]: Reached target integritysetup.target. Apr 12 18:15:57.872683 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:15:57.872693 systemd[1]: Reached target remote-fs.target. Apr 12 18:15:57.872704 systemd[1]: Reached target slices.target. Apr 12 18:15:57.872714 systemd[1]: Reached target swap.target. Apr 12 18:15:57.872732 systemd[1]: Reached target torcx.target. Apr 12 18:15:57.872742 systemd[1]: Reached target veritysetup.target. Apr 12 18:15:57.872754 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:15:57.872765 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:15:57.872776 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:15:57.872786 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:15:57.872797 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:15:57.872807 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:15:57.872818 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:15:57.872829 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:15:57.872840 systemd[1]: Mounting media.mount... Apr 12 18:15:57.872851 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:15:57.872863 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:15:57.872875 systemd[1]: Mounting tmp.mount... Apr 12 18:15:57.872886 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:15:57.872897 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:15:57.872908 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:15:57.872918 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:15:57.872929 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:15:57.872940 systemd[1]: Starting modprobe@drm.service... Apr 12 18:15:57.872951 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:15:57.872962 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:15:57.872973 systemd[1]: Starting modprobe@loop.service... Apr 12 18:15:57.872984 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:15:57.872995 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:15:57.873006 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:15:57.873017 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:15:57.873028 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:15:57.873039 systemd[1]: Stopped systemd-journald.service. Apr 12 18:15:57.873049 kernel: fuse: init (API version 7.34) Apr 12 18:15:57.873061 systemd[1]: Starting systemd-journald.service... Apr 12 18:15:57.873072 kernel: loop: module loaded Apr 12 18:15:57.873084 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:15:57.873095 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:15:57.873106 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:15:57.873117 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:15:57.873127 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:15:57.873138 systemd[1]: Stopped verity-setup.service. Apr 12 18:15:57.873159 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:15:57.873169 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:15:57.873180 systemd[1]: Mounted media.mount. Apr 12 18:15:57.873195 systemd-journald[963]: Journal started Apr 12 18:15:57.873233 systemd-journald[963]: Runtime Journal (/run/log/journal/fcc26dc5cdbc46d4982297968a35e3ac) is 6.0M, max 48.7M, 42.6M free. Apr 12 18:15:55.868000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:15:56.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:15:56.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:15:56.027000 audit: BPF prog-id=10 op=LOAD Apr 12 18:15:56.027000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:15:56.027000 audit: BPF prog-id=11 op=LOAD Apr 12 18:15:56.027000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:15:56.068000 audit[893]: AVC avc: denied { associate } for pid=893 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:15:56.068000 audit[893]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001bd8ac a1=400013ede0 a2=40001450c0 a3=32 items=0 ppid=876 pid=893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:56.068000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:15:56.069000 audit[893]: AVC avc: denied { associate } for pid=893 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:15:56.069000 audit[893]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001bd989 a2=1ed a3=0 items=2 ppid=876 pid=893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:56.069000 audit: CWD cwd="/" Apr 12 18:15:56.069000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:15:56.069000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:15:56.069000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:15:57.749000 audit: BPF prog-id=12 op=LOAD Apr 12 18:15:57.749000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:15:57.750000 audit: BPF prog-id=13 op=LOAD Apr 12 18:15:57.750000 audit: BPF prog-id=14 op=LOAD Apr 12 18:15:57.750000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:15:57.750000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:15:57.750000 audit: BPF prog-id=15 op=LOAD Apr 12 18:15:57.750000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:15:57.750000 audit: BPF prog-id=16 op=LOAD Apr 12 18:15:57.750000 audit: BPF prog-id=17 op=LOAD Apr 12 18:15:57.750000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:15:57.750000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:15:57.751000 audit: BPF prog-id=18 op=LOAD Apr 12 18:15:57.751000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:15:57.751000 audit: BPF prog-id=19 op=LOAD Apr 12 18:15:57.751000 audit: BPF prog-id=20 op=LOAD Apr 12 18:15:57.751000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:15:57.751000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:15:57.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.764000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:15:57.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.850000 audit: BPF prog-id=21 op=LOAD Apr 12 18:15:57.850000 audit: BPF prog-id=22 op=LOAD Apr 12 18:15:57.850000 audit: BPF prog-id=23 op=LOAD Apr 12 18:15:57.850000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:15:57.850000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:15:57.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.870000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:15:57.870000 audit[963]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffeff0ff10 a2=4000 a3=1 items=0 ppid=1 pid=963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:57.870000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:15:57.748890 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:15:56.066491 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:15:57.748903 systemd[1]: Unnecessary job was removed for dev-vda6.device. Apr 12 18:15:56.066809 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:15:57.752352 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:15:56.066829 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:15:57.874705 systemd[1]: Started systemd-journald.service. Apr 12 18:15:56.066861 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:56Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:15:57.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:56.066870 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:56Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:15:56.066900 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:56Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:15:56.066912 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:56Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:15:57.875039 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:15:56.067110 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:56Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:15:56.067144 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:15:56.067155 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:15:56.068001 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:15:56.068039 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:15:56.068059 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:15:56.068073 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:15:56.068093 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:15:56.068106 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:15:57.498782 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:57Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:15:57.499045 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:57Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:15:57.499135 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:57Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:15:57.499308 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:57Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:15:57.499357 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:57Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:15:57.499415 /usr/lib/systemd/system-generators/torcx-generator[893]: time="2024-04-12T18:15:57Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:15:57.876160 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:15:57.877042 systemd[1]: Mounted tmp.mount. Apr 12 18:15:57.878082 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:15:57.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.879145 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:15:57.879324 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:15:57.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.880397 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:15:57.880552 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:15:57.881548 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:15:57.881693 systemd[1]: Finished modprobe@drm.service. Apr 12 18:15:57.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.882921 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:15:57.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.883973 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:15:57.884127 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:15:57.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.885210 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:15:57.885367 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:15:57.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.886361 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:15:57.886505 systemd[1]: Finished modprobe@loop.service. Apr 12 18:15:57.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.887552 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:15:57.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.888786 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:15:57.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.889960 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:15:57.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.891229 systemd[1]: Reached target network-pre.target. Apr 12 18:15:57.893225 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:15:57.895241 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:15:57.895946 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:15:57.897313 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:15:57.899202 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:15:57.900309 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:15:57.901235 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:15:57.902069 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:15:57.903042 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:15:57.908346 systemd-journald[963]: Time spent on flushing to /var/log/journal/fcc26dc5cdbc46d4982297968a35e3ac is 12.847ms for 1014 entries. Apr 12 18:15:57.908346 systemd-journald[963]: System Journal (/var/log/journal/fcc26dc5cdbc46d4982297968a35e3ac) is 8.0M, max 195.6M, 187.6M free. Apr 12 18:15:57.943073 systemd-journald[963]: Received client request to flush runtime journal. Apr 12 18:15:57.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.904890 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:15:57.907915 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:15:57.944458 udevadm[995]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 18:15:57.910608 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:15:57.914493 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:15:57.915502 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:15:57.916665 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:15:57.918795 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:15:57.927998 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:15:57.938851 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:15:57.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:57.941181 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:15:57.944040 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:15:57.959608 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:15:57.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:58.306336 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:15:58.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:58.307000 audit: BPF prog-id=24 op=LOAD Apr 12 18:15:58.307000 audit: BPF prog-id=25 op=LOAD Apr 12 18:15:58.307000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:15:58.307000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:15:58.308649 systemd[1]: Starting systemd-udevd.service... Apr 12 18:15:58.324094 systemd-udevd[1000]: Using default interface naming scheme 'v252'. Apr 12 18:15:58.336315 systemd[1]: Started systemd-udevd.service. Apr 12 18:15:58.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:58.338000 audit: BPF prog-id=26 op=LOAD Apr 12 18:15:58.339141 systemd[1]: Starting systemd-networkd.service... Apr 12 18:15:58.348000 audit: BPF prog-id=27 op=LOAD Apr 12 18:15:58.348000 audit: BPF prog-id=28 op=LOAD Apr 12 18:15:58.348000 audit: BPF prog-id=29 op=LOAD Apr 12 18:15:58.349365 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:15:58.363909 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Apr 12 18:15:58.386907 systemd[1]: Started systemd-userdbd.service. Apr 12 18:15:58.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:58.409045 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:15:58.449899 systemd-networkd[1009]: lo: Link UP Apr 12 18:15:58.449911 systemd-networkd[1009]: lo: Gained carrier Apr 12 18:15:58.450371 systemd-networkd[1009]: Enumeration completed Apr 12 18:15:58.450477 systemd[1]: Started systemd-networkd.service. Apr 12 18:15:58.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:58.451393 systemd-networkd[1009]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:15:58.454287 systemd-networkd[1009]: eth0: Link UP Apr 12 18:15:58.454298 systemd-networkd[1009]: eth0: Gained carrier Apr 12 18:15:58.466709 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:15:58.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:58.468871 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:15:58.475405 systemd-networkd[1009]: eth0: DHCPv4 address 10.0.0.15/16, gateway 10.0.0.1 acquired from 10.0.0.1 Apr 12 18:15:58.478955 lvm[1033]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:15:58.506208 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:15:58.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:58.507292 systemd[1]: Reached target cryptsetup.target. Apr 12 18:15:58.509342 systemd[1]: Starting lvm2-activation.service... Apr 12 18:15:58.513166 lvm[1034]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:15:58.545234 systemd[1]: Finished lvm2-activation.service. Apr 12 18:15:58.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:58.546203 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:15:58.547073 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:15:58.547108 systemd[1]: Reached target local-fs.target. Apr 12 18:15:58.547918 systemd[1]: Reached target machines.target. Apr 12 18:15:58.549984 systemd[1]: Starting ldconfig.service... Apr 12 18:15:58.551054 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:15:58.551133 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:15:58.552338 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:15:58.554579 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:15:58.557071 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:15:58.559007 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:15:58.559094 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:15:58.560886 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:15:58.562076 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1036 (bootctl) Apr 12 18:15:58.563756 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:15:58.565982 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:15:58.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:58.577928 systemd-tmpfiles[1040]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:15:58.581160 systemd-tmpfiles[1040]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:15:58.582332 systemd-tmpfiles[1040]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:15:58.630173 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:15:58.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:58.640906 systemd-fsck[1046]: fsck.fat 4.2 (2021-01-31) Apr 12 18:15:58.640906 systemd-fsck[1046]: /dev/vda1: 236 files, 117047/258078 clusters Apr 12 18:15:58.643511 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:15:58.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:58.720225 ldconfig[1035]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:15:58.723780 systemd[1]: Finished ldconfig.service. Apr 12 18:15:58.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:58.869425 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:15:58.873031 systemd[1]: Mounting boot.mount... Apr 12 18:15:58.893468 systemd[1]: Mounted boot.mount. Apr 12 18:15:58.900562 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:15:58.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:58.954829 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:15:58.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:58.957066 systemd[1]: Starting audit-rules.service... Apr 12 18:15:58.958909 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:15:58.960826 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:15:58.962000 audit: BPF prog-id=30 op=LOAD Apr 12 18:15:58.963416 systemd[1]: Starting systemd-resolved.service... Apr 12 18:15:58.964000 audit: BPF prog-id=31 op=LOAD Apr 12 18:15:58.967133 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:15:58.969251 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:15:58.970839 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:15:58.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:58.972336 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:15:58.978000 audit[1060]: SYSTEM_BOOT pid=1060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:15:58.982297 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:15:58.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:58.988853 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:15:58.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:58.991519 systemd[1]: Starting systemd-update-done.service... Apr 12 18:15:58.998652 systemd[1]: Finished systemd-update-done.service. Apr 12 18:15:58.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:59.021000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:15:59.021000 audit[1070]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffef6f87a0 a2=420 a3=0 items=0 ppid=1049 pid=1070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:59.021000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:15:59.021556 augenrules[1070]: No rules Apr 12 18:15:59.022568 systemd[1]: Finished audit-rules.service. Apr 12 18:15:59.030631 systemd-resolved[1053]: Positive Trust Anchors: Apr 12 18:15:59.030902 systemd-resolved[1053]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:15:59.030989 systemd-resolved[1053]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:15:59.042275 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:15:58.579528 systemd-timesyncd[1059]: Contacted time server 10.0.0.1:123 (10.0.0.1). Apr 12 18:15:58.601642 systemd-journald[963]: Time jumped backwards, rotating. Apr 12 18:15:58.579591 systemd-timesyncd[1059]: Initial clock synchronization to Fri 2024-04-12 18:15:58.579453 UTC. Apr 12 18:15:58.579687 systemd[1]: Reached target time-set.target. Apr 12 18:15:58.593484 systemd-resolved[1053]: Defaulting to hostname 'linux'. Apr 12 18:15:58.594958 systemd[1]: Started systemd-resolved.service. Apr 12 18:15:58.595836 systemd[1]: Reached target network.target. Apr 12 18:15:58.596573 systemd[1]: Reached target nss-lookup.target. Apr 12 18:15:58.597324 systemd[1]: Reached target sysinit.target. Apr 12 18:15:58.598269 systemd[1]: Started motdgen.path. Apr 12 18:15:58.599082 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:15:58.600409 systemd[1]: Started logrotate.timer. Apr 12 18:15:58.601339 systemd[1]: Started mdadm.timer. Apr 12 18:15:58.602031 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:15:58.602851 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:15:58.602889 systemd[1]: Reached target paths.target. Apr 12 18:15:58.603603 systemd[1]: Reached target timers.target. Apr 12 18:15:58.604699 systemd[1]: Listening on dbus.socket. Apr 12 18:15:58.606557 systemd[1]: Starting docker.socket... Apr 12 18:15:58.609566 systemd[1]: Listening on sshd.socket. Apr 12 18:15:58.610345 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:15:58.610795 systemd[1]: Listening on docker.socket. Apr 12 18:15:58.611603 systemd[1]: Reached target sockets.target. Apr 12 18:15:58.612326 systemd[1]: Reached target basic.target. Apr 12 18:15:58.613086 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:15:58.613117 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:15:58.614144 systemd[1]: Starting containerd.service... Apr 12 18:15:58.615865 systemd[1]: Starting dbus.service... Apr 12 18:15:58.617858 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:15:58.620042 systemd[1]: Starting extend-filesystems.service... Apr 12 18:15:58.620971 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:15:58.622216 systemd[1]: Starting motdgen.service... Apr 12 18:15:58.623161 jq[1081]: false Apr 12 18:15:58.624257 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:15:58.626476 systemd[1]: Starting prepare-critools.service... Apr 12 18:15:58.628899 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:15:58.630746 systemd[1]: Starting sshd-keygen.service... Apr 12 18:15:58.633528 systemd[1]: Starting systemd-logind.service... Apr 12 18:15:58.635190 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:15:58.635252 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 18:15:58.635710 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:15:58.636420 systemd[1]: Starting update-engine.service... Apr 12 18:15:58.638411 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:15:58.641563 extend-filesystems[1082]: Found vda Apr 12 18:15:58.641563 extend-filesystems[1082]: Found vda1 Apr 12 18:15:58.641563 extend-filesystems[1082]: Found vda2 Apr 12 18:15:58.641563 extend-filesystems[1082]: Found vda3 Apr 12 18:15:58.641563 extend-filesystems[1082]: Found usr Apr 12 18:15:58.641563 extend-filesystems[1082]: Found vda4 Apr 12 18:15:58.641563 extend-filesystems[1082]: Found vda6 Apr 12 18:15:58.641563 extend-filesystems[1082]: Found vda7 Apr 12 18:15:58.641563 extend-filesystems[1082]: Found vda9 Apr 12 18:15:58.641563 extend-filesystems[1082]: Checking size of /dev/vda9 Apr 12 18:15:58.657639 jq[1101]: true Apr 12 18:15:58.641678 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:15:58.658798 dbus-daemon[1080]: [system] SELinux support is enabled Apr 12 18:15:58.641853 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:15:58.660622 tar[1104]: ./ Apr 12 18:15:58.660622 tar[1104]: ./loopback Apr 12 18:15:58.642144 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:15:58.660876 tar[1105]: crictl Apr 12 18:15:58.643200 systemd[1]: Finished motdgen.service. Apr 12 18:15:58.661086 jq[1107]: true Apr 12 18:15:58.647159 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:15:58.647324 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:15:58.658967 systemd[1]: Started dbus.service. Apr 12 18:15:58.661624 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:15:58.661649 systemd[1]: Reached target system-config.target. Apr 12 18:15:58.662482 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:15:58.662498 systemd[1]: Reached target user-config.target. Apr 12 18:15:58.685527 extend-filesystems[1082]: Resized partition /dev/vda9 Apr 12 18:15:58.700566 extend-filesystems[1125]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 18:15:58.722238 systemd-logind[1095]: Watching system buttons on /dev/input/event0 (Power Button) Apr 12 18:15:58.724106 systemd-logind[1095]: New seat seat0. Apr 12 18:15:58.727432 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Apr 12 18:15:58.734341 systemd[1]: Started systemd-logind.service. Apr 12 18:15:58.746801 update_engine[1099]: I0412 18:15:58.746537 1099 main.cc:92] Flatcar Update Engine starting Apr 12 18:15:58.752432 systemd[1]: Started update-engine.service. Apr 12 18:15:58.755989 systemd[1]: Started locksmithd.service. Apr 12 18:15:58.758497 bash[1129]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:15:58.759458 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:15:58.760372 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Apr 12 18:15:58.761634 update_engine[1099]: I0412 18:15:58.761605 1099 update_check_scheduler.cc:74] Next update check in 4m55s Apr 12 18:15:58.774706 extend-filesystems[1125]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Apr 12 18:15:58.774706 extend-filesystems[1125]: old_desc_blocks = 1, new_desc_blocks = 1 Apr 12 18:15:58.774706 extend-filesystems[1125]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Apr 12 18:15:58.779057 extend-filesystems[1082]: Resized filesystem in /dev/vda9 Apr 12 18:15:58.776469 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:15:58.779972 env[1109]: time="2024-04-12T18:15:58.779176569Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:15:58.776645 systemd[1]: Finished extend-filesystems.service. Apr 12 18:15:58.782279 tar[1104]: ./bandwidth Apr 12 18:15:58.838532 tar[1104]: ./ptp Apr 12 18:15:58.841914 env[1109]: time="2024-04-12T18:15:58.841821449Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:15:58.842968 env[1109]: time="2024-04-12T18:15:58.842217529Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:15:58.845207 env[1109]: time="2024-04-12T18:15:58.845071169Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:15:58.845245 env[1109]: time="2024-04-12T18:15:58.845211929Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:15:58.845633 env[1109]: time="2024-04-12T18:15:58.845605169Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:15:58.845801 env[1109]: time="2024-04-12T18:15:58.845777289Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:15:58.845842 env[1109]: time="2024-04-12T18:15:58.845808409Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:15:58.845900 env[1109]: time="2024-04-12T18:15:58.845829769Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:15:58.846051 env[1109]: time="2024-04-12T18:15:58.846031609Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:15:58.846822 env[1109]: time="2024-04-12T18:15:58.846740729Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:15:58.847173 env[1109]: time="2024-04-12T18:15:58.847143489Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:15:58.847241 env[1109]: time="2024-04-12T18:15:58.847173929Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:15:58.847367 env[1109]: time="2024-04-12T18:15:58.847338129Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:15:58.847444 env[1109]: time="2024-04-12T18:15:58.847424289Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:15:58.856676 env[1109]: time="2024-04-12T18:15:58.856645809Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:15:58.856716 env[1109]: time="2024-04-12T18:15:58.856683289Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:15:58.856716 env[1109]: time="2024-04-12T18:15:58.856706089Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:15:58.856764 env[1109]: time="2024-04-12T18:15:58.856736289Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:15:58.856764 env[1109]: time="2024-04-12T18:15:58.856751849Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:15:58.856822 env[1109]: time="2024-04-12T18:15:58.856766689Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:15:58.856822 env[1109]: time="2024-04-12T18:15:58.856780849Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:15:58.857132 env[1109]: time="2024-04-12T18:15:58.857112929Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:15:58.857160 env[1109]: time="2024-04-12T18:15:58.857137049Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:15:58.857160 env[1109]: time="2024-04-12T18:15:58.857152609Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:15:58.857194 env[1109]: time="2024-04-12T18:15:58.857164329Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:15:58.857194 env[1109]: time="2024-04-12T18:15:58.857177129Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:15:58.857315 env[1109]: time="2024-04-12T18:15:58.857294369Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:15:58.857404 env[1109]: time="2024-04-12T18:15:58.857388409Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:15:58.857617 env[1109]: time="2024-04-12T18:15:58.857599249Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:15:58.857649 env[1109]: time="2024-04-12T18:15:58.857627529Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:15:58.857649 env[1109]: time="2024-04-12T18:15:58.857640249Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:15:58.857797 env[1109]: time="2024-04-12T18:15:58.857781089Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:15:58.857835 env[1109]: time="2024-04-12T18:15:58.857797529Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:15:58.857835 env[1109]: time="2024-04-12T18:15:58.857810049Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:15:58.857835 env[1109]: time="2024-04-12T18:15:58.857830689Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:15:58.857900 env[1109]: time="2024-04-12T18:15:58.857842689Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:15:58.857900 env[1109]: time="2024-04-12T18:15:58.857855569Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:15:58.857900 env[1109]: time="2024-04-12T18:15:58.857866649Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:15:58.857900 env[1109]: time="2024-04-12T18:15:58.857877969Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:15:58.857900 env[1109]: time="2024-04-12T18:15:58.857890409Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:15:58.858139 env[1109]: time="2024-04-12T18:15:58.858117889Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:15:58.858171 env[1109]: time="2024-04-12T18:15:58.858141249Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:15:58.858171 env[1109]: time="2024-04-12T18:15:58.858155209Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:15:58.858171 env[1109]: time="2024-04-12T18:15:58.858166729Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:15:58.858225 env[1109]: time="2024-04-12T18:15:58.858181969Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:15:58.858225 env[1109]: time="2024-04-12T18:15:58.858193009Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:15:58.858225 env[1109]: time="2024-04-12T18:15:58.858209609Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:15:58.858281 env[1109]: time="2024-04-12T18:15:58.858241929Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:15:58.858494 env[1109]: time="2024-04-12T18:15:58.858442889Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:15:58.861828 env[1109]: time="2024-04-12T18:15:58.858501849Z" level=info msg="Connect containerd service" Apr 12 18:15:58.861828 env[1109]: time="2024-04-12T18:15:58.858534609Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:15:58.861828 env[1109]: time="2024-04-12T18:15:58.859181569Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:15:58.861828 env[1109]: time="2024-04-12T18:15:58.859576769Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:15:58.861828 env[1109]: time="2024-04-12T18:15:58.859614209Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:15:58.861828 env[1109]: time="2024-04-12T18:15:58.859657369Z" level=info msg="containerd successfully booted in 0.087236s" Apr 12 18:15:58.859752 systemd[1]: Started containerd.service. Apr 12 18:15:58.862599 env[1109]: time="2024-04-12T18:15:58.862041609Z" level=info msg="Start subscribing containerd event" Apr 12 18:15:58.862599 env[1109]: time="2024-04-12T18:15:58.862092969Z" level=info msg="Start recovering state" Apr 12 18:15:58.862599 env[1109]: time="2024-04-12T18:15:58.862148409Z" level=info msg="Start event monitor" Apr 12 18:15:58.862599 env[1109]: time="2024-04-12T18:15:58.862167169Z" level=info msg="Start snapshots syncer" Apr 12 18:15:58.862599 env[1109]: time="2024-04-12T18:15:58.862176809Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:15:58.862599 env[1109]: time="2024-04-12T18:15:58.862184569Z" level=info msg="Start streaming server" Apr 12 18:15:58.872632 tar[1104]: ./vlan Apr 12 18:15:58.907106 tar[1104]: ./host-device Apr 12 18:15:58.941908 tar[1104]: ./tuning Apr 12 18:15:58.972550 tar[1104]: ./vrf Apr 12 18:15:58.973808 locksmithd[1136]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:15:59.004002 tar[1104]: ./sbr Apr 12 18:15:59.034350 tar[1104]: ./tap Apr 12 18:15:59.069612 tar[1104]: ./dhcp Apr 12 18:15:59.086220 systemd[1]: Finished prepare-critools.service. Apr 12 18:15:59.145528 tar[1104]: ./static Apr 12 18:15:59.166519 tar[1104]: ./firewall Apr 12 18:15:59.198456 tar[1104]: ./macvlan Apr 12 18:15:59.227415 tar[1104]: ./dummy Apr 12 18:15:59.255851 tar[1104]: ./bridge Apr 12 18:15:59.286908 tar[1104]: ./ipvlan Apr 12 18:15:59.315409 tar[1104]: ./portmap Apr 12 18:15:59.342584 tar[1104]: ./host-local Apr 12 18:15:59.380470 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:15:59.931514 systemd-networkd[1009]: eth0: Gained IPv6LL Apr 12 18:16:00.132503 sshd_keygen[1100]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:16:00.150933 systemd[1]: Finished sshd-keygen.service. Apr 12 18:16:00.153387 systemd[1]: Starting issuegen.service... Apr 12 18:16:00.157867 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:16:00.158038 systemd[1]: Finished issuegen.service. Apr 12 18:16:00.160522 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:16:00.167185 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:16:00.169955 systemd[1]: Started getty@tty1.service. Apr 12 18:16:00.172301 systemd[1]: Started serial-getty@ttyAMA0.service. Apr 12 18:16:00.173413 systemd[1]: Reached target getty.target. Apr 12 18:16:00.174235 systemd[1]: Reached target multi-user.target. Apr 12 18:16:00.176473 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:16:00.183283 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:16:00.183529 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:16:00.184624 systemd[1]: Startup finished in 592ms (kernel) + 5.240s (initrd) + 4.819s (userspace) = 10.652s. Apr 12 18:16:02.686745 systemd[1]: Created slice system-sshd.slice. Apr 12 18:16:02.688009 systemd[1]: Started sshd@0-10.0.0.15:22-10.0.0.1:52586.service. Apr 12 18:16:02.736303 sshd[1163]: Accepted publickey for core from 10.0.0.1 port 52586 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:02.738384 sshd[1163]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:02.748338 systemd[1]: Created slice user-500.slice. Apr 12 18:16:02.749591 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:16:02.751799 systemd-logind[1095]: New session 1 of user core. Apr 12 18:16:02.757852 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:16:02.759465 systemd[1]: Starting user@500.service... Apr 12 18:16:02.762130 (systemd)[1166]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:02.822444 systemd[1166]: Queued start job for default target default.target. Apr 12 18:16:02.822945 systemd[1166]: Reached target paths.target. Apr 12 18:16:02.822965 systemd[1166]: Reached target sockets.target. Apr 12 18:16:02.822976 systemd[1166]: Reached target timers.target. Apr 12 18:16:02.822986 systemd[1166]: Reached target basic.target. Apr 12 18:16:02.823039 systemd[1166]: Reached target default.target. Apr 12 18:16:02.823063 systemd[1166]: Startup finished in 54ms. Apr 12 18:16:02.823096 systemd[1]: Started user@500.service. Apr 12 18:16:02.824046 systemd[1]: Started session-1.scope. Apr 12 18:16:02.877856 systemd[1]: Started sshd@1-10.0.0.15:22-10.0.0.1:52590.service. Apr 12 18:16:02.918031 sshd[1175]: Accepted publickey for core from 10.0.0.1 port 52590 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:02.919557 sshd[1175]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:02.923869 systemd[1]: Started session-2.scope. Apr 12 18:16:02.924026 systemd-logind[1095]: New session 2 of user core. Apr 12 18:16:02.979529 sshd[1175]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:02.982793 systemd[1]: Started sshd@2-10.0.0.15:22-10.0.0.1:52602.service. Apr 12 18:16:02.983307 systemd[1]: sshd@1-10.0.0.15:22-10.0.0.1:52590.service: Deactivated successfully. Apr 12 18:16:02.984006 systemd[1]: session-2.scope: Deactivated successfully. Apr 12 18:16:02.984572 systemd-logind[1095]: Session 2 logged out. Waiting for processes to exit. Apr 12 18:16:02.985578 systemd-logind[1095]: Removed session 2. Apr 12 18:16:03.024101 sshd[1180]: Accepted publickey for core from 10.0.0.1 port 52602 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:03.025602 sshd[1180]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:03.029264 systemd-logind[1095]: New session 3 of user core. Apr 12 18:16:03.029689 systemd[1]: Started session-3.scope. Apr 12 18:16:03.080442 sshd[1180]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:03.083036 systemd[1]: sshd@2-10.0.0.15:22-10.0.0.1:52602.service: Deactivated successfully. Apr 12 18:16:03.083595 systemd[1]: session-3.scope: Deactivated successfully. Apr 12 18:16:03.084121 systemd-logind[1095]: Session 3 logged out. Waiting for processes to exit. Apr 12 18:16:03.085181 systemd[1]: Started sshd@3-10.0.0.15:22-10.0.0.1:52604.service. Apr 12 18:16:03.085931 systemd-logind[1095]: Removed session 3. Apr 12 18:16:03.126292 sshd[1187]: Accepted publickey for core from 10.0.0.1 port 52604 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:03.127556 sshd[1187]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:03.131854 systemd[1]: Started session-4.scope. Apr 12 18:16:03.132255 systemd-logind[1095]: New session 4 of user core. Apr 12 18:16:03.186000 sshd[1187]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:03.188745 systemd[1]: sshd@3-10.0.0.15:22-10.0.0.1:52604.service: Deactivated successfully. Apr 12 18:16:03.189474 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:16:03.189980 systemd-logind[1095]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:16:03.191157 systemd[1]: Started sshd@4-10.0.0.15:22-10.0.0.1:52608.service. Apr 12 18:16:03.191798 systemd-logind[1095]: Removed session 4. Apr 12 18:16:03.232775 sshd[1194]: Accepted publickey for core from 10.0.0.1 port 52608 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:03.233984 sshd[1194]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:03.237424 systemd-logind[1095]: New session 5 of user core. Apr 12 18:16:03.238322 systemd[1]: Started session-5.scope. Apr 12 18:16:03.296598 sudo[1197]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:16:03.296829 sudo[1197]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:16:03.313588 dbus-daemon[1080]: avc: received setenforce notice (enforcing=1) Apr 12 18:16:03.315443 sudo[1197]: pam_unix(sudo:session): session closed for user root Apr 12 18:16:03.317596 sshd[1194]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:03.321828 systemd[1]: Started sshd@5-10.0.0.15:22-10.0.0.1:52618.service. Apr 12 18:16:03.322385 systemd[1]: sshd@4-10.0.0.15:22-10.0.0.1:52608.service: Deactivated successfully. Apr 12 18:16:03.323183 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:16:03.323913 systemd-logind[1095]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:16:03.324940 systemd-logind[1095]: Removed session 5. Apr 12 18:16:03.363721 sshd[1200]: Accepted publickey for core from 10.0.0.1 port 52618 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:03.365060 sshd[1200]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:03.368608 systemd-logind[1095]: New session 6 of user core. Apr 12 18:16:03.369483 systemd[1]: Started session-6.scope. Apr 12 18:16:03.422403 sudo[1205]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:16:03.422600 sudo[1205]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:16:03.425281 sudo[1205]: pam_unix(sudo:session): session closed for user root Apr 12 18:16:03.430293 sudo[1204]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:16:03.430541 sudo[1204]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:16:03.440051 systemd[1]: Stopping audit-rules.service... Apr 12 18:16:03.439000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:16:03.441593 auditctl[1208]: No rules Apr 12 18:16:03.441970 kernel: kauditd_printk_skb: 138 callbacks suppressed Apr 12 18:16:03.442004 kernel: audit: type=1305 audit(1712945763.439:170): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:16:03.442011 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:16:03.442181 systemd[1]: Stopped audit-rules.service. Apr 12 18:16:03.439000 audit[1208]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd878b9a0 a2=420 a3=0 items=0 ppid=1 pid=1208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:03.443815 systemd[1]: Starting audit-rules.service... Apr 12 18:16:03.447075 kernel: audit: type=1300 audit(1712945763.439:170): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd878b9a0 a2=420 a3=0 items=0 ppid=1 pid=1208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:03.447157 kernel: audit: type=1327 audit(1712945763.439:170): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:16:03.439000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:16:03.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:03.450763 kernel: audit: type=1131 audit(1712945763.440:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:03.460428 augenrules[1225]: No rules Apr 12 18:16:03.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:03.461101 systemd[1]: Finished audit-rules.service. Apr 12 18:16:03.462278 sudo[1204]: pam_unix(sudo:session): session closed for user root Apr 12 18:16:03.460000 audit[1204]: USER_END pid=1204 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:16:03.464344 sshd[1200]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:03.467437 kernel: audit: type=1130 audit(1712945763.459:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:03.467513 kernel: audit: type=1106 audit(1712945763.460:173): pid=1204 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:16:03.467532 kernel: audit: type=1104 audit(1712945763.461:174): pid=1204 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:16:03.461000 audit[1204]: CRED_DISP pid=1204 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:16:03.467544 systemd[1]: Started sshd@6-10.0.0.15:22-10.0.0.1:52632.service. Apr 12 18:16:03.468083 systemd[1]: sshd@5-10.0.0.15:22-10.0.0.1:52618.service: Deactivated successfully. Apr 12 18:16:03.468861 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:16:03.469692 kernel: audit: type=1106 audit(1712945763.463:175): pid=1200 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:03.463000 audit[1200]: USER_END pid=1200 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:03.469446 systemd-logind[1095]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:16:03.470489 systemd-logind[1095]: Removed session 6. Apr 12 18:16:03.463000 audit[1200]: CRED_DISP pid=1200 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:03.475308 kernel: audit: type=1104 audit(1712945763.463:176): pid=1200 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:03.475384 kernel: audit: type=1130 audit(1712945763.466:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.15:22-10.0.0.1:52632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:03.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.15:22-10.0.0.1:52632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:03.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.15:22-10.0.0.1:52618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:03.507000 audit[1230]: USER_ACCT pid=1230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:03.509338 sshd[1230]: Accepted publickey for core from 10.0.0.1 port 52632 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:03.508000 audit[1230]: CRED_ACQ pid=1230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:03.509000 audit[1230]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe17aea30 a2=3 a3=1 items=0 ppid=1 pid=1230 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:03.509000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:03.510694 sshd[1230]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:03.514413 systemd-logind[1095]: New session 7 of user core. Apr 12 18:16:03.515178 systemd[1]: Started session-7.scope. Apr 12 18:16:03.517000 audit[1230]: USER_START pid=1230 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:03.518000 audit[1233]: CRED_ACQ pid=1233 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:03.565000 audit[1234]: USER_ACCT pid=1234 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:16:03.566987 sudo[1234]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:16:03.565000 audit[1234]: CRED_REFR pid=1234 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:16:03.567392 sudo[1234]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:16:03.567000 audit[1234]: USER_START pid=1234 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:16:04.090844 systemd[1]: Reloading. Apr 12 18:16:04.138519 /usr/lib/systemd/system-generators/torcx-generator[1264]: time="2024-04-12T18:16:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:16:04.138545 /usr/lib/systemd/system-generators/torcx-generator[1264]: time="2024-04-12T18:16:04Z" level=info msg="torcx already run" Apr 12 18:16:04.196413 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:16:04.196434 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:16:04.213635 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:16:04.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.258000 audit: BPF prog-id=37 op=LOAD Apr 12 18:16:04.258000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:16:04.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.258000 audit: BPF prog-id=38 op=LOAD Apr 12 18:16:04.259000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit: BPF prog-id=39 op=LOAD Apr 12 18:16:04.259000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit: BPF prog-id=40 op=LOAD Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit: BPF prog-id=41 op=LOAD Apr 12 18:16:04.259000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:16:04.259000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.259000 audit: BPF prog-id=42 op=LOAD Apr 12 18:16:04.259000 audit: BPF prog-id=26 op=UNLOAD Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit: BPF prog-id=43 op=LOAD Apr 12 18:16:04.261000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit: BPF prog-id=44 op=LOAD Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.261000 audit: BPF prog-id=45 op=LOAD Apr 12 18:16:04.261000 audit: BPF prog-id=33 op=UNLOAD Apr 12 18:16:04.261000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:16:04.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.263000 audit: BPF prog-id=46 op=LOAD Apr 12 18:16:04.263000 audit: BPF prog-id=30 op=UNLOAD Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit: BPF prog-id=47 op=LOAD Apr 12 18:16:04.264000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit: BPF prog-id=48 op=LOAD Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.264000 audit: BPF prog-id=49 op=LOAD Apr 12 18:16:04.264000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:16:04.264000 audit: BPF prog-id=23 op=UNLOAD Apr 12 18:16:04.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.265000 audit: BPF prog-id=50 op=LOAD Apr 12 18:16:04.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.265000 audit: BPF prog-id=51 op=LOAD Apr 12 18:16:04.265000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:16:04.265000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:16:04.273881 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:16:04.281503 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:16:04.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:04.282096 systemd[1]: Reached target network-online.target. Apr 12 18:16:04.283750 systemd[1]: Started kubelet.service. Apr 12 18:16:04.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:04.295589 systemd[1]: Starting coreos-metadata.service... Apr 12 18:16:04.303179 systemd[1]: coreos-metadata.service: Deactivated successfully. Apr 12 18:16:04.303357 systemd[1]: Finished coreos-metadata.service. Apr 12 18:16:04.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:04.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:04.405742 kubelet[1301]: E0412 18:16:04.405624 1301 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Apr 12 18:16:04.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:16:04.410178 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:16:04.410295 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:16:04.564462 systemd[1]: Stopped kubelet.service. Apr 12 18:16:04.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:04.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:04.581385 systemd[1]: Reloading. Apr 12 18:16:04.647303 /usr/lib/systemd/system-generators/torcx-generator[1370]: time="2024-04-12T18:16:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:16:04.647661 /usr/lib/systemd/system-generators/torcx-generator[1370]: time="2024-04-12T18:16:04Z" level=info msg="torcx already run" Apr 12 18:16:04.707152 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:16:04.707335 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:16:04.726905 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:16:04.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.779000 audit: BPF prog-id=52 op=LOAD Apr 12 18:16:04.779000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:16:04.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.780000 audit: BPF prog-id=53 op=LOAD Apr 12 18:16:04.780000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:16:04.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.781000 audit: BPF prog-id=54 op=LOAD Apr 12 18:16:04.781000 audit: BPF prog-id=39 op=UNLOAD Apr 12 18:16:04.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.782000 audit: BPF prog-id=55 op=LOAD Apr 12 18:16:04.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.782000 audit: BPF prog-id=56 op=LOAD Apr 12 18:16:04.782000 audit: BPF prog-id=40 op=UNLOAD Apr 12 18:16:04.782000 audit: BPF prog-id=41 op=UNLOAD Apr 12 18:16:04.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.783000 audit: BPF prog-id=57 op=LOAD Apr 12 18:16:04.783000 audit: BPF prog-id=42 op=UNLOAD Apr 12 18:16:04.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.785000 audit: BPF prog-id=58 op=LOAD Apr 12 18:16:04.785000 audit: BPF prog-id=43 op=UNLOAD Apr 12 18:16:04.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.786000 audit: BPF prog-id=59 op=LOAD Apr 12 18:16:04.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.786000 audit: BPF prog-id=60 op=LOAD Apr 12 18:16:04.786000 audit: BPF prog-id=44 op=UNLOAD Apr 12 18:16:04.786000 audit: BPF prog-id=45 op=UNLOAD Apr 12 18:16:04.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.788000 audit: BPF prog-id=61 op=LOAD Apr 12 18:16:04.788000 audit: BPF prog-id=46 op=UNLOAD Apr 12 18:16:04.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit: BPF prog-id=62 op=LOAD Apr 12 18:16:04.790000 audit: BPF prog-id=47 op=UNLOAD Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit: BPF prog-id=63 op=LOAD Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.790000 audit: BPF prog-id=64 op=LOAD Apr 12 18:16:04.790000 audit: BPF prog-id=48 op=UNLOAD Apr 12 18:16:04.790000 audit: BPF prog-id=49 op=UNLOAD Apr 12 18:16:04.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.791000 audit: BPF prog-id=65 op=LOAD Apr 12 18:16:04.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:04.791000 audit: BPF prog-id=66 op=LOAD Apr 12 18:16:04.791000 audit: BPF prog-id=50 op=UNLOAD Apr 12 18:16:04.791000 audit: BPF prog-id=51 op=UNLOAD Apr 12 18:16:04.809971 systemd[1]: Started kubelet.service. Apr 12 18:16:04.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:04.850521 kubelet[1408]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:16:04.850521 kubelet[1408]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:16:04.850521 kubelet[1408]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:16:04.850851 kubelet[1408]: I0412 18:16:04.850564 1408 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:16:05.460390 kubelet[1408]: I0412 18:16:05.460331 1408 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Apr 12 18:16:05.460547 kubelet[1408]: I0412 18:16:05.460529 1408 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:16:05.461080 kubelet[1408]: I0412 18:16:05.461055 1408 server.go:837] "Client rotation is on, will bootstrap in background" Apr 12 18:16:05.464404 kubelet[1408]: I0412 18:16:05.464369 1408 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:16:05.466078 kubelet[1408]: W0412 18:16:05.466063 1408 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 18:16:05.466738 kubelet[1408]: I0412 18:16:05.466724 1408 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:16:05.466940 kubelet[1408]: I0412 18:16:05.466931 1408 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:16:05.467008 kubelet[1408]: I0412 18:16:05.466996 1408 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Apr 12 18:16:05.467107 kubelet[1408]: I0412 18:16:05.467014 1408 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Apr 12 18:16:05.467107 kubelet[1408]: I0412 18:16:05.467025 1408 container_manager_linux.go:302] "Creating device plugin manager" Apr 12 18:16:05.467154 kubelet[1408]: I0412 18:16:05.467125 1408 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:16:05.471409 kubelet[1408]: I0412 18:16:05.471383 1408 kubelet.go:405] "Attempting to sync node with API server" Apr 12 18:16:05.471409 kubelet[1408]: I0412 18:16:05.471414 1408 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:16:05.471520 kubelet[1408]: I0412 18:16:05.471447 1408 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:16:05.471520 kubelet[1408]: I0412 18:16:05.471458 1408 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:16:05.471652 kubelet[1408]: E0412 18:16:05.471636 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:05.471725 kubelet[1408]: E0412 18:16:05.471715 1408 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:05.472246 kubelet[1408]: I0412 18:16:05.472230 1408 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:16:05.472761 kubelet[1408]: W0412 18:16:05.472749 1408 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:16:05.473531 kubelet[1408]: I0412 18:16:05.473513 1408 server.go:1168] "Started kubelet" Apr 12 18:16:05.473639 kubelet[1408]: I0412 18:16:05.473611 1408 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:16:05.473730 kubelet[1408]: I0412 18:16:05.473715 1408 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:16:05.474283 kubelet[1408]: I0412 18:16:05.474262 1408 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:16:05.474487 kubelet[1408]: E0412 18:16:05.474472 1408 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:16:05.474517 kubelet[1408]: E0412 18:16:05.474497 1408 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:16:05.473000 audit[1408]: AVC avc: denied { mac_admin } for pid=1408 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.473000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:16:05.473000 audit[1408]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000833e30 a1=40008466f0 a2=4000833e00 a3=25 items=0 ppid=1 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:05.473000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:16:05.473000 audit[1408]: AVC avc: denied { mac_admin } for pid=1408 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.473000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:16:05.473000 audit[1408]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400085c2c0 a1=4000846708 a2=4000833ec0 a3=25 items=0 ppid=1 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:05.473000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:16:05.474999 kubelet[1408]: I0412 18:16:05.474745 1408 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:16:05.474999 kubelet[1408]: I0412 18:16:05.474781 1408 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:16:05.474999 kubelet[1408]: I0412 18:16:05.474929 1408 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:16:05.475295 kubelet[1408]: I0412 18:16:05.475264 1408 volume_manager.go:284] "Starting Kubelet Volume Manager" Apr 12 18:16:05.475401 kubelet[1408]: I0412 18:16:05.475389 1408 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Apr 12 18:16:05.493538 kubelet[1408]: W0412 18:16:05.493496 1408 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.15" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 18:16:05.493538 kubelet[1408]: E0412 18:16:05.493535 1408 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.15" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 18:16:05.493666 kubelet[1408]: E0412 18:16:05.493573 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15.17c59b191e8e9071", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.15", UID:"10.0.0.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.15"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 473489009, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 473489009, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:16:05.493859 kubelet[1408]: W0412 18:16:05.493844 1408 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 18:16:05.493899 kubelet[1408]: E0412 18:16:05.493863 1408 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 18:16:05.494046 kubelet[1408]: E0412 18:16:05.493979 1408 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.15\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Apr 12 18:16:05.494242 kubelet[1408]: W0412 18:16:05.494223 1408 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 18:16:05.494287 kubelet[1408]: E0412 18:16:05.494247 1408 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 18:16:05.496517 kubelet[1408]: E0412 18:16:05.496414 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15.17c59b191e9dcc21", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.15", UID:"10.0.0.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.15"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 474487329, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 474487329, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:16:05.502161 kubelet[1408]: I0412 18:16:05.502134 1408 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:16:05.502161 kubelet[1408]: I0412 18:16:05.502156 1408 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:16:05.502298 kubelet[1408]: I0412 18:16:05.502176 1408 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:16:05.502810 kubelet[1408]: E0412 18:16:05.502720 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15.17c59b19203b1d09", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.15", UID:"10.0.0.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.15 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.15"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 501574409, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 501574409, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:16:05.503919 kubelet[1408]: E0412 18:16:05.503849 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15.17c59b19203b4851", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.15", UID:"10.0.0.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.15 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.15"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 501585489, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 501585489, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:16:05.504263 kubelet[1408]: I0412 18:16:05.504236 1408 policy_none.go:49] "None policy: Start" Apr 12 18:16:05.504825 kubelet[1408]: I0412 18:16:05.504809 1408 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:16:05.504909 kubelet[1408]: I0412 18:16:05.504900 1408 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:16:05.505025 kubelet[1408]: E0412 18:16:05.504939 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15.17c59b19203b5d91", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.15", UID:"10.0.0.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.15 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.15"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 501590929, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 501590929, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:16:05.505000 audit[1425]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:05.505000 audit[1425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffee16c030 a2=0 a3=1 items=0 ppid=1408 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:05.505000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:16:05.506000 audit[1428]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:05.506000 audit[1428]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffc492e1f0 a2=0 a3=1 items=0 ppid=1408 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:05.506000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:16:05.509733 systemd[1]: Created slice kubepods.slice. Apr 12 18:16:05.513806 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:16:05.516410 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:16:05.528279 kubelet[1408]: I0412 18:16:05.528247 1408 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:16:05.527000 audit[1408]: AVC avc: denied { mac_admin } for pid=1408 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.527000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:16:05.527000 audit[1408]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000f507b0 a1=400112e018 a2=4000f50780 a3=25 items=0 ppid=1 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:05.527000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:16:05.528667 kubelet[1408]: I0412 18:16:05.528652 1408 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:16:05.528921 kubelet[1408]: I0412 18:16:05.528905 1408 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:16:05.529405 kubelet[1408]: E0412 18:16:05.529386 1408 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.15\" not found" Apr 12 18:16:05.530644 kubelet[1408]: E0412 18:16:05.530559 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15.17c59b1921e7a109", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.15", UID:"10.0.0.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.15"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 529657609, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 529657609, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:16:05.509000 audit[1430]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:05.509000 audit[1430]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffcc81a290 a2=0 a3=1 items=0 ppid=1408 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:05.509000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:16:05.535000 audit[1435]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:05.535000 audit[1435]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffda97be90 a2=0 a3=1 items=0 ppid=1408 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:05.535000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:16:05.568000 audit[1440]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:05.568000 audit[1440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffedd4a270 a2=0 a3=1 items=0 ppid=1408 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:05.568000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:16:05.570464 kubelet[1408]: I0412 18:16:05.570347 1408 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Apr 12 18:16:05.569000 audit[1441]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1441 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:05.569000 audit[1441]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffea8a1210 a2=0 a3=1 items=0 ppid=1408 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:05.569000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:16:05.569000 audit[1442]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:05.569000 audit[1442]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe5700c50 a2=0 a3=1 items=0 ppid=1408 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:05.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:16:05.572033 kubelet[1408]: I0412 18:16:05.571408 1408 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Apr 12 18:16:05.572033 kubelet[1408]: I0412 18:16:05.571445 1408 status_manager.go:207] "Starting to sync pod status with apiserver" Apr 12 18:16:05.572033 kubelet[1408]: I0412 18:16:05.571466 1408 kubelet.go:2257] "Starting kubelet main sync loop" Apr 12 18:16:05.572033 kubelet[1408]: E0412 18:16:05.571528 1408 kubelet.go:2281] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Apr 12 18:16:05.571000 audit[1444]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:05.571000 audit[1444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffff2ba750 a2=0 a3=1 items=0 ppid=1408 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:05.571000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:16:05.573229 kubelet[1408]: W0412 18:16:05.573038 1408 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Apr 12 18:16:05.573229 kubelet[1408]: E0412 18:16:05.573070 1408 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Apr 12 18:16:05.572000 audit[1443]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1443 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:05.572000 audit[1443]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcbe2d170 a2=0 a3=1 items=0 ppid=1408 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:05.572000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:16:05.572000 audit[1445]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:05.572000 audit[1445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc84ae590 a2=0 a3=1 items=0 ppid=1408 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:05.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:16:05.573000 audit[1446]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1446 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:05.573000 audit[1446]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffdbc4faf0 a2=0 a3=1 items=0 ppid=1408 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:05.573000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:16:05.574000 audit[1447]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1447 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:05.574000 audit[1447]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc02d53e0 a2=0 a3=1 items=0 ppid=1408 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:05.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:16:05.576358 kubelet[1408]: I0412 18:16:05.576302 1408 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.15" Apr 12 18:16:05.578227 kubelet[1408]: E0412 18:16:05.578194 1408 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.15" Apr 12 18:16:05.578354 kubelet[1408]: E0412 18:16:05.578195 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15.17c59b19203b1d09", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.15", UID:"10.0.0.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.15 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.15"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 501574409, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 576255089, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.15.17c59b19203b1d09" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:16:05.579573 kubelet[1408]: E0412 18:16:05.579500 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15.17c59b19203b4851", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.15", UID:"10.0.0.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.15 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.15"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 501585489, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 576267609, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.15.17c59b19203b4851" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:16:05.580651 kubelet[1408]: E0412 18:16:05.580577 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15.17c59b19203b5d91", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.15", UID:"10.0.0.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.15 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.15"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 501590929, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 576271609, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.15.17c59b19203b5d91" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:16:05.697496 kubelet[1408]: E0412 18:16:05.697468 1408 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.15\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Apr 12 18:16:05.779439 kubelet[1408]: I0412 18:16:05.779346 1408 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.15" Apr 12 18:16:05.783651 kubelet[1408]: E0412 18:16:05.783595 1408 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.15" Apr 12 18:16:05.783789 kubelet[1408]: E0412 18:16:05.783640 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15.17c59b19203b1d09", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.15", UID:"10.0.0.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.15 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.15"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 501574409, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 779304969, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.15.17c59b19203b1d09" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:16:05.785072 kubelet[1408]: E0412 18:16:05.784924 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15.17c59b19203b4851", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.15", UID:"10.0.0.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.15 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.15"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 501585489, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 779315209, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.15.17c59b19203b4851" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:16:05.786249 kubelet[1408]: E0412 18:16:05.786182 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15.17c59b19203b5d91", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.15", UID:"10.0.0.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.15 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.15"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 501590929, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 779318649, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.15.17c59b19203b5d91" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:16:06.099726 kubelet[1408]: E0412 18:16:06.099632 1408 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.15\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Apr 12 18:16:06.184829 kubelet[1408]: I0412 18:16:06.184616 1408 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.15" Apr 12 18:16:06.185765 kubelet[1408]: E0412 18:16:06.185728 1408 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.15" Apr 12 18:16:06.185846 kubelet[1408]: E0412 18:16:06.185719 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15.17c59b19203b1d09", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.15", UID:"10.0.0.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.15 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.15"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 501574409, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 16, 6, 184571129, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.15.17c59b19203b1d09" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:16:06.186750 kubelet[1408]: E0412 18:16:06.186673 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15.17c59b19203b4851", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.15", UID:"10.0.0.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.15 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.15"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 501585489, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 16, 6, 184576649, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.15.17c59b19203b4851" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:16:06.187706 kubelet[1408]: E0412 18:16:06.187643 1408 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15.17c59b19203b5d91", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.15", UID:"10.0.0.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.15 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.15"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 16, 5, 501590929, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 16, 6, 184579889, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.15.17c59b19203b5d91" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:16:06.463654 kubelet[1408]: I0412 18:16:06.463626 1408 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Apr 12 18:16:06.471915 kubelet[1408]: E0412 18:16:06.471888 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:06.854402 kubelet[1408]: E0412 18:16:06.854304 1408 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.15" not found Apr 12 18:16:06.904671 kubelet[1408]: E0412 18:16:06.904633 1408 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.15\" not found" node="10.0.0.15" Apr 12 18:16:06.987252 kubelet[1408]: I0412 18:16:06.987225 1408 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.15" Apr 12 18:16:06.990666 kubelet[1408]: I0412 18:16:06.990640 1408 kubelet_node_status.go:73] "Successfully registered node" node="10.0.0.15" Apr 12 18:16:07.006799 kubelet[1408]: I0412 18:16:07.006767 1408 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Apr 12 18:16:07.007226 env[1109]: time="2024-04-12T18:16:07.007136529Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:16:07.007550 kubelet[1408]: I0412 18:16:07.007533 1408 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Apr 12 18:16:07.324329 sudo[1234]: pam_unix(sudo:session): session closed for user root Apr 12 18:16:07.323000 audit[1234]: USER_END pid=1234 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:16:07.323000 audit[1234]: CRED_DISP pid=1234 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:16:07.326060 sshd[1230]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:07.325000 audit[1230]: USER_END pid=1230 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:07.325000 audit[1230]: CRED_DISP pid=1230 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:07.328274 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:16:07.328911 systemd-logind[1095]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:16:07.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.15:22-10.0.0.1:52632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:07.329008 systemd[1]: sshd@6-10.0.0.15:22-10.0.0.1:52632.service: Deactivated successfully. Apr 12 18:16:07.329931 systemd-logind[1095]: Removed session 7. Apr 12 18:16:07.472475 kubelet[1408]: E0412 18:16:07.472445 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:07.473536 kubelet[1408]: I0412 18:16:07.473512 1408 apiserver.go:52] "Watching apiserver" Apr 12 18:16:07.476188 kubelet[1408]: I0412 18:16:07.476166 1408 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:16:07.476258 kubelet[1408]: I0412 18:16:07.476250 1408 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:16:07.476317 kubelet[1408]: I0412 18:16:07.476305 1408 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:16:07.476501 kubelet[1408]: E0412 18:16:07.476478 1408 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hnrzv" podUID=e4821455-7030-483e-97c9-fca02f2e6327 Apr 12 18:16:07.481115 systemd[1]: Created slice kubepods-besteffort-pod0497f7a7_9683_494b_98ae_032bbb002218.slice. Apr 12 18:16:07.486077 systemd[1]: Created slice kubepods-besteffort-podf5bb7da8_1e19_414c_a75f_d4a790006bde.slice. Apr 12 18:16:07.576510 kubelet[1408]: I0412 18:16:07.576424 1408 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Apr 12 18:16:07.586339 kubelet[1408]: I0412 18:16:07.586309 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f5bb7da8-1e19-414c-a75f-d4a790006bde-xtables-lock\") pod \"kube-proxy-qlsnb\" (UID: \"f5bb7da8-1e19-414c-a75f-d4a790006bde\") " pod="kube-system/kube-proxy-qlsnb" Apr 12 18:16:07.586450 kubelet[1408]: I0412 18:16:07.586347 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/0497f7a7-9683-494b-98ae-032bbb002218-policysync\") pod \"calico-node-j7z2t\" (UID: \"0497f7a7-9683-494b-98ae-032bbb002218\") " pod="calico-system/calico-node-j7z2t" Apr 12 18:16:07.586450 kubelet[1408]: I0412 18:16:07.586382 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0497f7a7-9683-494b-98ae-032bbb002218-var-lib-calico\") pod \"calico-node-j7z2t\" (UID: \"0497f7a7-9683-494b-98ae-032bbb002218\") " pod="calico-system/calico-node-j7z2t" Apr 12 18:16:07.586450 kubelet[1408]: I0412 18:16:07.586402 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/0497f7a7-9683-494b-98ae-032bbb002218-cni-net-dir\") pod \"calico-node-j7z2t\" (UID: \"0497f7a7-9683-494b-98ae-032bbb002218\") " pod="calico-system/calico-node-j7z2t" Apr 12 18:16:07.586518 kubelet[1408]: I0412 18:16:07.586479 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/0497f7a7-9683-494b-98ae-032bbb002218-flexvol-driver-host\") pod \"calico-node-j7z2t\" (UID: \"0497f7a7-9683-494b-98ae-032bbb002218\") " pod="calico-system/calico-node-j7z2t" Apr 12 18:16:07.586542 kubelet[1408]: I0412 18:16:07.586538 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e4821455-7030-483e-97c9-fca02f2e6327-varrun\") pod \"csi-node-driver-hnrzv\" (UID: \"e4821455-7030-483e-97c9-fca02f2e6327\") " pod="calico-system/csi-node-driver-hnrzv" Apr 12 18:16:07.586564 kubelet[1408]: I0412 18:16:07.586560 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e4821455-7030-483e-97c9-fca02f2e6327-socket-dir\") pod \"csi-node-driver-hnrzv\" (UID: \"e4821455-7030-483e-97c9-fca02f2e6327\") " pod="calico-system/csi-node-driver-hnrzv" Apr 12 18:16:07.586585 kubelet[1408]: I0412 18:16:07.586580 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/f5bb7da8-1e19-414c-a75f-d4a790006bde-kube-proxy\") pod \"kube-proxy-qlsnb\" (UID: \"f5bb7da8-1e19-414c-a75f-d4a790006bde\") " pod="kube-system/kube-proxy-qlsnb" Apr 12 18:16:07.586681 kubelet[1408]: I0412 18:16:07.586648 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f5bb7da8-1e19-414c-a75f-d4a790006bde-lib-modules\") pod \"kube-proxy-qlsnb\" (UID: \"f5bb7da8-1e19-414c-a75f-d4a790006bde\") " pod="kube-system/kube-proxy-qlsnb" Apr 12 18:16:07.586713 kubelet[1408]: I0412 18:16:07.586694 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0497f7a7-9683-494b-98ae-032bbb002218-xtables-lock\") pod \"calico-node-j7z2t\" (UID: \"0497f7a7-9683-494b-98ae-032bbb002218\") " pod="calico-system/calico-node-j7z2t" Apr 12 18:16:07.586739 kubelet[1408]: I0412 18:16:07.586718 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7d6ws\" (UniqueName: \"kubernetes.io/projected/f5bb7da8-1e19-414c-a75f-d4a790006bde-kube-api-access-7d6ws\") pod \"kube-proxy-qlsnb\" (UID: \"f5bb7da8-1e19-414c-a75f-d4a790006bde\") " pod="kube-system/kube-proxy-qlsnb" Apr 12 18:16:07.586761 kubelet[1408]: I0412 18:16:07.586746 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/0497f7a7-9683-494b-98ae-032bbb002218-node-certs\") pod \"calico-node-j7z2t\" (UID: \"0497f7a7-9683-494b-98ae-032bbb002218\") " pod="calico-system/calico-node-j7z2t" Apr 12 18:16:07.586782 kubelet[1408]: I0412 18:16:07.586768 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bzps5\" (UniqueName: \"kubernetes.io/projected/0497f7a7-9683-494b-98ae-032bbb002218-kube-api-access-bzps5\") pod \"calico-node-j7z2t\" (UID: \"0497f7a7-9683-494b-98ae-032bbb002218\") " pod="calico-system/calico-node-j7z2t" Apr 12 18:16:07.586821 kubelet[1408]: I0412 18:16:07.586809 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e4821455-7030-483e-97c9-fca02f2e6327-registration-dir\") pod \"csi-node-driver-hnrzv\" (UID: \"e4821455-7030-483e-97c9-fca02f2e6327\") " pod="calico-system/csi-node-driver-hnrzv" Apr 12 18:16:07.586853 kubelet[1408]: I0412 18:16:07.586840 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0497f7a7-9683-494b-98ae-032bbb002218-lib-modules\") pod \"calico-node-j7z2t\" (UID: \"0497f7a7-9683-494b-98ae-032bbb002218\") " pod="calico-system/calico-node-j7z2t" Apr 12 18:16:07.586890 kubelet[1408]: I0412 18:16:07.586879 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0497f7a7-9683-494b-98ae-032bbb002218-tigera-ca-bundle\") pod \"calico-node-j7z2t\" (UID: \"0497f7a7-9683-494b-98ae-032bbb002218\") " pod="calico-system/calico-node-j7z2t" Apr 12 18:16:07.586923 kubelet[1408]: I0412 18:16:07.586914 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/0497f7a7-9683-494b-98ae-032bbb002218-var-run-calico\") pod \"calico-node-j7z2t\" (UID: \"0497f7a7-9683-494b-98ae-032bbb002218\") " pod="calico-system/calico-node-j7z2t" Apr 12 18:16:07.586949 kubelet[1408]: I0412 18:16:07.586944 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/0497f7a7-9683-494b-98ae-032bbb002218-cni-bin-dir\") pod \"calico-node-j7z2t\" (UID: \"0497f7a7-9683-494b-98ae-032bbb002218\") " pod="calico-system/calico-node-j7z2t" Apr 12 18:16:07.586971 kubelet[1408]: I0412 18:16:07.586965 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/0497f7a7-9683-494b-98ae-032bbb002218-cni-log-dir\") pod \"calico-node-j7z2t\" (UID: \"0497f7a7-9683-494b-98ae-032bbb002218\") " pod="calico-system/calico-node-j7z2t" Apr 12 18:16:07.586992 kubelet[1408]: I0412 18:16:07.586987 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e4821455-7030-483e-97c9-fca02f2e6327-kubelet-dir\") pod \"csi-node-driver-hnrzv\" (UID: \"e4821455-7030-483e-97c9-fca02f2e6327\") " pod="calico-system/csi-node-driver-hnrzv" Apr 12 18:16:07.587024 kubelet[1408]: I0412 18:16:07.587016 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b99qv\" (UniqueName: \"kubernetes.io/projected/e4821455-7030-483e-97c9-fca02f2e6327-kube-api-access-b99qv\") pod \"csi-node-driver-hnrzv\" (UID: \"e4821455-7030-483e-97c9-fca02f2e6327\") " pod="calico-system/csi-node-driver-hnrzv" Apr 12 18:16:07.587060 kubelet[1408]: I0412 18:16:07.587036 1408 reconciler.go:41] "Reconciler: start to sync state" Apr 12 18:16:07.689075 kubelet[1408]: E0412 18:16:07.689040 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:07.689075 kubelet[1408]: W0412 18:16:07.689060 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:07.689223 kubelet[1408]: E0412 18:16:07.689088 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:07.694116 kubelet[1408]: E0412 18:16:07.694088 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:07.694116 kubelet[1408]: W0412 18:16:07.694107 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:07.694199 kubelet[1408]: E0412 18:16:07.694125 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:07.699306 kubelet[1408]: E0412 18:16:07.699288 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:07.699423 kubelet[1408]: W0412 18:16:07.699409 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:07.699484 kubelet[1408]: E0412 18:16:07.699474 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:07.700308 kubelet[1408]: E0412 18:16:07.700292 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:07.700308 kubelet[1408]: W0412 18:16:07.700308 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:07.700401 kubelet[1408]: E0412 18:16:07.700324 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:07.702239 kubelet[1408]: E0412 18:16:07.702225 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:07.702336 kubelet[1408]: W0412 18:16:07.702322 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:07.702408 kubelet[1408]: E0412 18:16:07.702396 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:07.791996 kubelet[1408]: E0412 18:16:07.791969 1408 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:07.792297 kubelet[1408]: E0412 18:16:07.792267 1408 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:07.792926 env[1109]: time="2024-04-12T18:16:07.792885089Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-j7z2t,Uid:0497f7a7-9683-494b-98ae-032bbb002218,Namespace:calico-system,Attempt:0,}" Apr 12 18:16:07.792989 env[1109]: time="2024-04-12T18:16:07.792934969Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qlsnb,Uid:f5bb7da8-1e19-414c-a75f-d4a790006bde,Namespace:kube-system,Attempt:0,}" Apr 12 18:16:08.324539 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount264819374.mount: Deactivated successfully. Apr 12 18:16:08.329818 env[1109]: time="2024-04-12T18:16:08.329770049Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:08.330597 env[1109]: time="2024-04-12T18:16:08.330571529Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:08.332652 env[1109]: time="2024-04-12T18:16:08.332626849Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:08.334094 env[1109]: time="2024-04-12T18:16:08.334070889Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:08.336496 env[1109]: time="2024-04-12T18:16:08.336470849Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:08.338791 env[1109]: time="2024-04-12T18:16:08.338762889Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:08.340284 env[1109]: time="2024-04-12T18:16:08.340254289Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:08.340973 env[1109]: time="2024-04-12T18:16:08.340952569Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:08.365273 env[1109]: time="2024-04-12T18:16:08.365035009Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:16:08.365273 env[1109]: time="2024-04-12T18:16:08.365070089Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:16:08.365273 env[1109]: time="2024-04-12T18:16:08.365080089Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:16:08.365273 env[1109]: time="2024-04-12T18:16:08.365031009Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:16:08.365273 env[1109]: time="2024-04-12T18:16:08.365070329Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:16:08.365273 env[1109]: time="2024-04-12T18:16:08.365080849Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:16:08.365502 env[1109]: time="2024-04-12T18:16:08.365278849Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/376d90d36aaa6ed17c92e9137aaf02df01ae67d8b6021adaaef7da26f3a5603a pid=1476 runtime=io.containerd.runc.v2 Apr 12 18:16:08.366216 env[1109]: time="2024-04-12T18:16:08.366174129Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/012b7a477297fae732f458c5dc673719c65a8c4d43bf0fbd5e119d54e77ba3a6 pid=1475 runtime=io.containerd.runc.v2 Apr 12 18:16:08.395888 systemd[1]: Started cri-containerd-012b7a477297fae732f458c5dc673719c65a8c4d43bf0fbd5e119d54e77ba3a6.scope. Apr 12 18:16:08.404549 systemd[1]: Started cri-containerd-376d90d36aaa6ed17c92e9137aaf02df01ae67d8b6021adaaef7da26f3a5603a.scope. Apr 12 18:16:08.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.426000 audit: BPF prog-id=67 op=LOAD Apr 12 18:16:08.426000 audit[1497]: AVC avc: denied { bpf } for pid=1497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.426000 audit[1497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1475 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:08.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031326237613437373239376661653733326634353863356463363733 Apr 12 18:16:08.426000 audit[1497]: AVC avc: denied { perfmon } for pid=1497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.426000 audit[1497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1475 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:08.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031326237613437373239376661653733326634353863356463363733 Apr 12 18:16:08.427000 audit[1497]: AVC avc: denied { bpf } for pid=1497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1497]: AVC avc: denied { bpf } for pid=1497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1497]: AVC avc: denied { bpf } for pid=1497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1497]: AVC avc: denied { perfmon } for pid=1497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1497]: AVC avc: denied { perfmon } for pid=1497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1497]: AVC avc: denied { perfmon } for pid=1497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1497]: AVC avc: denied { perfmon } for pid=1497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1497]: AVC avc: denied { perfmon } for pid=1497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1497]: AVC avc: denied { bpf } for pid=1497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1497]: AVC avc: denied { bpf } for pid=1497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit: BPF prog-id=68 op=LOAD Apr 12 18:16:08.427000 audit[1497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1475 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:08.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031326237613437373239376661653733326634353863356463363733 Apr 12 18:16:08.427000 audit[1497]: AVC avc: denied { bpf } for pid=1497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1497]: AVC avc: denied { bpf } for pid=1497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1497]: AVC avc: denied { perfmon } for pid=1497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1497]: AVC avc: denied { perfmon } for pid=1497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.428000 audit: BPF prog-id=69 op=LOAD Apr 12 18:16:08.427000 audit[1497]: AVC avc: denied { perfmon } for pid=1497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1497]: AVC avc: denied { perfmon } for pid=1497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1497]: AVC avc: denied { perfmon } for pid=1497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1497]: AVC avc: denied { bpf } for pid=1497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit[1497]: AVC avc: denied { bpf } for pid=1497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.427000 audit: BPF prog-id=70 op=LOAD Apr 12 18:16:08.427000 audit[1497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1475 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:08.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031326237613437373239376661653733326634353863356463363733 Apr 12 18:16:08.428000 audit: BPF prog-id=70 op=UNLOAD Apr 12 18:16:08.428000 audit: BPF prog-id=68 op=UNLOAD Apr 12 18:16:08.429000 audit[1497]: AVC avc: denied { bpf } for pid=1497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.429000 audit[1497]: AVC avc: denied { bpf } for pid=1497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.429000 audit[1497]: AVC avc: denied { bpf } for pid=1497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.429000 audit[1497]: AVC avc: denied { perfmon } for pid=1497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.429000 audit[1497]: AVC avc: denied { perfmon } for pid=1497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.429000 audit[1497]: AVC avc: denied { perfmon } for pid=1497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.429000 audit[1497]: AVC avc: denied { perfmon } for pid=1497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.429000 audit[1497]: AVC avc: denied { perfmon } for pid=1497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.429000 audit[1497]: AVC avc: denied { bpf } for pid=1497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.429000 audit[1494]: AVC avc: denied { bpf } for pid=1494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.429000 audit[1494]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1476 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:08.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337366439306433366161613665643137633932653931333761616630 Apr 12 18:16:08.429000 audit[1497]: AVC avc: denied { bpf } for pid=1497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.429000 audit: BPF prog-id=71 op=LOAD Apr 12 18:16:08.429000 audit[1497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1475 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:08.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031326237613437373239376661653733326634353863356463363733 Apr 12 18:16:08.429000 audit[1494]: AVC avc: denied { perfmon } for pid=1494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.429000 audit[1494]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1476 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:08.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337366439306433366161613665643137633932653931333761616630 Apr 12 18:16:08.430000 audit[1494]: AVC avc: denied { bpf } for pid=1494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.430000 audit[1494]: AVC avc: denied { bpf } for pid=1494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.430000 audit[1494]: AVC avc: denied { bpf } for pid=1494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.430000 audit[1494]: AVC avc: denied { perfmon } for pid=1494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.430000 audit[1494]: AVC avc: denied { perfmon } for pid=1494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.430000 audit[1494]: AVC avc: denied { perfmon } for pid=1494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.430000 audit[1494]: AVC avc: denied { perfmon } for pid=1494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.430000 audit[1494]: AVC avc: denied { perfmon } for pid=1494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.430000 audit[1494]: AVC avc: denied { bpf } for pid=1494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.430000 audit[1494]: AVC avc: denied { bpf } for pid=1494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.430000 audit: BPF prog-id=72 op=LOAD Apr 12 18:16:08.430000 audit[1494]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1476 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:08.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337366439306433366161613665643137633932653931333761616630 Apr 12 18:16:08.430000 audit[1494]: AVC avc: denied { bpf } for pid=1494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.430000 audit[1494]: AVC avc: denied { bpf } for pid=1494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.430000 audit[1494]: AVC avc: denied { perfmon } for pid=1494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.430000 audit[1494]: AVC avc: denied { perfmon } for pid=1494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.430000 audit[1494]: AVC avc: denied { perfmon } for pid=1494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.430000 audit[1494]: AVC avc: denied { perfmon } for pid=1494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.430000 audit[1494]: AVC avc: denied { perfmon } for pid=1494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.430000 audit[1494]: AVC avc: denied { bpf } for pid=1494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.430000 audit[1494]: AVC avc: denied { bpf } for pid=1494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.430000 audit: BPF prog-id=73 op=LOAD Apr 12 18:16:08.430000 audit[1494]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1476 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:08.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337366439306433366161613665643137633932653931333761616630 Apr 12 18:16:08.431000 audit: BPF prog-id=73 op=UNLOAD Apr 12 18:16:08.431000 audit: BPF prog-id=72 op=UNLOAD Apr 12 18:16:08.431000 audit[1494]: AVC avc: denied { bpf } for pid=1494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.431000 audit[1494]: AVC avc: denied { bpf } for pid=1494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.431000 audit[1494]: AVC avc: denied { bpf } for pid=1494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.431000 audit[1494]: AVC avc: denied { perfmon } for pid=1494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.431000 audit[1494]: AVC avc: denied { perfmon } for pid=1494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.431000 audit[1494]: AVC avc: denied { perfmon } for pid=1494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.431000 audit[1494]: AVC avc: denied { perfmon } for pid=1494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.431000 audit[1494]: AVC avc: denied { perfmon } for pid=1494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.431000 audit[1494]: AVC avc: denied { bpf } for pid=1494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.431000 audit[1494]: AVC avc: denied { bpf } for pid=1494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:08.431000 audit: BPF prog-id=74 op=LOAD Apr 12 18:16:08.431000 audit[1494]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1476 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:08.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337366439306433366161613665643137633932653931333761616630 Apr 12 18:16:08.443103 env[1109]: time="2024-04-12T18:16:08.443057089Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qlsnb,Uid:f5bb7da8-1e19-414c-a75f-d4a790006bde,Namespace:kube-system,Attempt:0,} returns sandbox id \"012b7a477297fae732f458c5dc673719c65a8c4d43bf0fbd5e119d54e77ba3a6\"" Apr 12 18:16:08.445486 kubelet[1408]: E0412 18:16:08.444938 1408 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:08.446203 env[1109]: time="2024-04-12T18:16:08.446167529Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\"" Apr 12 18:16:08.449467 env[1109]: time="2024-04-12T18:16:08.449425969Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-j7z2t,Uid:0497f7a7-9683-494b-98ae-032bbb002218,Namespace:calico-system,Attempt:0,} returns sandbox id \"376d90d36aaa6ed17c92e9137aaf02df01ae67d8b6021adaaef7da26f3a5603a\"" Apr 12 18:16:08.450267 kubelet[1408]: E0412 18:16:08.450116 1408 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:08.473343 kubelet[1408]: E0412 18:16:08.473292 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:09.473589 kubelet[1408]: E0412 18:16:09.473527 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:09.507929 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2330630490.mount: Deactivated successfully. Apr 12 18:16:09.572651 kubelet[1408]: E0412 18:16:09.572565 1408 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hnrzv" podUID=e4821455-7030-483e-97c9-fca02f2e6327 Apr 12 18:16:10.474591 kubelet[1408]: E0412 18:16:10.474550 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:10.813672 env[1109]: time="2024-04-12T18:16:10.813455009Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:10.815965 env[1109]: time="2024-04-12T18:16:10.815921169Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7daec180765068529c26cc4c7c989513bebbe614cbbc58beebe1db17ae177e06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:10.816931 env[1109]: time="2024-04-12T18:16:10.816896689Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:10.818196 env[1109]: time="2024-04-12T18:16:10.818161569Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:b0539f35b586abc54ca7660f9bb8a539d010b9e07d20e9e3d529cf0ca35d4ddf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:10.818686 env[1109]: time="2024-04-12T18:16:10.818656209Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\" returns image reference \"sha256:7daec180765068529c26cc4c7c989513bebbe614cbbc58beebe1db17ae177e06\"" Apr 12 18:16:10.819475 env[1109]: time="2024-04-12T18:16:10.819408329Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:16:10.820759 env[1109]: time="2024-04-12T18:16:10.820728009Z" level=info msg="CreateContainer within sandbox \"012b7a477297fae732f458c5dc673719c65a8c4d43bf0fbd5e119d54e77ba3a6\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:16:10.830065 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount429637303.mount: Deactivated successfully. Apr 12 18:16:10.833681 env[1109]: time="2024-04-12T18:16:10.833640049Z" level=info msg="CreateContainer within sandbox \"012b7a477297fae732f458c5dc673719c65a8c4d43bf0fbd5e119d54e77ba3a6\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"fec8c330cce8c4f7977ee4efc11750a2bb47eeaede9cef88c4565a1b2100d305\"" Apr 12 18:16:10.834482 env[1109]: time="2024-04-12T18:16:10.834440969Z" level=info msg="StartContainer for \"fec8c330cce8c4f7977ee4efc11750a2bb47eeaede9cef88c4565a1b2100d305\"" Apr 12 18:16:10.853049 systemd[1]: run-containerd-runc-k8s.io-fec8c330cce8c4f7977ee4efc11750a2bb47eeaede9cef88c4565a1b2100d305-runc.mHmOGR.mount: Deactivated successfully. Apr 12 18:16:10.854337 systemd[1]: Started cri-containerd-fec8c330cce8c4f7977ee4efc11750a2bb47eeaede9cef88c4565a1b2100d305.scope. Apr 12 18:16:10.877000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.881506 kernel: kauditd_printk_skb: 530 callbacks suppressed Apr 12 18:16:10.881557 kernel: audit: type=1400 audit(1712945770.877:595): avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.881581 kernel: audit: type=1300 audit(1712945770.877:595): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1475 pid=1552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:10.877000 audit[1552]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1475 pid=1552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:10.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665633863333330636365386334663739373765653465666331313735 Apr 12 18:16:10.888047 kernel: audit: type=1327 audit(1712945770.877:595): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665633863333330636365386334663739373765653465666331313735 Apr 12 18:16:10.888091 kernel: audit: type=1400 audit(1712945770.877:596): avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.877000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.877000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.892574 kernel: audit: type=1400 audit(1712945770.877:596): avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.892633 kernel: audit: type=1400 audit(1712945770.877:596): avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.877000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.877000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.897494 kernel: audit: type=1400 audit(1712945770.877:596): avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.897556 kernel: audit: type=1400 audit(1712945770.877:596): avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.877000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.877000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.901989 kernel: audit: type=1400 audit(1712945770.877:596): avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.877000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.904420 kernel: audit: type=1400 audit(1712945770.877:596): avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.877000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.877000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.877000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.877000 audit: BPF prog-id=75 op=LOAD Apr 12 18:16:10.877000 audit[1552]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1475 pid=1552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:10.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665633863333330636365386334663739373765653465666331313735 Apr 12 18:16:10.877000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.877000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.877000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.877000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.877000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.877000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.877000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.877000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.877000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.877000 audit: BPF prog-id=76 op=LOAD Apr 12 18:16:10.877000 audit[1552]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1475 pid=1552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:10.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665633863333330636365386334663739373765653465666331313735 Apr 12 18:16:10.880000 audit: BPF prog-id=76 op=UNLOAD Apr 12 18:16:10.880000 audit: BPF prog-id=75 op=UNLOAD Apr 12 18:16:10.880000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.880000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.880000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.880000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.880000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.880000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.880000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.880000 audit[1552]: AVC avc: denied { perfmon } for pid=1552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.880000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.880000 audit[1552]: AVC avc: denied { bpf } for pid=1552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.880000 audit: BPF prog-id=77 op=LOAD Apr 12 18:16:10.880000 audit[1552]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1475 pid=1552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:10.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665633863333330636365386334663739373765653465666331313735 Apr 12 18:16:10.916905 env[1109]: time="2024-04-12T18:16:10.916851769Z" level=info msg="StartContainer for \"fec8c330cce8c4f7977ee4efc11750a2bb47eeaede9cef88c4565a1b2100d305\" returns successfully" Apr 12 18:16:11.036000 audit[1602]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1602 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.036000 audit[1602]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe7453070 a2=0 a3=1 items=0 ppid=1563 pid=1602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.036000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:16:11.037000 audit[1603]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1603 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.037000 audit[1603]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff26af950 a2=0 a3=1 items=0 ppid=1563 pid=1603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.037000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:16:11.038000 audit[1605]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1605 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.038000 audit[1605]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffe2eb190 a2=0 a3=1 items=0 ppid=1563 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.038000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:16:11.038000 audit[1606]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1606 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.038000 audit[1606]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffa985e30 a2=0 a3=1 items=0 ppid=1563 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.038000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:16:11.039000 audit[1607]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1607 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.039000 audit[1607]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc6ce6c10 a2=0 a3=1 items=0 ppid=1563 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.039000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:16:11.040000 audit[1608]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1608 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.040000 audit[1608]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffdfd9540 a2=0 a3=1 items=0 ppid=1563 pid=1608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.040000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:16:11.138000 audit[1609]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1609 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.138000 audit[1609]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffea099d00 a2=0 a3=1 items=0 ppid=1563 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.138000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:16:11.143000 audit[1611]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1611 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.143000 audit[1611]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd391fd20 a2=0 a3=1 items=0 ppid=1563 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.143000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:16:11.146000 audit[1614]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1614 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.146000 audit[1614]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff9bb13e0 a2=0 a3=1 items=0 ppid=1563 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.146000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:16:11.147000 audit[1615]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1615 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.147000 audit[1615]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc2888920 a2=0 a3=1 items=0 ppid=1563 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.147000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:16:11.149000 audit[1617]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1617 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.149000 audit[1617]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc9868e90 a2=0 a3=1 items=0 ppid=1563 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.149000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:16:11.150000 audit[1618]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1618 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.150000 audit[1618]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffba6ab80 a2=0 a3=1 items=0 ppid=1563 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.150000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:16:11.152000 audit[1620]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1620 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.152000 audit[1620]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe2410be0 a2=0 a3=1 items=0 ppid=1563 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.152000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:16:11.155000 audit[1623]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1623 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.155000 audit[1623]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdd893c40 a2=0 a3=1 items=0 ppid=1563 pid=1623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.155000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:16:11.156000 audit[1624]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1624 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.156000 audit[1624]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff0aed0e0 a2=0 a3=1 items=0 ppid=1563 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:16:11.158000 audit[1626]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1626 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.158000 audit[1626]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe3428ec0 a2=0 a3=1 items=0 ppid=1563 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.158000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:16:11.159000 audit[1627]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1627 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.159000 audit[1627]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdbb850f0 a2=0 a3=1 items=0 ppid=1563 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.159000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:16:11.161000 audit[1629]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1629 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.161000 audit[1629]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd8afe070 a2=0 a3=1 items=0 ppid=1563 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.161000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:16:11.164000 audit[1632]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1632 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.164000 audit[1632]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd8cea860 a2=0 a3=1 items=0 ppid=1563 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.164000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:16:11.168000 audit[1635]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1635 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.168000 audit[1635]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffddcf8690 a2=0 a3=1 items=0 ppid=1563 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:16:11.169000 audit[1636]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1636 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.169000 audit[1636]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffecfff800 a2=0 a3=1 items=0 ppid=1563 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.169000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:16:11.171000 audit[1638]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1638 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.171000 audit[1638]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffce284f60 a2=0 a3=1 items=0 ppid=1563 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.171000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:16:11.202000 audit[1643]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.202000 audit[1643]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffed678ef0 a2=0 a3=1 items=0 ppid=1563 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.202000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:16:11.207000 audit[1648]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1648 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.207000 audit[1648]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffde9aa810 a2=0 a3=1 items=0 ppid=1563 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.207000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:16:11.209000 audit[1650]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1650 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:16:11.209000 audit[1650]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe60e3c00 a2=0 a3=1 items=0 ppid=1563 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.209000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:16:11.226000 audit[1652]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1652 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:11.226000 audit[1652]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffdd6ca980 a2=0 a3=1 items=0 ppid=1563 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.226000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:11.236000 audit[1652]: NETFILTER_CFG table=nat:40 family=2 entries=14 op=nft_register_chain pid=1652 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:11.236000 audit[1652]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffdd6ca980 a2=0 a3=1 items=0 ppid=1563 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.236000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:11.237000 audit[1658]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1658 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.237000 audit[1658]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe2caea70 a2=0 a3=1 items=0 ppid=1563 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.237000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:16:11.240000 audit[1660]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1660 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.240000 audit[1660]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd9ba9ba0 a2=0 a3=1 items=0 ppid=1563 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.240000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:16:11.243000 audit[1663]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1663 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.243000 audit[1663]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff55203e0 a2=0 a3=1 items=0 ppid=1563 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.243000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:16:11.243000 audit[1664]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1664 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.243000 audit[1664]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff63191c0 a2=0 a3=1 items=0 ppid=1563 pid=1664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.243000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:16:11.245000 audit[1666]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1666 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.245000 audit[1666]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe5a78120 a2=0 a3=1 items=0 ppid=1563 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:16:11.246000 audit[1667]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1667 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.246000 audit[1667]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe891dd30 a2=0 a3=1 items=0 ppid=1563 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.246000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:16:11.248000 audit[1669]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1669 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.248000 audit[1669]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffeaa3b420 a2=0 a3=1 items=0 ppid=1563 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.248000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:16:11.251000 audit[1672]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1672 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.251000 audit[1672]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffffa7316e0 a2=0 a3=1 items=0 ppid=1563 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.251000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:16:11.252000 audit[1673]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1673 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.252000 audit[1673]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc4d2b9c0 a2=0 a3=1 items=0 ppid=1563 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.252000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:16:11.255000 audit[1675]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1675 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.255000 audit[1675]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcc7772e0 a2=0 a3=1 items=0 ppid=1563 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.255000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:16:11.256000 audit[1676]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1676 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.256000 audit[1676]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff5aa5bf0 a2=0 a3=1 items=0 ppid=1563 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.256000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:16:11.258000 audit[1678]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1678 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.258000 audit[1678]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffca950f0 a2=0 a3=1 items=0 ppid=1563 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.258000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:16:11.261000 audit[1681]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1681 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.261000 audit[1681]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff66c0df0 a2=0 a3=1 items=0 ppid=1563 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.261000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:16:11.264000 audit[1684]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1684 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.264000 audit[1684]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffea446ec0 a2=0 a3=1 items=0 ppid=1563 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.264000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:16:11.265000 audit[1685]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1685 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.265000 audit[1685]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc4c67b10 a2=0 a3=1 items=0 ppid=1563 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.265000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:16:11.267000 audit[1687]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.267000 audit[1687]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc1769640 a2=0 a3=1 items=0 ppid=1563 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.267000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:16:11.270000 audit[1690]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1690 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.270000 audit[1690]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd6e8b2d0 a2=0 a3=1 items=0 ppid=1563 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.270000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:16:11.271000 audit[1691]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.271000 audit[1691]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd0696c70 a2=0 a3=1 items=0 ppid=1563 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.271000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:16:11.273000 audit[1693]: NETFILTER_CFG table=filter:59 family=10 entries=1 op=nft_register_rule pid=1693 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.273000 audit[1693]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc6df8770 a2=0 a3=1 items=0 ppid=1563 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.273000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:16:11.276000 audit[1696]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_rule pid=1696 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.276000 audit[1696]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffeef18870 a2=0 a3=1 items=0 ppid=1563 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.276000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:16:11.277000 audit[1697]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.277000 audit[1697]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffeffbf60 a2=0 a3=1 items=0 ppid=1563 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.277000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:16:11.279000 audit[1699]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:16:11.279000 audit[1699]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe2dabf70 a2=0 a3=1 items=0 ppid=1563 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.279000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:16:11.281000 audit[1701]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1701 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:16:11.281000 audit[1701]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=fffff99e6450 a2=0 a3=1 items=0 ppid=1563 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.281000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:11.281000 audit[1701]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1701 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:16:11.281000 audit[1701]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=fffff99e6450 a2=0 a3=1 items=0 ppid=1563 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.281000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:11.474799 kubelet[1408]: E0412 18:16:11.474755 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:11.571873 kubelet[1408]: E0412 18:16:11.571795 1408 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hnrzv" podUID=e4821455-7030-483e-97c9-fca02f2e6327 Apr 12 18:16:11.585028 kubelet[1408]: E0412 18:16:11.584720 1408 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:11.592594 kubelet[1408]: I0412 18:16:11.592408 1408 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-qlsnb" podStartSLOduration=3.218957569 podCreationTimestamp="2024-04-12 18:16:06 +0000 UTC" firstStartedPulling="2024-04-12 18:16:08.445725129 +0000 UTC m=+3.632641201" lastFinishedPulling="2024-04-12 18:16:10.819121729 +0000 UTC m=+6.006037841" observedRunningTime="2024-04-12 18:16:11.591810209 +0000 UTC m=+6.778726321" watchObservedRunningTime="2024-04-12 18:16:11.592354209 +0000 UTC m=+6.779270321" Apr 12 18:16:11.596618 kubelet[1408]: E0412 18:16:11.596497 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.596618 kubelet[1408]: W0412 18:16:11.596511 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.596618 kubelet[1408]: E0412 18:16:11.596538 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.596910 kubelet[1408]: E0412 18:16:11.596810 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.596910 kubelet[1408]: W0412 18:16:11.596821 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.596910 kubelet[1408]: E0412 18:16:11.596834 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.597213 kubelet[1408]: E0412 18:16:11.597059 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.597213 kubelet[1408]: W0412 18:16:11.597069 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.597213 kubelet[1408]: E0412 18:16:11.597081 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.597486 kubelet[1408]: E0412 18:16:11.597386 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.597486 kubelet[1408]: W0412 18:16:11.597397 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.597486 kubelet[1408]: E0412 18:16:11.597409 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.597712 kubelet[1408]: E0412 18:16:11.597620 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.597712 kubelet[1408]: W0412 18:16:11.597630 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.597712 kubelet[1408]: E0412 18:16:11.597642 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.597956 kubelet[1408]: E0412 18:16:11.597911 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.597956 kubelet[1408]: W0412 18:16:11.597923 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.597956 kubelet[1408]: E0412 18:16:11.597935 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.598228 kubelet[1408]: E0412 18:16:11.598217 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.598301 kubelet[1408]: W0412 18:16:11.598291 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.598386 kubelet[1408]: E0412 18:16:11.598376 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.598580 kubelet[1408]: E0412 18:16:11.598568 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.598653 kubelet[1408]: W0412 18:16:11.598642 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.598711 kubelet[1408]: E0412 18:16:11.598696 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.598898 kubelet[1408]: E0412 18:16:11.598883 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.598964 kubelet[1408]: W0412 18:16:11.598953 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.599031 kubelet[1408]: E0412 18:16:11.599014 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.599281 kubelet[1408]: E0412 18:16:11.599270 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.599357 kubelet[1408]: W0412 18:16:11.599346 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.599433 kubelet[1408]: E0412 18:16:11.599424 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.599613 kubelet[1408]: E0412 18:16:11.599603 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.599684 kubelet[1408]: W0412 18:16:11.599673 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.599741 kubelet[1408]: E0412 18:16:11.599727 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.599934 kubelet[1408]: E0412 18:16:11.599923 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.600014 kubelet[1408]: W0412 18:16:11.600002 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.600078 kubelet[1408]: E0412 18:16:11.600069 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.600264 kubelet[1408]: E0412 18:16:11.600253 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.600336 kubelet[1408]: W0412 18:16:11.600323 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.600413 kubelet[1408]: E0412 18:16:11.600403 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.600624 kubelet[1408]: E0412 18:16:11.600609 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.600690 kubelet[1408]: W0412 18:16:11.600679 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.600743 kubelet[1408]: E0412 18:16:11.600734 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.600950 kubelet[1408]: E0412 18:16:11.600940 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.601025 kubelet[1408]: W0412 18:16:11.601013 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.601080 kubelet[1408]: E0412 18:16:11.601071 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.601265 kubelet[1408]: E0412 18:16:11.601256 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.601326 kubelet[1408]: W0412 18:16:11.601315 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.601391 kubelet[1408]: E0412 18:16:11.601381 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.610589 kubelet[1408]: E0412 18:16:11.610572 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.610589 kubelet[1408]: W0412 18:16:11.610588 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.610680 kubelet[1408]: E0412 18:16:11.610604 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.610835 kubelet[1408]: E0412 18:16:11.610824 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.610835 kubelet[1408]: W0412 18:16:11.610835 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.610888 kubelet[1408]: E0412 18:16:11.610849 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.611064 kubelet[1408]: E0412 18:16:11.611053 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.611064 kubelet[1408]: W0412 18:16:11.611064 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.611137 kubelet[1408]: E0412 18:16:11.611079 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.611232 kubelet[1408]: E0412 18:16:11.611217 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.611232 kubelet[1408]: W0412 18:16:11.611228 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.611288 kubelet[1408]: E0412 18:16:11.611238 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.611392 kubelet[1408]: E0412 18:16:11.611374 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.611392 kubelet[1408]: W0412 18:16:11.611384 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.611392 kubelet[1408]: E0412 18:16:11.611397 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.611559 kubelet[1408]: E0412 18:16:11.611548 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.611559 kubelet[1408]: W0412 18:16:11.611559 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.611613 kubelet[1408]: E0412 18:16:11.611570 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.611883 kubelet[1408]: E0412 18:16:11.611871 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.611883 kubelet[1408]: W0412 18:16:11.611883 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.611964 kubelet[1408]: E0412 18:16:11.611952 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.612025 kubelet[1408]: E0412 18:16:11.612016 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.612025 kubelet[1408]: W0412 18:16:11.612024 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.612082 kubelet[1408]: E0412 18:16:11.612034 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.612162 kubelet[1408]: E0412 18:16:11.612153 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.612162 kubelet[1408]: W0412 18:16:11.612162 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.612218 kubelet[1408]: E0412 18:16:11.612173 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.612288 kubelet[1408]: E0412 18:16:11.612278 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.612288 kubelet[1408]: W0412 18:16:11.612287 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.612347 kubelet[1408]: E0412 18:16:11.612295 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.612440 kubelet[1408]: E0412 18:16:11.612431 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.612440 kubelet[1408]: W0412 18:16:11.612440 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.612488 kubelet[1408]: E0412 18:16:11.612450 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.612749 kubelet[1408]: E0412 18:16:11.612737 1408 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:11.612749 kubelet[1408]: W0412 18:16:11.612749 1408 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:11.612822 kubelet[1408]: E0412 18:16:11.612760 1408 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:11.886918 env[1109]: time="2024-04-12T18:16:11.886787849Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:11.889240 env[1109]: time="2024-04-12T18:16:11.889201929Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:11.890985 env[1109]: time="2024-04-12T18:16:11.890961689Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:11.892255 env[1109]: time="2024-04-12T18:16:11.892223449Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:11.892716 env[1109]: time="2024-04-12T18:16:11.892686329Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607\"" Apr 12 18:16:11.894609 env[1109]: time="2024-04-12T18:16:11.894580889Z" level=info msg="CreateContainer within sandbox \"376d90d36aaa6ed17c92e9137aaf02df01ae67d8b6021adaaef7da26f3a5603a\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:16:11.904102 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount849688488.mount: Deactivated successfully. Apr 12 18:16:11.907895 env[1109]: time="2024-04-12T18:16:11.907851289Z" level=info msg="CreateContainer within sandbox \"376d90d36aaa6ed17c92e9137aaf02df01ae67d8b6021adaaef7da26f3a5603a\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"0434a22c9275d690f672b7e1790613fb032aee1f5b31549ef10555602a4d50b3\"" Apr 12 18:16:11.908381 env[1109]: time="2024-04-12T18:16:11.908346529Z" level=info msg="StartContainer for \"0434a22c9275d690f672b7e1790613fb032aee1f5b31549ef10555602a4d50b3\"" Apr 12 18:16:11.925881 systemd[1]: Started cri-containerd-0434a22c9275d690f672b7e1790613fb032aee1f5b31549ef10555602a4d50b3.scope. Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1476 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034333461323263393237356436393066363732623765313739303631 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit: BPF prog-id=78 op=LOAD Apr 12 18:16:11.944000 audit[1737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1476 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034333461323263393237356436393066363732623765313739303631 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit: BPF prog-id=79 op=LOAD Apr 12 18:16:11.944000 audit[1737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1476 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034333461323263393237356436393066363732623765313739303631 Apr 12 18:16:11.944000 audit: BPF prog-id=79 op=UNLOAD Apr 12 18:16:11.944000 audit: BPF prog-id=78 op=UNLOAD Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { perfmon } for pid=1737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit[1737]: AVC avc: denied { bpf } for pid=1737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.944000 audit: BPF prog-id=80 op=LOAD Apr 12 18:16:11.944000 audit[1737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1476 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:11.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034333461323263393237356436393066363732623765313739303631 Apr 12 18:16:11.962084 env[1109]: time="2024-04-12T18:16:11.961464689Z" level=info msg="StartContainer for \"0434a22c9275d690f672b7e1790613fb032aee1f5b31549ef10555602a4d50b3\" returns successfully" Apr 12 18:16:11.966705 systemd[1]: cri-containerd-0434a22c9275d690f672b7e1790613fb032aee1f5b31549ef10555602a4d50b3.scope: Deactivated successfully. Apr 12 18:16:11.971000 audit: BPF prog-id=80 op=UNLOAD Apr 12 18:16:12.114868 env[1109]: time="2024-04-12T18:16:12.114825089Z" level=info msg="shim disconnected" id=0434a22c9275d690f672b7e1790613fb032aee1f5b31549ef10555602a4d50b3 Apr 12 18:16:12.114868 env[1109]: time="2024-04-12T18:16:12.114863329Z" level=warning msg="cleaning up after shim disconnected" id=0434a22c9275d690f672b7e1790613fb032aee1f5b31549ef10555602a4d50b3 namespace=k8s.io Apr 12 18:16:12.114868 env[1109]: time="2024-04-12T18:16:12.114872489Z" level=info msg="cleaning up dead shim" Apr 12 18:16:12.120983 env[1109]: time="2024-04-12T18:16:12.120950529Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:16:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1776 runtime=io.containerd.runc.v2\n" Apr 12 18:16:12.475286 kubelet[1408]: E0412 18:16:12.475245 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:12.548000 audit[1789]: NETFILTER_CFG table=filter:65 family=2 entries=15 op=nft_register_rule pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:12.548000 audit[1789]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffdddd33d0 a2=0 a3=1 items=0 ppid=1563 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.548000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:12.555000 audit[1789]: NETFILTER_CFG table=nat:66 family=2 entries=19 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:12.555000 audit[1789]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffdddd33d0 a2=0 a3=1 items=0 ppid=1563 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.555000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:12.587606 kubelet[1408]: E0412 18:16:12.587548 1408 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:12.588038 kubelet[1408]: E0412 18:16:12.588022 1408 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:12.588605 env[1109]: time="2024-04-12T18:16:12.588575489Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:16:12.828630 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0434a22c9275d690f672b7e1790613fb032aee1f5b31549ef10555602a4d50b3-rootfs.mount: Deactivated successfully. Apr 12 18:16:13.396187 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount635363907.mount: Deactivated successfully. Apr 12 18:16:13.475594 kubelet[1408]: E0412 18:16:13.475550 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:13.572894 kubelet[1408]: E0412 18:16:13.572580 1408 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hnrzv" podUID=e4821455-7030-483e-97c9-fca02f2e6327 Apr 12 18:16:14.476417 kubelet[1408]: E0412 18:16:14.476376 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:14.985174 env[1109]: time="2024-04-12T18:16:14.985133809Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:14.986654 env[1109]: time="2024-04-12T18:16:14.986625409Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:14.987943 env[1109]: time="2024-04-12T18:16:14.987916009Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:14.989353 env[1109]: time="2024-04-12T18:16:14.989326369Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:14.989715 env[1109]: time="2024-04-12T18:16:14.989684209Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a\"" Apr 12 18:16:14.991264 env[1109]: time="2024-04-12T18:16:14.991234969Z" level=info msg="CreateContainer within sandbox \"376d90d36aaa6ed17c92e9137aaf02df01ae67d8b6021adaaef7da26f3a5603a\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:16:15.001976 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount418203090.mount: Deactivated successfully. Apr 12 18:16:15.006067 env[1109]: time="2024-04-12T18:16:15.006032089Z" level=info msg="CreateContainer within sandbox \"376d90d36aaa6ed17c92e9137aaf02df01ae67d8b6021adaaef7da26f3a5603a\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"f969e70e9f4374cf3d689d7a062260f341c1891b53bd885bfa0d596ed7972220\"" Apr 12 18:16:15.006648 env[1109]: time="2024-04-12T18:16:15.006621409Z" level=info msg="StartContainer for \"f969e70e9f4374cf3d689d7a062260f341c1891b53bd885bfa0d596ed7972220\"" Apr 12 18:16:15.022017 systemd[1]: Started cri-containerd-f969e70e9f4374cf3d689d7a062260f341c1891b53bd885bfa0d596ed7972220.scope. Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1476 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:15.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639363965373065396634333734636633643638396437613036323236 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit: BPF prog-id=81 op=LOAD Apr 12 18:16:15.046000 audit[1803]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1476 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:15.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639363965373065396634333734636633643638396437613036323236 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit: BPF prog-id=82 op=LOAD Apr 12 18:16:15.046000 audit[1803]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1476 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:15.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639363965373065396634333734636633643638396437613036323236 Apr 12 18:16:15.046000 audit: BPF prog-id=82 op=UNLOAD Apr 12 18:16:15.046000 audit: BPF prog-id=81 op=UNLOAD Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:15.046000 audit: BPF prog-id=83 op=LOAD Apr 12 18:16:15.046000 audit[1803]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1476 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:15.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639363965373065396634333734636633643638396437613036323236 Apr 12 18:16:15.060764 env[1109]: time="2024-04-12T18:16:15.060722609Z" level=info msg="StartContainer for \"f969e70e9f4374cf3d689d7a062260f341c1891b53bd885bfa0d596ed7972220\" returns successfully" Apr 12 18:16:15.477492 kubelet[1408]: E0412 18:16:15.477436 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:15.523135 env[1109]: time="2024-04-12T18:16:15.523077169Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:16:15.525089 systemd[1]: cri-containerd-f969e70e9f4374cf3d689d7a062260f341c1891b53bd885bfa0d596ed7972220.scope: Deactivated successfully. Apr 12 18:16:15.528000 audit: BPF prog-id=83 op=UNLOAD Apr 12 18:16:15.543023 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f969e70e9f4374cf3d689d7a062260f341c1891b53bd885bfa0d596ed7972220-rootfs.mount: Deactivated successfully. Apr 12 18:16:15.551410 kubelet[1408]: I0412 18:16:15.551243 1408 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 18:16:15.578117 systemd[1]: Created slice kubepods-besteffort-pode4821455_7030_483e_97c9_fca02f2e6327.slice. Apr 12 18:16:15.579956 env[1109]: time="2024-04-12T18:16:15.579905489Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hnrzv,Uid:e4821455-7030-483e-97c9-fca02f2e6327,Namespace:calico-system,Attempt:0,}" Apr 12 18:16:15.593621 kubelet[1408]: E0412 18:16:15.593220 1408 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:15.762064 env[1109]: time="2024-04-12T18:16:15.761954449Z" level=info msg="shim disconnected" id=f969e70e9f4374cf3d689d7a062260f341c1891b53bd885bfa0d596ed7972220 Apr 12 18:16:15.762064 env[1109]: time="2024-04-12T18:16:15.762000489Z" level=warning msg="cleaning up after shim disconnected" id=f969e70e9f4374cf3d689d7a062260f341c1891b53bd885bfa0d596ed7972220 namespace=k8s.io Apr 12 18:16:15.762064 env[1109]: time="2024-04-12T18:16:15.762010569Z" level=info msg="cleaning up dead shim" Apr 12 18:16:15.769153 env[1109]: time="2024-04-12T18:16:15.769093369Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:16:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1845 runtime=io.containerd.runc.v2\n" Apr 12 18:16:15.857666 env[1109]: time="2024-04-12T18:16:15.857602689Z" level=error msg="Failed to destroy network for sandbox \"dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:15.857996 env[1109]: time="2024-04-12T18:16:15.857958529Z" level=error msg="encountered an error cleaning up failed sandbox \"dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:15.858038 env[1109]: time="2024-04-12T18:16:15.858009729Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hnrzv,Uid:e4821455-7030-483e-97c9-fca02f2e6327,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:15.858396 kubelet[1408]: E0412 18:16:15.858235 1408 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:15.858396 kubelet[1408]: E0412 18:16:15.858291 1408 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-hnrzv" Apr 12 18:16:15.858396 kubelet[1408]: E0412 18:16:15.858309 1408 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-hnrzv" Apr 12 18:16:15.858516 kubelet[1408]: E0412 18:16:15.858372 1408 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-hnrzv_calico-system(e4821455-7030-483e-97c9-fca02f2e6327)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-hnrzv_calico-system(e4821455-7030-483e-97c9-fca02f2e6327)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hnrzv" podUID=e4821455-7030-483e-97c9-fca02f2e6327 Apr 12 18:16:16.477948 kubelet[1408]: E0412 18:16:16.477892 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:16.595221 kubelet[1408]: I0412 18:16:16.595197 1408 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed" Apr 12 18:16:16.595866 env[1109]: time="2024-04-12T18:16:16.595833249Z" level=info msg="StopPodSandbox for \"dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed\"" Apr 12 18:16:16.597454 kubelet[1408]: E0412 18:16:16.597429 1408 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:16.598150 env[1109]: time="2024-04-12T18:16:16.598119769Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:16:16.618660 env[1109]: time="2024-04-12T18:16:16.618581409Z" level=error msg="StopPodSandbox for \"dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed\" failed" error="failed to destroy network for sandbox \"dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:16.619016 kubelet[1408]: E0412 18:16:16.618993 1408 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed" Apr 12 18:16:16.619087 kubelet[1408]: E0412 18:16:16.619042 1408 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed} Apr 12 18:16:16.619087 kubelet[1408]: E0412 18:16:16.619077 1408 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e4821455-7030-483e-97c9-fca02f2e6327\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:16:16.619161 kubelet[1408]: E0412 18:16:16.619101 1408 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e4821455-7030-483e-97c9-fca02f2e6327\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hnrzv" podUID=e4821455-7030-483e-97c9-fca02f2e6327 Apr 12 18:16:17.478068 kubelet[1408]: E0412 18:16:17.478038 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:18.479487 kubelet[1408]: E0412 18:16:18.479437 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:18.905296 kubelet[1408]: I0412 18:16:18.905194 1408 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:16:18.909894 systemd[1]: Created slice kubepods-besteffort-pod1781d77f_37b3_4c0b_b2fe_99627f034f29.slice. Apr 12 18:16:18.944994 kubelet[1408]: I0412 18:16:18.944962 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-whbjd\" (UniqueName: \"kubernetes.io/projected/1781d77f-37b3-4c0b-b2fe-99627f034f29-kube-api-access-whbjd\") pod \"nginx-deployment-845c78c8b9-vcxgk\" (UID: \"1781d77f-37b3-4c0b-b2fe-99627f034f29\") " pod="default/nginx-deployment-845c78c8b9-vcxgk" Apr 12 18:16:19.212373 env[1109]: time="2024-04-12T18:16:19.212304369Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-vcxgk,Uid:1781d77f-37b3-4c0b-b2fe-99627f034f29,Namespace:default,Attempt:0,}" Apr 12 18:16:19.421200 env[1109]: time="2024-04-12T18:16:19.421118329Z" level=error msg="Failed to destroy network for sandbox \"edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:19.422478 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717-shm.mount: Deactivated successfully. Apr 12 18:16:19.423016 env[1109]: time="2024-04-12T18:16:19.422979889Z" level=error msg="encountered an error cleaning up failed sandbox \"edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:19.423139 env[1109]: time="2024-04-12T18:16:19.423110929Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-vcxgk,Uid:1781d77f-37b3-4c0b-b2fe-99627f034f29,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:19.423835 kubelet[1408]: E0412 18:16:19.423449 1408 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:19.423835 kubelet[1408]: E0412 18:16:19.423506 1408 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-vcxgk" Apr 12 18:16:19.423835 kubelet[1408]: E0412 18:16:19.423524 1408 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-vcxgk" Apr 12 18:16:19.423969 kubelet[1408]: E0412 18:16:19.423590 1408 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-845c78c8b9-vcxgk_default(1781d77f-37b3-4c0b-b2fe-99627f034f29)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-845c78c8b9-vcxgk_default(1781d77f-37b3-4c0b-b2fe-99627f034f29)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-vcxgk" podUID=1781d77f-37b3-4c0b-b2fe-99627f034f29 Apr 12 18:16:19.480214 kubelet[1408]: E0412 18:16:19.480104 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:19.609099 kubelet[1408]: I0412 18:16:19.608600 1408 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717" Apr 12 18:16:19.609211 env[1109]: time="2024-04-12T18:16:19.609159569Z" level=info msg="StopPodSandbox for \"edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717\"" Apr 12 18:16:19.630347 env[1109]: time="2024-04-12T18:16:19.630281809Z" level=error msg="StopPodSandbox for \"edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717\" failed" error="failed to destroy network for sandbox \"edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:19.630841 kubelet[1408]: E0412 18:16:19.630683 1408 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717" Apr 12 18:16:19.630841 kubelet[1408]: E0412 18:16:19.630720 1408 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717} Apr 12 18:16:19.630841 kubelet[1408]: E0412 18:16:19.630768 1408 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1781d77f-37b3-4c0b-b2fe-99627f034f29\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:16:19.630841 kubelet[1408]: E0412 18:16:19.630801 1408 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1781d77f-37b3-4c0b-b2fe-99627f034f29\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-vcxgk" podUID=1781d77f-37b3-4c0b-b2fe-99627f034f29 Apr 12 18:16:19.835000 audit[1980]: NETFILTER_CFG table=filter:67 family=2 entries=14 op=nft_register_rule pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:19.839752 kernel: kauditd_printk_skb: 280 callbacks suppressed Apr 12 18:16:19.839860 kernel: audit: type=1325 audit(1712945779.835:668): table=filter:67 family=2 entries=14 op=nft_register_rule pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:19.839887 kernel: audit: type=1300 audit(1712945779.835:668): arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffca38be20 a2=0 a3=1 items=0 ppid=1563 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.835000 audit[1980]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffca38be20 a2=0 a3=1 items=0 ppid=1563 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.835000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:19.845002 kernel: audit: type=1327 audit(1712945779.835:668): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:19.849000 audit[1980]: NETFILTER_CFG table=nat:68 family=2 entries=14 op=nft_register_rule pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:19.849000 audit[1980]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffca38be20 a2=0 a3=1 items=0 ppid=1563 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.855927 kernel: audit: type=1325 audit(1712945779.849:669): table=nat:68 family=2 entries=14 op=nft_register_rule pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:19.855992 kernel: audit: type=1300 audit(1712945779.849:669): arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffca38be20 a2=0 a3=1 items=0 ppid=1563 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.856016 kernel: audit: type=1327 audit(1712945779.849:669): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:19.849000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:19.864000 audit[1982]: NETFILTER_CFG table=filter:69 family=2 entries=11 op=nft_register_rule pid=1982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:19.864000 audit[1982]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffcabfcd20 a2=0 a3=1 items=0 ppid=1563 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.871160 kernel: audit: type=1325 audit(1712945779.864:670): table=filter:69 family=2 entries=11 op=nft_register_rule pid=1982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:19.871217 kernel: audit: type=1300 audit(1712945779.864:670): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffcabfcd20 a2=0 a3=1 items=0 ppid=1563 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.871241 kernel: audit: type=1327 audit(1712945779.864:670): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:19.864000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:19.878000 audit[1982]: NETFILTER_CFG table=nat:70 family=2 entries=35 op=nft_register_chain pid=1982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:19.878000 audit[1982]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffcabfcd20 a2=0 a3=1 items=0 ppid=1563 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.882381 kernel: audit: type=1325 audit(1712945779.878:671): table=nat:70 family=2 entries=35 op=nft_register_chain pid=1982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:19.878000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:20.481005 kubelet[1408]: E0412 18:16:20.480957 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:20.829568 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount434470853.mount: Deactivated successfully. Apr 12 18:16:21.093300 env[1109]: time="2024-04-12T18:16:21.093196369Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:21.094824 env[1109]: time="2024-04-12T18:16:21.094786889Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:21.096130 env[1109]: time="2024-04-12T18:16:21.096101009Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:21.098047 env[1109]: time="2024-04-12T18:16:21.098013769Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:21.098617 env[1109]: time="2024-04-12T18:16:21.098585129Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d\"" Apr 12 18:16:21.106928 env[1109]: time="2024-04-12T18:16:21.106891409Z" level=info msg="CreateContainer within sandbox \"376d90d36aaa6ed17c92e9137aaf02df01ae67d8b6021adaaef7da26f3a5603a\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:16:21.119116 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount168235752.mount: Deactivated successfully. Apr 12 18:16:21.123812 env[1109]: time="2024-04-12T18:16:21.123760849Z" level=info msg="CreateContainer within sandbox \"376d90d36aaa6ed17c92e9137aaf02df01ae67d8b6021adaaef7da26f3a5603a\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"766232cc36fb557e2c8bb034ab1b835071cc7ed09d2a5560c8055c296f541bec\"" Apr 12 18:16:21.124272 env[1109]: time="2024-04-12T18:16:21.124241929Z" level=info msg="StartContainer for \"766232cc36fb557e2c8bb034ab1b835071cc7ed09d2a5560c8055c296f541bec\"" Apr 12 18:16:21.142186 systemd[1]: Started cri-containerd-766232cc36fb557e2c8bb034ab1b835071cc7ed09d2a5560c8055c296f541bec.scope. Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1476 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736363233326363333666623535376532633862623033346162316238 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit: BPF prog-id=84 op=LOAD Apr 12 18:16:21.167000 audit[1995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1476 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736363233326363333666623535376532633862623033346162316238 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit: BPF prog-id=85 op=LOAD Apr 12 18:16:21.167000 audit[1995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1476 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736363233326363333666623535376532633862623033346162316238 Apr 12 18:16:21.167000 audit: BPF prog-id=85 op=UNLOAD Apr 12 18:16:21.167000 audit: BPF prog-id=84 op=UNLOAD Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { perfmon } for pid=1995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit[1995]: AVC avc: denied { bpf } for pid=1995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.167000 audit: BPF prog-id=86 op=LOAD Apr 12 18:16:21.167000 audit[1995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1476 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736363233326363333666623535376532633862623033346162316238 Apr 12 18:16:21.187187 env[1109]: time="2024-04-12T18:16:21.187138649Z" level=info msg="StartContainer for \"766232cc36fb557e2c8bb034ab1b835071cc7ed09d2a5560c8055c296f541bec\" returns successfully" Apr 12 18:16:21.339957 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:16:21.340071 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:16:21.481660 kubelet[1408]: E0412 18:16:21.481617 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:21.613785 kubelet[1408]: E0412 18:16:21.613727 1408 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:21.628726 kubelet[1408]: I0412 18:16:21.628425 1408 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-j7z2t" podStartSLOduration=1.979710209 podCreationTimestamp="2024-04-12 18:16:07 +0000 UTC" firstStartedPulling="2024-04-12 18:16:08.450699409 +0000 UTC m=+3.637615521" lastFinishedPulling="2024-04-12 18:16:21.099372809 +0000 UTC m=+16.286288921" observedRunningTime="2024-04-12 18:16:21.627831969 +0000 UTC m=+16.814748081" watchObservedRunningTime="2024-04-12 18:16:21.628383609 +0000 UTC m=+16.815299721" Apr 12 18:16:21.856000 audit[2076]: NETFILTER_CFG table=filter:71 family=2 entries=8 op=nft_register_rule pid=2076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:21.856000 audit[2076]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd1acdbe0 a2=0 a3=1 items=0 ppid=1563 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.856000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:21.857000 audit[2076]: NETFILTER_CFG table=nat:72 family=2 entries=44 op=nft_register_rule pid=2076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:21.857000 audit[2076]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffd1acdbe0 a2=0 a3=1 items=0 ppid=1563 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.857000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:21.869000 audit[2078]: NETFILTER_CFG table=filter:73 family=2 entries=8 op=nft_register_rule pid=2078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:21.869000 audit[2078]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc8cffd00 a2=0 a3=1 items=0 ppid=1563 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.869000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:21.881000 audit[2078]: NETFILTER_CFG table=nat:74 family=2 entries=56 op=nft_register_chain pid=2078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:21.881000 audit[2078]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffc8cffd00 a2=0 a3=1 items=0 ppid=1563 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.881000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:22.482003 kubelet[1408]: E0412 18:16:22.481956 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:22.602000 audit[2115]: AVC avc: denied { write } for pid=2115 comm="tee" name="fd" dev="proc" ino=15809 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:16:22.602000 audit[2115]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd23b2987 a2=241 a3=1b6 items=1 ppid=2091 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.602000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:16:22.602000 audit: PATH item=0 name="/dev/fd/63" inode=15803 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:16:22.602000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:16:22.603000 audit[2122]: AVC avc: denied { write } for pid=2122 comm="tee" name="fd" dev="proc" ino=15813 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:16:22.603000 audit[2122]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffbfc0997 a2=241 a3=1b6 items=1 ppid=2090 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.603000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:16:22.603000 audit: PATH item=0 name="/dev/fd/63" inode=15806 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:16:22.603000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:16:22.611000 audit[2125]: AVC avc: denied { write } for pid=2125 comm="tee" name="fd" dev="proc" ino=15825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:16:22.611000 audit[2125]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd92c7998 a2=241 a3=1b6 items=1 ppid=2088 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.611000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:16:22.611000 audit: PATH item=0 name="/dev/fd/63" inode=13035 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:16:22.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:16:22.615445 kubelet[1408]: E0412 18:16:22.615408 1408 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:22.615000 audit[2137]: AVC avc: denied { write } for pid=2137 comm="tee" name="fd" dev="proc" ino=13042 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:16:22.615000 audit[2137]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdf6d3997 a2=241 a3=1b6 items=1 ppid=2101 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.615000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:16:22.615000 audit: PATH item=0 name="/dev/fd/63" inode=13039 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:16:22.615000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:16:22.621000 audit[2150]: AVC avc: denied { write } for pid=2150 comm="tee" name="fd" dev="proc" ino=13046 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:16:22.621000 audit[2150]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffc3cb997 a2=241 a3=1b6 items=1 ppid=2095 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.621000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:16:22.621000 audit: PATH item=0 name="/dev/fd/63" inode=13813 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:16:22.621000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:16:22.632000 audit[2168]: AVC avc: denied { write } for pid=2168 comm="tee" name="fd" dev="proc" ino=15835 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:16:22.632000 audit[2168]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcec5d988 a2=241 a3=1b6 items=1 ppid=2089 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.632000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:16:22.632000 audit: PATH item=0 name="/dev/fd/63" inode=15832 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:16:22.632000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:16:22.635000 audit[2176]: AVC avc: denied { write } for pid=2176 comm="tee" name="fd" dev="proc" ino=14806 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:16:22.635000 audit[2176]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc7d07999 a2=241 a3=1b6 items=1 ppid=2106 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.635000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:16:22.635000 audit: PATH item=0 name="/dev/fd/63" inode=13825 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:16:22.635000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:16:22.756385 kernel: Initializing XFRM netlink socket Apr 12 18:16:22.852000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.852000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.852000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.852000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.852000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.852000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.852000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.852000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.852000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.852000 audit: BPF prog-id=87 op=LOAD Apr 12 18:16:22.852000 audit[2259]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffddef4bb8 a2=70 a3=ffffddef4c28 items=0 ppid=2103 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:16:22.853000 audit: BPF prog-id=87 op=UNLOAD Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit: BPF prog-id=88 op=LOAD Apr 12 18:16:22.853000 audit[2259]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffddef4bb8 a2=70 a3=4b243c items=0 ppid=2103 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.853000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:16:22.853000 audit: BPF prog-id=88 op=UNLOAD Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit[2259]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffddef4b70 a2=70 a3=ffffddef4be0 items=0 ppid=2103 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.853000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit: BPF prog-id=89 op=LOAD Apr 12 18:16:22.853000 audit[2259]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffddef4b58 a2=70 a3=ffffddef4bc8 items=0 ppid=2103 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.853000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:16:22.853000 audit: BPF prog-id=89 op=UNLOAD Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit[2259]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffddef4c28 a2=70 a3=0 items=0 ppid=2103 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.853000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit[2259]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffddef4c18 a2=70 a3=0 items=0 ppid=2103 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.853000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:16:22.853000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.853000 audit[2259]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffddef4b88 a2=70 a3=0 items=0 ppid=2103 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.853000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:16:22.854000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.854000 audit[2259]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffddef4c60 a2=70 a3=1ab789ef items=0 ppid=2103 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:16:22.854000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.854000 audit[2259]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffddef4c60 a2=70 a3=1ab789ef items=0 ppid=2103 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:16:22.854000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.854000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.854000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.854000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.854000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.854000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.854000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.854000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.854000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.854000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.854000 audit: BPF prog-id=90 op=LOAD Apr 12 18:16:22.854000 audit[2259]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffddef4b88 a2=70 a3=1ab78a09 items=0 ppid=2103 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:16:22.859000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.859000 audit[2265]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc03005d8 a2=70 a3=ffffc0300648 items=0 ppid=2103 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.859000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:16:22.859000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.859000 audit[2265]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc03004a8 a2=70 a3=ffffc0300518 items=0 ppid=2103 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.859000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:16:22.867000 audit: BPF prog-id=90 op=UNLOAD Apr 12 18:16:22.908000 audit[2289]: NETFILTER_CFG table=mangle:75 family=2 entries=16 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:16:22.908000 audit[2289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffef69b050 a2=0 a3=ffff81a34fa8 items=0 ppid=2103 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.908000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:16:22.915000 audit[2288]: NETFILTER_CFG table=raw:76 family=2 entries=19 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:16:22.915000 audit[2288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=ffffc429d6d0 a2=0 a3=ffffa753dfa8 items=0 ppid=2103 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.915000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:16:22.918000 audit[2292]: NETFILTER_CFG table=nat:77 family=2 entries=15 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:16:22.918000 audit[2292]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffe9590640 a2=0 a3=ffff8eea6fa8 items=0 ppid=2103 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.918000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:16:22.919000 audit[2290]: NETFILTER_CFG table=filter:78 family=2 entries=39 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:16:22.919000 audit[2290]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffcc7db6c0 a2=0 a3=ffff80222fa8 items=0 ppid=2103 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.919000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:16:23.483133 kubelet[1408]: E0412 18:16:23.483083 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:23.616397 kubelet[1408]: E0412 18:16:23.616256 1408 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:23.629315 systemd[1]: run-containerd-runc-k8s.io-766232cc36fb557e2c8bb034ab1b835071cc7ed09d2a5560c8055c296f541bec-runc.814BYK.mount: Deactivated successfully. Apr 12 18:16:23.765836 systemd-networkd[1009]: vxlan.calico: Link UP Apr 12 18:16:23.765849 systemd-networkd[1009]: vxlan.calico: Gained carrier Apr 12 18:16:24.483701 kubelet[1408]: E0412 18:16:24.483653 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:24.827522 systemd-networkd[1009]: vxlan.calico: Gained IPv6LL Apr 12 18:16:25.472188 kubelet[1408]: E0412 18:16:25.472152 1408 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:25.484690 kubelet[1408]: E0412 18:16:25.484645 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:26.485666 kubelet[1408]: E0412 18:16:26.485602 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:27.486779 kubelet[1408]: E0412 18:16:27.486708 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:28.487087 kubelet[1408]: E0412 18:16:28.487040 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:29.487860 kubelet[1408]: E0412 18:16:29.487815 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:30.488791 kubelet[1408]: E0412 18:16:30.488699 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:30.576329 env[1109]: time="2024-04-12T18:16:30.576239529Z" level=info msg="StopPodSandbox for \"dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed\"" Apr 12 18:16:30.699290 env[1109]: 2024-04-12 18:16:30.632 [INFO][2352] k8s.go 585: Cleaning up netns ContainerID="dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed" Apr 12 18:16:30.699290 env[1109]: 2024-04-12 18:16:30.632 [INFO][2352] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed" iface="eth0" netns="/var/run/netns/cni-0c9fbccc-fa8d-a790-7451-7a44bc46fafe" Apr 12 18:16:30.699290 env[1109]: 2024-04-12 18:16:30.632 [INFO][2352] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed" iface="eth0" netns="/var/run/netns/cni-0c9fbccc-fa8d-a790-7451-7a44bc46fafe" Apr 12 18:16:30.699290 env[1109]: 2024-04-12 18:16:30.632 [INFO][2352] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed" iface="eth0" netns="/var/run/netns/cni-0c9fbccc-fa8d-a790-7451-7a44bc46fafe" Apr 12 18:16:30.699290 env[1109]: 2024-04-12 18:16:30.633 [INFO][2352] k8s.go 592: Releasing IP address(es) ContainerID="dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed" Apr 12 18:16:30.699290 env[1109]: 2024-04-12 18:16:30.633 [INFO][2352] utils.go 188: Calico CNI releasing IP address ContainerID="dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed" Apr 12 18:16:30.699290 env[1109]: 2024-04-12 18:16:30.684 [INFO][2361] ipam_plugin.go 415: Releasing address using handleID ContainerID="dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed" HandleID="k8s-pod-network.dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed" Workload="10.0.0.15-k8s-csi--node--driver--hnrzv-eth0" Apr 12 18:16:30.699290 env[1109]: 2024-04-12 18:16:30.684 [INFO][2361] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:30.699290 env[1109]: 2024-04-12 18:16:30.684 [INFO][2361] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:30.699290 env[1109]: 2024-04-12 18:16:30.693 [WARNING][2361] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed" HandleID="k8s-pod-network.dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed" Workload="10.0.0.15-k8s-csi--node--driver--hnrzv-eth0" Apr 12 18:16:30.699290 env[1109]: 2024-04-12 18:16:30.694 [INFO][2361] ipam_plugin.go 443: Releasing address using workloadID ContainerID="dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed" HandleID="k8s-pod-network.dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed" Workload="10.0.0.15-k8s-csi--node--driver--hnrzv-eth0" Apr 12 18:16:30.699290 env[1109]: 2024-04-12 18:16:30.696 [INFO][2361] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:30.699290 env[1109]: 2024-04-12 18:16:30.698 [INFO][2352] k8s.go 598: Teardown processing complete. ContainerID="dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed" Apr 12 18:16:30.701048 systemd[1]: run-netns-cni\x2d0c9fbccc\x2dfa8d\x2da790\x2d7451\x2d7a44bc46fafe.mount: Deactivated successfully. Apr 12 18:16:30.701549 env[1109]: time="2024-04-12T18:16:30.701510129Z" level=info msg="TearDown network for sandbox \"dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed\" successfully" Apr 12 18:16:30.701628 env[1109]: time="2024-04-12T18:16:30.701611889Z" level=info msg="StopPodSandbox for \"dc6d56a8b06bf93cad4c69b182865c4795dbdf6edc3a728fa77e4226327aa0ed\" returns successfully" Apr 12 18:16:30.702358 env[1109]: time="2024-04-12T18:16:30.702331009Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hnrzv,Uid:e4821455-7030-483e-97c9-fca02f2e6327,Namespace:calico-system,Attempt:1,}" Apr 12 18:16:30.850045 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:16:30.850211 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali03578fec7c0: link becomes ready Apr 12 18:16:30.849707 systemd-networkd[1009]: cali03578fec7c0: Link UP Apr 12 18:16:30.850213 systemd-networkd[1009]: cali03578fec7c0: Gained carrier Apr 12 18:16:30.864865 env[1109]: 2024-04-12 18:16:30.757 [INFO][2368] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.15-k8s-csi--node--driver--hnrzv-eth0 csi-node-driver- calico-system e4821455-7030-483e-97c9-fca02f2e6327 903 0 2024-04-12 18:16:07 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:54c68f759 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.15 csi-node-driver-hnrzv eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali03578fec7c0 [] []}} ContainerID="779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560" Namespace="calico-system" Pod="csi-node-driver-hnrzv" WorkloadEndpoint="10.0.0.15-k8s-csi--node--driver--hnrzv-" Apr 12 18:16:30.864865 env[1109]: 2024-04-12 18:16:30.757 [INFO][2368] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560" Namespace="calico-system" Pod="csi-node-driver-hnrzv" WorkloadEndpoint="10.0.0.15-k8s-csi--node--driver--hnrzv-eth0" Apr 12 18:16:30.864865 env[1109]: 2024-04-12 18:16:30.785 [INFO][2382] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560" HandleID="k8s-pod-network.779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560" Workload="10.0.0.15-k8s-csi--node--driver--hnrzv-eth0" Apr 12 18:16:30.864865 env[1109]: 2024-04-12 18:16:30.804 [INFO][2382] ipam_plugin.go 268: Auto assigning IP ContainerID="779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560" HandleID="k8s-pod-network.779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560" Workload="10.0.0.15-k8s-csi--node--driver--hnrzv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002aa950), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.15", "pod":"csi-node-driver-hnrzv", "timestamp":"2024-04-12 18:16:30.785679889 +0000 UTC"}, Hostname:"10.0.0.15", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:16:30.864865 env[1109]: 2024-04-12 18:16:30.804 [INFO][2382] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:30.864865 env[1109]: 2024-04-12 18:16:30.804 [INFO][2382] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:30.864865 env[1109]: 2024-04-12 18:16:30.804 [INFO][2382] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.15' Apr 12 18:16:30.864865 env[1109]: 2024-04-12 18:16:30.806 [INFO][2382] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560" host="10.0.0.15" Apr 12 18:16:30.864865 env[1109]: 2024-04-12 18:16:30.813 [INFO][2382] ipam.go 372: Looking up existing affinities for host host="10.0.0.15" Apr 12 18:16:30.864865 env[1109]: 2024-04-12 18:16:30.820 [INFO][2382] ipam.go 489: Trying affinity for 192.168.73.128/26 host="10.0.0.15" Apr 12 18:16:30.864865 env[1109]: 2024-04-12 18:16:30.823 [INFO][2382] ipam.go 155: Attempting to load block cidr=192.168.73.128/26 host="10.0.0.15" Apr 12 18:16:30.864865 env[1109]: 2024-04-12 18:16:30.825 [INFO][2382] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.73.128/26 host="10.0.0.15" Apr 12 18:16:30.864865 env[1109]: 2024-04-12 18:16:30.825 [INFO][2382] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.73.128/26 handle="k8s-pod-network.779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560" host="10.0.0.15" Apr 12 18:16:30.864865 env[1109]: 2024-04-12 18:16:30.829 [INFO][2382] ipam.go 1682: Creating new handle: k8s-pod-network.779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560 Apr 12 18:16:30.864865 env[1109]: 2024-04-12 18:16:30.834 [INFO][2382] ipam.go 1203: Writing block in order to claim IPs block=192.168.73.128/26 handle="k8s-pod-network.779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560" host="10.0.0.15" Apr 12 18:16:30.864865 env[1109]: 2024-04-12 18:16:30.844 [INFO][2382] ipam.go 1216: Successfully claimed IPs: [192.168.73.129/26] block=192.168.73.128/26 handle="k8s-pod-network.779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560" host="10.0.0.15" Apr 12 18:16:30.864865 env[1109]: 2024-04-12 18:16:30.844 [INFO][2382] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.73.129/26] handle="k8s-pod-network.779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560" host="10.0.0.15" Apr 12 18:16:30.864865 env[1109]: 2024-04-12 18:16:30.844 [INFO][2382] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:30.864865 env[1109]: 2024-04-12 18:16:30.844 [INFO][2382] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.73.129/26] IPv6=[] ContainerID="779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560" HandleID="k8s-pod-network.779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560" Workload="10.0.0.15-k8s-csi--node--driver--hnrzv-eth0" Apr 12 18:16:30.865533 env[1109]: 2024-04-12 18:16:30.846 [INFO][2368] k8s.go 385: Populated endpoint ContainerID="779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560" Namespace="calico-system" Pod="csi-node-driver-hnrzv" WorkloadEndpoint="10.0.0.15-k8s-csi--node--driver--hnrzv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15-k8s-csi--node--driver--hnrzv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e4821455-7030-483e-97c9-fca02f2e6327", ResourceVersion:"903", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 16, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.15", ContainerID:"", Pod:"csi-node-driver-hnrzv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.73.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali03578fec7c0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:30.865533 env[1109]: 2024-04-12 18:16:30.846 [INFO][2368] k8s.go 386: Calico CNI using IPs: [192.168.73.129/32] ContainerID="779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560" Namespace="calico-system" Pod="csi-node-driver-hnrzv" WorkloadEndpoint="10.0.0.15-k8s-csi--node--driver--hnrzv-eth0" Apr 12 18:16:30.865533 env[1109]: 2024-04-12 18:16:30.847 [INFO][2368] dataplane_linux.go 68: Setting the host side veth name to cali03578fec7c0 ContainerID="779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560" Namespace="calico-system" Pod="csi-node-driver-hnrzv" WorkloadEndpoint="10.0.0.15-k8s-csi--node--driver--hnrzv-eth0" Apr 12 18:16:30.865533 env[1109]: 2024-04-12 18:16:30.850 [INFO][2368] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560" Namespace="calico-system" Pod="csi-node-driver-hnrzv" WorkloadEndpoint="10.0.0.15-k8s-csi--node--driver--hnrzv-eth0" Apr 12 18:16:30.865533 env[1109]: 2024-04-12 18:16:30.851 [INFO][2368] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560" Namespace="calico-system" Pod="csi-node-driver-hnrzv" WorkloadEndpoint="10.0.0.15-k8s-csi--node--driver--hnrzv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15-k8s-csi--node--driver--hnrzv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e4821455-7030-483e-97c9-fca02f2e6327", ResourceVersion:"903", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 16, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.15", ContainerID:"779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560", Pod:"csi-node-driver-hnrzv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.73.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali03578fec7c0", MAC:"e2:73:43:f8:09:b5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:30.865533 env[1109]: 2024-04-12 18:16:30.863 [INFO][2368] k8s.go 498: Wrote updated endpoint to datastore ContainerID="779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560" Namespace="calico-system" Pod="csi-node-driver-hnrzv" WorkloadEndpoint="10.0.0.15-k8s-csi--node--driver--hnrzv-eth0" Apr 12 18:16:30.875834 env[1109]: time="2024-04-12T18:16:30.875745249Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:16:30.875834 env[1109]: time="2024-04-12T18:16:30.875795809Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:16:30.876015 env[1109]: time="2024-04-12T18:16:30.875806769Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:16:30.876266 env[1109]: time="2024-04-12T18:16:30.876226769Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560 pid=2409 runtime=io.containerd.runc.v2 Apr 12 18:16:30.892000 audit[2433]: NETFILTER_CFG table=filter:79 family=2 entries=36 op=nft_register_chain pid=2433 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:16:30.894498 systemd[1]: Started cri-containerd-779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560.scope. Apr 12 18:16:30.897179 kernel: kauditd_printk_skb: 181 callbacks suppressed Apr 12 18:16:30.897271 kernel: audit: type=1325 audit(1712945790.892:709): table=filter:79 family=2 entries=36 op=nft_register_chain pid=2433 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:16:30.897304 kernel: audit: type=1300 audit(1712945790.892:709): arch=c00000b7 syscall=211 success=yes exit=20404 a0=3 a1=ffffed8a31f0 a2=0 a3=ffff98bb2fa8 items=0 ppid=2103 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:30.892000 audit[2433]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20404 a0=3 a1=ffffed8a31f0 a2=0 a3=ffff98bb2fa8 items=0 ppid=2103 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:30.892000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:16:30.903127 kernel: audit: type=1327 audit(1712945790.892:709): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:16:30.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.921033 kernel: audit: type=1400 audit(1712945790.914:710): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.921092 kernel: audit: type=1400 audit(1712945790.914:711): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.921138 kernel: audit: type=1400 audit(1712945790.914:712): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.925608 kernel: audit: type=1400 audit(1712945790.914:713): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.925679 kernel: audit: type=1400 audit(1712945790.914:714): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.925979 systemd-resolved[1053]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:16:30.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.930922 kernel: audit: type=1400 audit(1712945790.914:715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.930987 kernel: audit: type=1400 audit(1712945790.914:716): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.914000 audit: BPF prog-id=91 op=LOAD Apr 12 18:16:30.915000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.915000 audit[2419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2409 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:30.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737396137343165636636376432643161653833643835303965306566 Apr 12 18:16:30.915000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.915000 audit[2419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2409 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:30.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737396137343165636636376432643161653833643835303965306566 Apr 12 18:16:30.915000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.915000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.915000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.915000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.915000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.915000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.915000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.915000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.915000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.915000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.915000 audit: BPF prog-id=92 op=LOAD Apr 12 18:16:30.915000 audit[2419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2409 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:30.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737396137343165636636376432643161653833643835303965306566 Apr 12 18:16:30.917000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.917000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.917000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.917000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.917000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.917000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.917000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.917000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.917000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.917000 audit: BPF prog-id=93 op=LOAD Apr 12 18:16:30.917000 audit[2419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2409 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:30.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737396137343165636636376432643161653833643835303965306566 Apr 12 18:16:30.919000 audit: BPF prog-id=93 op=UNLOAD Apr 12 18:16:30.919000 audit: BPF prog-id=92 op=UNLOAD Apr 12 18:16:30.919000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.919000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.919000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.919000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.919000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.919000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.919000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.919000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.919000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.919000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:30.919000 audit: BPF prog-id=94 op=LOAD Apr 12 18:16:30.919000 audit[2419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2409 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:30.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737396137343165636636376432643161653833643835303965306566 Apr 12 18:16:30.939897 env[1109]: time="2024-04-12T18:16:30.939859369Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hnrzv,Uid:e4821455-7030-483e-97c9-fca02f2e6327,Namespace:calico-system,Attempt:1,} returns sandbox id \"779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560\"" Apr 12 18:16:30.941288 env[1109]: time="2024-04-12T18:16:30.941262609Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:16:31.489528 kubelet[1408]: E0412 18:16:31.489482 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:31.930612 env[1109]: time="2024-04-12T18:16:31.930506306Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:31.932339 env[1109]: time="2024-04-12T18:16:31.932312291Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:31.933750 env[1109]: time="2024-04-12T18:16:31.933724159Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:31.935155 env[1109]: time="2024-04-12T18:16:31.934990549Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:31.935311 env[1109]: time="2024-04-12T18:16:31.935284187Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db\"" Apr 12 18:16:31.937371 env[1109]: time="2024-04-12T18:16:31.937329810Z" level=info msg="CreateContainer within sandbox \"779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:16:31.947597 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3990027660.mount: Deactivated successfully. Apr 12 18:16:31.951682 env[1109]: time="2024-04-12T18:16:31.951640293Z" level=info msg="CreateContainer within sandbox \"779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"aea9e3250c68d8d6a94b6750e08cd0f49e931140b989ce2dbe34282f67915a56\"" Apr 12 18:16:31.952238 env[1109]: time="2024-04-12T18:16:31.952212608Z" level=info msg="StartContainer for \"aea9e3250c68d8d6a94b6750e08cd0f49e931140b989ce2dbe34282f67915a56\"" Apr 12 18:16:31.970212 systemd[1]: Started cri-containerd-aea9e3250c68d8d6a94b6750e08cd0f49e931140b989ce2dbe34282f67915a56.scope. Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2409 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:31.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165613965333235306336386438643661393462363735306530386364 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit: BPF prog-id=95 op=LOAD Apr 12 18:16:31.992000 audit[2458]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2409 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:31.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165613965333235306336386438643661393462363735306530386364 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit: BPF prog-id=96 op=LOAD Apr 12 18:16:31.992000 audit[2458]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2409 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:31.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165613965333235306336386438643661393462363735306530386364 Apr 12 18:16:31.992000 audit: BPF prog-id=96 op=UNLOAD Apr 12 18:16:31.992000 audit: BPF prog-id=95 op=UNLOAD Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:31.992000 audit: BPF prog-id=97 op=LOAD Apr 12 18:16:31.992000 audit[2458]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2409 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:31.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165613965333235306336386438643661393462363735306530386364 Apr 12 18:16:32.005159 env[1109]: time="2024-04-12T18:16:32.005116378Z" level=info msg="StartContainer for \"aea9e3250c68d8d6a94b6750e08cd0f49e931140b989ce2dbe34282f67915a56\" returns successfully" Apr 12 18:16:32.006292 env[1109]: time="2024-04-12T18:16:32.006269249Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:16:32.123507 systemd-networkd[1009]: cali03578fec7c0: Gained IPv6LL Apr 12 18:16:32.490484 kubelet[1408]: E0412 18:16:32.490433 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:32.945750 systemd[1]: run-containerd-runc-k8s.io-aea9e3250c68d8d6a94b6750e08cd0f49e931140b989ce2dbe34282f67915a56-runc.OaFXc7.mount: Deactivated successfully. Apr 12 18:16:32.953402 env[1109]: time="2024-04-12T18:16:32.952697164Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:32.954495 env[1109]: time="2024-04-12T18:16:32.954427951Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:32.956072 env[1109]: time="2024-04-12T18:16:32.956041618Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:32.957141 env[1109]: time="2024-04-12T18:16:32.957075731Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:32.957471 env[1109]: time="2024-04-12T18:16:32.957443768Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146\"" Apr 12 18:16:32.959405 env[1109]: time="2024-04-12T18:16:32.959375953Z" level=info msg="CreateContainer within sandbox \"779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:16:32.973567 env[1109]: time="2024-04-12T18:16:32.973526845Z" level=info msg="CreateContainer within sandbox \"779a741ecf67d2d1ae83d8509e0ef3d62a148c7c5d99406ef2e009add795d560\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"5737271bcd05291f7672cda6dc96404ed1d4b87fcbd9403686b8d638fe59fe48\"" Apr 12 18:16:32.974110 env[1109]: time="2024-04-12T18:16:32.974066720Z" level=info msg="StartContainer for \"5737271bcd05291f7672cda6dc96404ed1d4b87fcbd9403686b8d638fe59fe48\"" Apr 12 18:16:32.993564 systemd[1]: Started cri-containerd-5737271bcd05291f7672cda6dc96404ed1d4b87fcbd9403686b8d638fe59fe48.scope. Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2409 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:33.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333732373162636430353239316637363732636461366463393634 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit: BPF prog-id=98 op=LOAD Apr 12 18:16:33.016000 audit[2500]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2409 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:33.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333732373162636430353239316637363732636461366463393634 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit: BPF prog-id=99 op=LOAD Apr 12 18:16:33.016000 audit[2500]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2409 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:33.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333732373162636430353239316637363732636461366463393634 Apr 12 18:16:33.016000 audit: BPF prog-id=99 op=UNLOAD Apr 12 18:16:33.016000 audit: BPF prog-id=98 op=UNLOAD Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:33.016000 audit: BPF prog-id=100 op=LOAD Apr 12 18:16:33.016000 audit[2500]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2409 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:33.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333732373162636430353239316637363732636461366463393634 Apr 12 18:16:33.031520 env[1109]: time="2024-04-12T18:16:33.031468295Z" level=info msg="StartContainer for \"5737271bcd05291f7672cda6dc96404ed1d4b87fcbd9403686b8d638fe59fe48\" returns successfully" Apr 12 18:16:33.491026 kubelet[1408]: E0412 18:16:33.490982 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:33.548834 kubelet[1408]: I0412 18:16:33.548813 1408 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:16:33.548834 kubelet[1408]: I0412 18:16:33.548840 1408 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:16:33.647754 kubelet[1408]: I0412 18:16:33.647592 1408 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-hnrzv" podStartSLOduration=24.630906797 podCreationTimestamp="2024-04-12 18:16:07 +0000 UTC" firstStartedPulling="2024-04-12 18:16:30.941037169 +0000 UTC m=+26.127953241" lastFinishedPulling="2024-04-12 18:16:32.957689726 +0000 UTC m=+28.144605798" observedRunningTime="2024-04-12 18:16:33.647102037 +0000 UTC m=+28.834018149" watchObservedRunningTime="2024-04-12 18:16:33.647559354 +0000 UTC m=+28.834475466" Apr 12 18:16:34.492025 kubelet[1408]: E0412 18:16:34.491976 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:34.572598 env[1109]: time="2024-04-12T18:16:34.572565371Z" level=info msg="StopPodSandbox for \"edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717\"" Apr 12 18:16:34.654669 env[1109]: 2024-04-12 18:16:34.616 [INFO][2553] k8s.go 585: Cleaning up netns ContainerID="edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717" Apr 12 18:16:34.654669 env[1109]: 2024-04-12 18:16:34.616 [INFO][2553] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717" iface="eth0" netns="/var/run/netns/cni-79b4ead0-c8dc-e0d9-a006-fdd70d8d5a31" Apr 12 18:16:34.654669 env[1109]: 2024-04-12 18:16:34.616 [INFO][2553] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717" iface="eth0" netns="/var/run/netns/cni-79b4ead0-c8dc-e0d9-a006-fdd70d8d5a31" Apr 12 18:16:34.654669 env[1109]: 2024-04-12 18:16:34.616 [INFO][2553] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717" iface="eth0" netns="/var/run/netns/cni-79b4ead0-c8dc-e0d9-a006-fdd70d8d5a31" Apr 12 18:16:34.654669 env[1109]: 2024-04-12 18:16:34.616 [INFO][2553] k8s.go 592: Releasing IP address(es) ContainerID="edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717" Apr 12 18:16:34.654669 env[1109]: 2024-04-12 18:16:34.616 [INFO][2553] utils.go 188: Calico CNI releasing IP address ContainerID="edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717" Apr 12 18:16:34.654669 env[1109]: 2024-04-12 18:16:34.639 [INFO][2561] ipam_plugin.go 415: Releasing address using handleID ContainerID="edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717" HandleID="k8s-pod-network.edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717" Workload="10.0.0.15-k8s-nginx--deployment--845c78c8b9--vcxgk-eth0" Apr 12 18:16:34.654669 env[1109]: 2024-04-12 18:16:34.639 [INFO][2561] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:34.654669 env[1109]: 2024-04-12 18:16:34.639 [INFO][2561] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:34.654669 env[1109]: 2024-04-12 18:16:34.650 [WARNING][2561] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717" HandleID="k8s-pod-network.edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717" Workload="10.0.0.15-k8s-nginx--deployment--845c78c8b9--vcxgk-eth0" Apr 12 18:16:34.654669 env[1109]: 2024-04-12 18:16:34.650 [INFO][2561] ipam_plugin.go 443: Releasing address using workloadID ContainerID="edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717" HandleID="k8s-pod-network.edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717" Workload="10.0.0.15-k8s-nginx--deployment--845c78c8b9--vcxgk-eth0" Apr 12 18:16:34.654669 env[1109]: 2024-04-12 18:16:34.652 [INFO][2561] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:34.654669 env[1109]: 2024-04-12 18:16:34.653 [INFO][2553] k8s.go 598: Teardown processing complete. ContainerID="edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717" Apr 12 18:16:34.655059 env[1109]: time="2024-04-12T18:16:34.654825417Z" level=info msg="TearDown network for sandbox \"edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717\" successfully" Apr 12 18:16:34.655059 env[1109]: time="2024-04-12T18:16:34.654858857Z" level=info msg="StopPodSandbox for \"edf636d78e815170074f8785c8a54a2bd2cc898f23581fd131ba58a39c960717\" returns successfully" Apr 12 18:16:34.656026 systemd[1]: run-netns-cni\x2d79b4ead0\x2dc8dc\x2de0d9\x2da006\x2dfdd70d8d5a31.mount: Deactivated successfully. Apr 12 18:16:34.657622 env[1109]: time="2024-04-12T18:16:34.657592959Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-vcxgk,Uid:1781d77f-37b3-4c0b-b2fe-99627f034f29,Namespace:default,Attempt:1,}" Apr 12 18:16:34.767720 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:16:34.767857 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9b07d911c01: link becomes ready Apr 12 18:16:34.768551 systemd-networkd[1009]: cali9b07d911c01: Link UP Apr 12 18:16:34.768753 systemd-networkd[1009]: cali9b07d911c01: Gained carrier Apr 12 18:16:34.777082 env[1109]: 2024-04-12 18:16:34.706 [INFO][2569] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.15-k8s-nginx--deployment--845c78c8b9--vcxgk-eth0 nginx-deployment-845c78c8b9- default 1781d77f-37b3-4c0b-b2fe-99627f034f29 932 0 2024-04-12 18:16:18 +0000 UTC map[app:nginx pod-template-hash:845c78c8b9 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.15 nginx-deployment-845c78c8b9-vcxgk eth0 default [] [] [kns.default ksa.default.default] cali9b07d911c01 [] []}} ContainerID="717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96" Namespace="default" Pod="nginx-deployment-845c78c8b9-vcxgk" WorkloadEndpoint="10.0.0.15-k8s-nginx--deployment--845c78c8b9--vcxgk-" Apr 12 18:16:34.777082 env[1109]: 2024-04-12 18:16:34.706 [INFO][2569] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96" Namespace="default" Pod="nginx-deployment-845c78c8b9-vcxgk" WorkloadEndpoint="10.0.0.15-k8s-nginx--deployment--845c78c8b9--vcxgk-eth0" Apr 12 18:16:34.777082 env[1109]: 2024-04-12 18:16:34.729 [INFO][2583] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96" HandleID="k8s-pod-network.717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96" Workload="10.0.0.15-k8s-nginx--deployment--845c78c8b9--vcxgk-eth0" Apr 12 18:16:34.777082 env[1109]: 2024-04-12 18:16:34.740 [INFO][2583] ipam_plugin.go 268: Auto assigning IP ContainerID="717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96" HandleID="k8s-pod-network.717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96" Workload="10.0.0.15-k8s-nginx--deployment--845c78c8b9--vcxgk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002ea970), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.15", "pod":"nginx-deployment-845c78c8b9-vcxgk", "timestamp":"2024-04-12 18:16:34.729091278 +0000 UTC"}, Hostname:"10.0.0.15", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:16:34.777082 env[1109]: 2024-04-12 18:16:34.740 [INFO][2583] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:34.777082 env[1109]: 2024-04-12 18:16:34.740 [INFO][2583] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:34.777082 env[1109]: 2024-04-12 18:16:34.741 [INFO][2583] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.15' Apr 12 18:16:34.777082 env[1109]: 2024-04-12 18:16:34.742 [INFO][2583] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96" host="10.0.0.15" Apr 12 18:16:34.777082 env[1109]: 2024-04-12 18:16:34.746 [INFO][2583] ipam.go 372: Looking up existing affinities for host host="10.0.0.15" Apr 12 18:16:34.777082 env[1109]: 2024-04-12 18:16:34.750 [INFO][2583] ipam.go 489: Trying affinity for 192.168.73.128/26 host="10.0.0.15" Apr 12 18:16:34.777082 env[1109]: 2024-04-12 18:16:34.751 [INFO][2583] ipam.go 155: Attempting to load block cidr=192.168.73.128/26 host="10.0.0.15" Apr 12 18:16:34.777082 env[1109]: 2024-04-12 18:16:34.753 [INFO][2583] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.73.128/26 host="10.0.0.15" Apr 12 18:16:34.777082 env[1109]: 2024-04-12 18:16:34.753 [INFO][2583] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.73.128/26 handle="k8s-pod-network.717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96" host="10.0.0.15" Apr 12 18:16:34.777082 env[1109]: 2024-04-12 18:16:34.755 [INFO][2583] ipam.go 1682: Creating new handle: k8s-pod-network.717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96 Apr 12 18:16:34.777082 env[1109]: 2024-04-12 18:16:34.757 [INFO][2583] ipam.go 1203: Writing block in order to claim IPs block=192.168.73.128/26 handle="k8s-pod-network.717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96" host="10.0.0.15" Apr 12 18:16:34.777082 env[1109]: 2024-04-12 18:16:34.761 [INFO][2583] ipam.go 1216: Successfully claimed IPs: [192.168.73.130/26] block=192.168.73.128/26 handle="k8s-pod-network.717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96" host="10.0.0.15" Apr 12 18:16:34.777082 env[1109]: 2024-04-12 18:16:34.761 [INFO][2583] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.73.130/26] handle="k8s-pod-network.717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96" host="10.0.0.15" Apr 12 18:16:34.777082 env[1109]: 2024-04-12 18:16:34.761 [INFO][2583] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:34.777082 env[1109]: 2024-04-12 18:16:34.762 [INFO][2583] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.73.130/26] IPv6=[] ContainerID="717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96" HandleID="k8s-pod-network.717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96" Workload="10.0.0.15-k8s-nginx--deployment--845c78c8b9--vcxgk-eth0" Apr 12 18:16:34.777613 env[1109]: 2024-04-12 18:16:34.763 [INFO][2569] k8s.go 385: Populated endpoint ContainerID="717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96" Namespace="default" Pod="nginx-deployment-845c78c8b9-vcxgk" WorkloadEndpoint="10.0.0.15-k8s-nginx--deployment--845c78c8b9--vcxgk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15-k8s-nginx--deployment--845c78c8b9--vcxgk-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"1781d77f-37b3-4c0b-b2fe-99627f034f29", ResourceVersion:"932", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 16, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.15", ContainerID:"", Pod:"nginx-deployment-845c78c8b9-vcxgk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.73.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9b07d911c01", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:34.777613 env[1109]: 2024-04-12 18:16:34.763 [INFO][2569] k8s.go 386: Calico CNI using IPs: [192.168.73.130/32] ContainerID="717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96" Namespace="default" Pod="nginx-deployment-845c78c8b9-vcxgk" WorkloadEndpoint="10.0.0.15-k8s-nginx--deployment--845c78c8b9--vcxgk-eth0" Apr 12 18:16:34.777613 env[1109]: 2024-04-12 18:16:34.763 [INFO][2569] dataplane_linux.go 68: Setting the host side veth name to cali9b07d911c01 ContainerID="717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96" Namespace="default" Pod="nginx-deployment-845c78c8b9-vcxgk" WorkloadEndpoint="10.0.0.15-k8s-nginx--deployment--845c78c8b9--vcxgk-eth0" Apr 12 18:16:34.777613 env[1109]: 2024-04-12 18:16:34.769 [INFO][2569] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96" Namespace="default" Pod="nginx-deployment-845c78c8b9-vcxgk" WorkloadEndpoint="10.0.0.15-k8s-nginx--deployment--845c78c8b9--vcxgk-eth0" Apr 12 18:16:34.777613 env[1109]: 2024-04-12 18:16:34.770 [INFO][2569] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96" Namespace="default" Pod="nginx-deployment-845c78c8b9-vcxgk" WorkloadEndpoint="10.0.0.15-k8s-nginx--deployment--845c78c8b9--vcxgk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15-k8s-nginx--deployment--845c78c8b9--vcxgk-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"1781d77f-37b3-4c0b-b2fe-99627f034f29", ResourceVersion:"932", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 16, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.15", ContainerID:"717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96", Pod:"nginx-deployment-845c78c8b9-vcxgk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.73.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9b07d911c01", MAC:"6a:e3:3b:34:61:c0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:34.777613 env[1109]: 2024-04-12 18:16:34.775 [INFO][2569] k8s.go 498: Wrote updated endpoint to datastore ContainerID="717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96" Namespace="default" Pod="nginx-deployment-845c78c8b9-vcxgk" WorkloadEndpoint="10.0.0.15-k8s-nginx--deployment--845c78c8b9--vcxgk-eth0" Apr 12 18:16:34.789000 audit[2615]: NETFILTER_CFG table=filter:80 family=2 entries=40 op=nft_register_chain pid=2615 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:16:34.789000 audit[2615]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21560 a0=3 a1=ffffeb38e6a0 a2=0 a3=ffffb96cdfa8 items=0 ppid=2103 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:34.789000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:16:34.792637 env[1109]: time="2024-04-12T18:16:34.792565571Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:16:34.792637 env[1109]: time="2024-04-12T18:16:34.792614610Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:16:34.792637 env[1109]: time="2024-04-12T18:16:34.792625490Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:16:34.792871 env[1109]: time="2024-04-12T18:16:34.792816649Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96 pid=2620 runtime=io.containerd.runc.v2 Apr 12 18:16:34.805695 systemd[1]: Started cri-containerd-717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96.scope. Apr 12 18:16:34.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.834000 audit: BPF prog-id=101 op=LOAD Apr 12 18:16:34.834000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.834000 audit[2629]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2620 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:34.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731376234376665393134356366346131383731626136373064653836 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2620 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:34.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731376234376665393134356366346131383731626136373064653836 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit: BPF prog-id=102 op=LOAD Apr 12 18:16:34.835000 audit[2629]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2620 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:34.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731376234376665393134356366346131383731626136373064653836 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit: BPF prog-id=103 op=LOAD Apr 12 18:16:34.835000 audit[2629]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2620 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:34.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731376234376665393134356366346131383731626136373064653836 Apr 12 18:16:34.835000 audit: BPF prog-id=103 op=UNLOAD Apr 12 18:16:34.835000 audit: BPF prog-id=102 op=UNLOAD Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:34.835000 audit: BPF prog-id=104 op=LOAD Apr 12 18:16:34.835000 audit[2629]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2620 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:34.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731376234376665393134356366346131383731626136373064653836 Apr 12 18:16:34.837243 systemd-resolved[1053]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:16:34.853393 env[1109]: time="2024-04-12T18:16:34.853339082Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-vcxgk,Uid:1781d77f-37b3-4c0b-b2fe-99627f034f29,Namespace:default,Attempt:1,} returns sandbox id \"717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96\"" Apr 12 18:16:34.855077 env[1109]: time="2024-04-12T18:16:34.855046750Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 18:16:35.492565 kubelet[1408]: E0412 18:16:35.492512 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:36.027562 systemd-networkd[1009]: cali9b07d911c01: Gained IPv6LL Apr 12 18:16:36.492796 kubelet[1408]: E0412 18:16:36.492737 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:37.032059 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2557822213.mount: Deactivated successfully. Apr 12 18:16:37.493222 kubelet[1408]: E0412 18:16:37.493182 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:37.910549 env[1109]: time="2024-04-12T18:16:37.910443784Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:37.911711 env[1109]: time="2024-04-12T18:16:37.911679817Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:37.913327 env[1109]: time="2024-04-12T18:16:37.913289328Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:37.915053 env[1109]: time="2024-04-12T18:16:37.915026919Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:37.915647 env[1109]: time="2024-04-12T18:16:37.915616195Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56\"" Apr 12 18:16:37.917264 env[1109]: time="2024-04-12T18:16:37.917234986Z" level=info msg="CreateContainer within sandbox \"717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Apr 12 18:16:37.931601 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2025750531.mount: Deactivated successfully. Apr 12 18:16:37.935901 env[1109]: time="2024-04-12T18:16:37.935857723Z" level=info msg="CreateContainer within sandbox \"717b47fe9145cf4a1871ba670de86bd03ad6dc8dd651b2528854c581861adc96\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"f5969558e5c43ed25e78da925ce38e775c25f3ef43112385b69fd5ed85e8b3b6\"" Apr 12 18:16:37.936280 env[1109]: time="2024-04-12T18:16:37.936245721Z" level=info msg="StartContainer for \"f5969558e5c43ed25e78da925ce38e775c25f3ef43112385b69fd5ed85e8b3b6\"" Apr 12 18:16:37.951759 systemd[1]: Started cri-containerd-f5969558e5c43ed25e78da925ce38e775c25f3ef43112385b69fd5ed85e8b3b6.scope. Apr 12 18:16:37.978798 kernel: kauditd_printk_skb: 196 callbacks suppressed Apr 12 18:16:37.978909 kernel: audit: type=1400 audit(1712945797.976:759): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.983248 kernel: audit: type=1400 audit(1712945797.976:760): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.983305 kernel: audit: type=1400 audit(1712945797.976:761): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.987872 kernel: audit: type=1400 audit(1712945797.976:762): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.987920 kernel: audit: type=1400 audit(1712945797.976:763): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.990187 kernel: audit: type=1400 audit(1712945797.976:764): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.994801 kernel: audit: type=1400 audit(1712945797.976:765): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.994873 kernel: audit: type=1400 audit(1712945797.976:766): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.999353 kernel: audit: type=1400 audit(1712945797.976:767): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:38.001757 kernel: audit: type=1400 audit(1712945797.978:768): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.978000 audit: BPF prog-id=105 op=LOAD Apr 12 18:16:37.981000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.981000 audit[2664]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2620 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:37.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635393639353538653563343365643235653738646139323563653338 Apr 12 18:16:37.981000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.981000 audit[2664]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2620 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:37.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635393639353538653563343365643235653738646139323563653338 Apr 12 18:16:37.981000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.981000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.981000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.981000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.981000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.981000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.981000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.981000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.981000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.981000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.981000 audit: BPF prog-id=106 op=LOAD Apr 12 18:16:37.981000 audit[2664]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2620 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:37.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635393639353538653563343365643235653738646139323563653338 Apr 12 18:16:37.981000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.981000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.981000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.981000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.981000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.981000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.981000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.981000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.981000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.981000 audit: BPF prog-id=107 op=LOAD Apr 12 18:16:37.981000 audit[2664]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2620 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:37.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635393639353538653563343365643235653738646139323563653338 Apr 12 18:16:37.985000 audit: BPF prog-id=107 op=UNLOAD Apr 12 18:16:37.985000 audit: BPF prog-id=106 op=UNLOAD Apr 12 18:16:37.985000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.985000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.985000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.985000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.985000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.985000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.985000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.985000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.985000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.985000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:37.985000 audit: BPF prog-id=108 op=LOAD Apr 12 18:16:37.985000 audit[2664]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2620 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:37.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635393639353538653563343365643235653738646139323563653338 Apr 12 18:16:38.010441 env[1109]: time="2024-04-12T18:16:38.010400033Z" level=info msg="StartContainer for \"f5969558e5c43ed25e78da925ce38e775c25f3ef43112385b69fd5ed85e8b3b6\" returns successfully" Apr 12 18:16:38.493827 kubelet[1408]: E0412 18:16:38.493780 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:38.661788 kubelet[1408]: I0412 18:16:38.661722 1408 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-845c78c8b9-vcxgk" podStartSLOduration=17.600385008 podCreationTimestamp="2024-04-12 18:16:18 +0000 UTC" firstStartedPulling="2024-04-12 18:16:34.854546954 +0000 UTC m=+30.041463066" lastFinishedPulling="2024-04-12 18:16:37.915832674 +0000 UTC m=+33.102748786" observedRunningTime="2024-04-12 18:16:38.658079626 +0000 UTC m=+33.844995738" watchObservedRunningTime="2024-04-12 18:16:38.661670728 +0000 UTC m=+33.848586840" Apr 12 18:16:39.494753 kubelet[1408]: E0412 18:16:39.494697 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:40.495459 kubelet[1408]: E0412 18:16:40.495416 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:41.162000 audit[2718]: NETFILTER_CFG table=filter:81 family=2 entries=20 op=nft_register_rule pid=2718 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:41.162000 audit[2718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffc369f0a0 a2=0 a3=1 items=0 ppid=1563 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:41.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:41.163000 audit[2718]: NETFILTER_CFG table=nat:82 family=2 entries=20 op=nft_register_rule pid=2718 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:41.163000 audit[2718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc369f0a0 a2=0 a3=1 items=0 ppid=1563 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:41.163000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:41.176000 audit[2720]: NETFILTER_CFG table=filter:83 family=2 entries=32 op=nft_register_rule pid=2720 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:41.176000 audit[2720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffed8b07d0 a2=0 a3=1 items=0 ppid=1563 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:41.176000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:41.194572 kubelet[1408]: I0412 18:16:41.194117 1408 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:16:41.181000 audit[2720]: NETFILTER_CFG table=nat:84 family=2 entries=20 op=nft_register_rule pid=2720 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:41.181000 audit[2720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffed8b07d0 a2=0 a3=1 items=0 ppid=1563 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:41.181000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:41.202912 systemd[1]: Created slice kubepods-besteffort-podfea4e60e_4805_4075_a7fc_134f3f803291.slice. Apr 12 18:16:41.361526 kubelet[1408]: I0412 18:16:41.361481 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/fea4e60e-4805-4075-a7fc-134f3f803291-data\") pod \"nfs-server-provisioner-0\" (UID: \"fea4e60e-4805-4075-a7fc-134f3f803291\") " pod="default/nfs-server-provisioner-0" Apr 12 18:16:41.361526 kubelet[1408]: I0412 18:16:41.361530 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wth6n\" (UniqueName: \"kubernetes.io/projected/fea4e60e-4805-4075-a7fc-134f3f803291-kube-api-access-wth6n\") pod \"nfs-server-provisioner-0\" (UID: \"fea4e60e-4805-4075-a7fc-134f3f803291\") " pod="default/nfs-server-provisioner-0" Apr 12 18:16:41.495764 kubelet[1408]: E0412 18:16:41.495681 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:41.506702 env[1109]: time="2024-04-12T18:16:41.506613157Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:fea4e60e-4805-4075-a7fc-134f3f803291,Namespace:default,Attempt:0,}" Apr 12 18:16:41.647907 systemd-networkd[1009]: cali60e51b789ff: Link UP Apr 12 18:16:41.649208 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:16:41.649261 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Apr 12 18:16:41.652571 systemd-networkd[1009]: cali60e51b789ff: Gained carrier Apr 12 18:16:41.669437 env[1109]: 2024-04-12 18:16:41.562 [INFO][2723] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.15-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default fea4e60e-4805-4075-a7fc-134f3f803291 976 0 2024-04-12 18:16:41 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.15 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.15-k8s-nfs--server--provisioner--0-" Apr 12 18:16:41.669437 env[1109]: 2024-04-12 18:16:41.562 [INFO][2723] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.15-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:16:41.669437 env[1109]: 2024-04-12 18:16:41.598 [INFO][2736] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076" HandleID="k8s-pod-network.645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076" Workload="10.0.0.15-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:16:41.669437 env[1109]: 2024-04-12 18:16:41.611 [INFO][2736] ipam_plugin.go 268: Auto assigning IP ContainerID="645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076" HandleID="k8s-pod-network.645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076" Workload="10.0.0.15-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40000b7d00), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.15", "pod":"nfs-server-provisioner-0", "timestamp":"2024-04-12 18:16:41.598334845 +0000 UTC"}, Hostname:"10.0.0.15", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:16:41.669437 env[1109]: 2024-04-12 18:16:41.611 [INFO][2736] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:41.669437 env[1109]: 2024-04-12 18:16:41.611 [INFO][2736] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:41.669437 env[1109]: 2024-04-12 18:16:41.611 [INFO][2736] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.15' Apr 12 18:16:41.669437 env[1109]: 2024-04-12 18:16:41.613 [INFO][2736] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076" host="10.0.0.15" Apr 12 18:16:41.669437 env[1109]: 2024-04-12 18:16:41.620 [INFO][2736] ipam.go 372: Looking up existing affinities for host host="10.0.0.15" Apr 12 18:16:41.669437 env[1109]: 2024-04-12 18:16:41.625 [INFO][2736] ipam.go 489: Trying affinity for 192.168.73.128/26 host="10.0.0.15" Apr 12 18:16:41.669437 env[1109]: 2024-04-12 18:16:41.627 [INFO][2736] ipam.go 155: Attempting to load block cidr=192.168.73.128/26 host="10.0.0.15" Apr 12 18:16:41.669437 env[1109]: 2024-04-12 18:16:41.630 [INFO][2736] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.73.128/26 host="10.0.0.15" Apr 12 18:16:41.669437 env[1109]: 2024-04-12 18:16:41.630 [INFO][2736] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.73.128/26 handle="k8s-pod-network.645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076" host="10.0.0.15" Apr 12 18:16:41.669437 env[1109]: 2024-04-12 18:16:41.632 [INFO][2736] ipam.go 1682: Creating new handle: k8s-pod-network.645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076 Apr 12 18:16:41.669437 env[1109]: 2024-04-12 18:16:41.636 [INFO][2736] ipam.go 1203: Writing block in order to claim IPs block=192.168.73.128/26 handle="k8s-pod-network.645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076" host="10.0.0.15" Apr 12 18:16:41.669437 env[1109]: 2024-04-12 18:16:41.643 [INFO][2736] ipam.go 1216: Successfully claimed IPs: [192.168.73.131/26] block=192.168.73.128/26 handle="k8s-pod-network.645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076" host="10.0.0.15" Apr 12 18:16:41.669437 env[1109]: 2024-04-12 18:16:41.643 [INFO][2736] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.73.131/26] handle="k8s-pod-network.645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076" host="10.0.0.15" Apr 12 18:16:41.669437 env[1109]: 2024-04-12 18:16:41.643 [INFO][2736] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:41.669437 env[1109]: 2024-04-12 18:16:41.643 [INFO][2736] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.73.131/26] IPv6=[] ContainerID="645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076" HandleID="k8s-pod-network.645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076" Workload="10.0.0.15-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:16:41.670864 env[1109]: 2024-04-12 18:16:41.645 [INFO][2723] k8s.go 385: Populated endpoint ContainerID="645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.15-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"fea4e60e-4805-4075-a7fc-134f3f803291", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 16, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.15", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.73.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:41.670864 env[1109]: 2024-04-12 18:16:41.645 [INFO][2723] k8s.go 386: Calico CNI using IPs: [192.168.73.131/32] ContainerID="645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.15-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:16:41.670864 env[1109]: 2024-04-12 18:16:41.645 [INFO][2723] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.15-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:16:41.670864 env[1109]: 2024-04-12 18:16:41.653 [INFO][2723] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.15-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:16:41.671017 env[1109]: 2024-04-12 18:16:41.653 [INFO][2723] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.15-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"fea4e60e-4805-4075-a7fc-134f3f803291", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 16, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.15", ContainerID:"645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.73.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"32:fb:c9:48:b4:ea", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:41.671017 env[1109]: 2024-04-12 18:16:41.661 [INFO][2723] k8s.go 498: Wrote updated endpoint to datastore ContainerID="645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.15-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:16:41.679000 audit[2760]: NETFILTER_CFG table=filter:85 family=2 entries=38 op=nft_register_chain pid=2760 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:16:41.679000 audit[2760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19820 a0=3 a1=fffffa412850 a2=0 a3=ffffba633fa8 items=0 ppid=2103 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:41.679000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:16:41.686754 env[1109]: time="2024-04-12T18:16:41.686685426Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:16:41.686894 env[1109]: time="2024-04-12T18:16:41.686732706Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:16:41.686894 env[1109]: time="2024-04-12T18:16:41.686743186Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:16:41.686982 env[1109]: time="2024-04-12T18:16:41.686877225Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076 pid=2769 runtime=io.containerd.runc.v2 Apr 12 18:16:41.700249 systemd[1]: Started cri-containerd-645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076.scope. Apr 12 18:16:41.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.740000 audit: BPF prog-id=109 op=LOAD Apr 12 18:16:41.740000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.740000 audit[2778]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2769 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:41.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634356465336664376533303031373638336130636665363131653139 Apr 12 18:16:41.740000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.740000 audit[2778]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2769 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:41.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634356465336664376533303031373638336130636665363131653139 Apr 12 18:16:41.740000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.740000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.740000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.740000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.740000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.740000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.740000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.740000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.740000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.740000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.740000 audit: BPF prog-id=110 op=LOAD Apr 12 18:16:41.740000 audit[2778]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2769 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:41.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634356465336664376533303031373638336130636665363131653139 Apr 12 18:16:41.745000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.745000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.745000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.745000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.745000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.745000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.745000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.745000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.745000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.745000 audit: BPF prog-id=111 op=LOAD Apr 12 18:16:41.745000 audit[2778]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2769 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:41.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634356465336664376533303031373638336130636665363131653139 Apr 12 18:16:41.746000 audit: BPF prog-id=111 op=UNLOAD Apr 12 18:16:41.746000 audit: BPF prog-id=110 op=UNLOAD Apr 12 18:16:41.746000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.746000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.746000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.746000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.746000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.746000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.746000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.746000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.746000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.746000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:41.746000 audit: BPF prog-id=112 op=LOAD Apr 12 18:16:41.746000 audit[2778]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2769 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:41.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634356465336664376533303031373638336130636665363131653139 Apr 12 18:16:41.748531 systemd-resolved[1053]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:16:41.767754 env[1109]: time="2024-04-12T18:16:41.767706279Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:fea4e60e-4805-4075-a7fc-134f3f803291,Namespace:default,Attempt:0,} returns sandbox id \"645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076\"" Apr 12 18:16:41.769507 env[1109]: time="2024-04-12T18:16:41.769465312Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Apr 12 18:16:42.496194 kubelet[1408]: E0412 18:16:42.496147 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:43.195603 systemd-networkd[1009]: cali60e51b789ff: Gained IPv6LL Apr 12 18:16:43.496708 kubelet[1408]: E0412 18:16:43.496666 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:43.533784 update_engine[1099]: I0412 18:16:43.533735 1099 update_attempter.cc:509] Updating boot flags... Apr 12 18:16:43.872209 kubelet[1408]: E0412 18:16:43.872116 1408 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:44.497553 kubelet[1408]: E0412 18:16:44.497495 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:44.518199 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount564434451.mount: Deactivated successfully. Apr 12 18:16:45.472495 kubelet[1408]: E0412 18:16:45.472443 1408 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:45.497823 kubelet[1408]: E0412 18:16:45.497766 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:45.989000 audit[2847]: NETFILTER_CFG table=filter:86 family=2 entries=33 op=nft_register_rule pid=2847 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:45.991872 kernel: kauditd_printk_skb: 119 callbacks suppressed Apr 12 18:16:45.992328 kernel: audit: type=1325 audit(1712945805.989:800): table=filter:86 family=2 entries=33 op=nft_register_rule pid=2847 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:45.989000 audit[2847]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=ffffc63dc200 a2=0 a3=1 items=0 ppid=1563 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:45.997706 kernel: audit: type=1300 audit(1712945805.989:800): arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=ffffc63dc200 a2=0 a3=1 items=0 ppid=1563 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:45.997838 kernel: audit: type=1327 audit(1712945805.989:800): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:45.989000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:46.001583 kubelet[1408]: I0412 18:16:46.001551 1408 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:16:46.006566 systemd[1]: Created slice kubepods-besteffort-pod49c5253f_3a53_44cc_840b_c660a6eb580f.slice. Apr 12 18:16:46.005000 audit[2847]: NETFILTER_CFG table=nat:87 family=2 entries=20 op=nft_register_rule pid=2847 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:46.005000 audit[2847]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc63dc200 a2=0 a3=1 items=0 ppid=1563 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.013577 kernel: audit: type=1325 audit(1712945806.005:801): table=nat:87 family=2 entries=20 op=nft_register_rule pid=2847 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:46.013745 kernel: audit: type=1300 audit(1712945806.005:801): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc63dc200 a2=0 a3=1 items=0 ppid=1563 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.013773 kernel: audit: type=1327 audit(1712945806.005:801): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:46.005000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:46.013000 audit[2849]: NETFILTER_CFG table=filter:88 family=2 entries=34 op=nft_register_rule pid=2849 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:46.013000 audit[2849]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=ffffd78f4070 a2=0 a3=1 items=0 ppid=1563 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.023517 kernel: audit: type=1325 audit(1712945806.013:802): table=filter:88 family=2 entries=34 op=nft_register_rule pid=2849 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:46.023647 kernel: audit: type=1300 audit(1712945806.013:802): arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=ffffd78f4070 a2=0 a3=1 items=0 ppid=1563 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.023677 kernel: audit: type=1327 audit(1712945806.013:802): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:46.013000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:46.016000 audit[2849]: NETFILTER_CFG table=nat:89 family=2 entries=20 op=nft_register_rule pid=2849 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:46.016000 audit[2849]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd78f4070 a2=0 a3=1 items=0 ppid=1563 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.016000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:46.035452 kernel: audit: type=1325 audit(1712945806.016:803): table=nat:89 family=2 entries=20 op=nft_register_rule pid=2849 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:46.190382 kubelet[1408]: I0412 18:16:46.190243 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-htffd\" (UniqueName: \"kubernetes.io/projected/49c5253f-3a53-44cc-840b-c660a6eb580f-kube-api-access-htffd\") pod \"calico-apiserver-7844cc77cc-vr2qj\" (UID: \"49c5253f-3a53-44cc-840b-c660a6eb580f\") " pod="calico-apiserver/calico-apiserver-7844cc77cc-vr2qj" Apr 12 18:16:46.190382 kubelet[1408]: I0412 18:16:46.190296 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/49c5253f-3a53-44cc-840b-c660a6eb580f-calico-apiserver-certs\") pod \"calico-apiserver-7844cc77cc-vr2qj\" (UID: \"49c5253f-3a53-44cc-840b-c660a6eb580f\") " pod="calico-apiserver/calico-apiserver-7844cc77cc-vr2qj" Apr 12 18:16:46.310835 env[1109]: time="2024-04-12T18:16:46.310100945Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7844cc77cc-vr2qj,Uid:49c5253f-3a53-44cc-840b-c660a6eb580f,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:16:46.445515 env[1109]: time="2024-04-12T18:16:46.445286086Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:46.451768 env[1109]: time="2024-04-12T18:16:46.451715346Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:46.454081 env[1109]: time="2024-04-12T18:16:46.454041178Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:46.455437 env[1109]: time="2024-04-12T18:16:46.455406574Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:46.456262 env[1109]: time="2024-04-12T18:16:46.456225452Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Apr 12 18:16:46.458626 env[1109]: time="2024-04-12T18:16:46.458577324Z" level=info msg="CreateContainer within sandbox \"645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Apr 12 18:16:46.474476 env[1109]: time="2024-04-12T18:16:46.474397275Z" level=info msg="CreateContainer within sandbox \"645de3fd7e30017683a0cfe611e19734d1bffbeab2bbb32f3c422aaf3bae5076\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"ac61d55c7f7779029a7e3227278e80efcd5ff110992ba6e51e845f375cb897cb\"" Apr 12 18:16:46.475397 env[1109]: time="2024-04-12T18:16:46.475340712Z" level=info msg="StartContainer for \"ac61d55c7f7779029a7e3227278e80efcd5ff110992ba6e51e845f375cb897cb\"" Apr 12 18:16:46.494415 systemd[1]: Started cri-containerd-ac61d55c7f7779029a7e3227278e80efcd5ff110992ba6e51e845f375cb897cb.scope. Apr 12 18:16:46.499413 kubelet[1408]: E0412 18:16:46.498487 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:46.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.547000 audit: BPF prog-id=113 op=LOAD Apr 12 18:16:46.550113 systemd-networkd[1009]: cali26de6cc61ae: Link UP Apr 12 18:16:46.548000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.548000 audit[2883]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2769 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363164353563376637373739303239613765333232373237386538 Apr 12 18:16:46.548000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.548000 audit[2883]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2769 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363164353563376637373739303239613765333232373237386538 Apr 12 18:16:46.548000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.548000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.552824 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:16:46.552857 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali26de6cc61ae: link becomes ready Apr 12 18:16:46.548000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.548000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.548000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.548000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.548000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.548000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.548000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.548000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.548000 audit: BPF prog-id=114 op=LOAD Apr 12 18:16:46.548000 audit[2883]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2769 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363164353563376637373739303239613765333232373237386538 Apr 12 18:16:46.549000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.549000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.549000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.549000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.549000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.549000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.549000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.549000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.549000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.549000 audit: BPF prog-id=115 op=LOAD Apr 12 18:16:46.549000 audit[2883]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2769 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363164353563376637373739303239613765333232373237386538 Apr 12 18:16:46.549000 audit: BPF prog-id=115 op=UNLOAD Apr 12 18:16:46.549000 audit: BPF prog-id=114 op=UNLOAD Apr 12 18:16:46.549000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.549000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.549000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.549000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.549000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.549000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.549000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.549000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.549000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.549000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.549000 audit: BPF prog-id=116 op=LOAD Apr 12 18:16:46.549000 audit[2883]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2769 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363164353563376637373739303239613765333232373237386538 Apr 12 18:16:46.553266 systemd-networkd[1009]: cali26de6cc61ae: Gained carrier Apr 12 18:16:46.572123 env[1109]: 2024-04-12 18:16:46.452 [INFO][2853] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.15-k8s-calico--apiserver--7844cc77cc--vr2qj-eth0 calico-apiserver-7844cc77cc- calico-apiserver 49c5253f-3a53-44cc-840b-c660a6eb580f 1042 0 2024-04-12 18:16:45 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7844cc77cc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 10.0.0.15 calico-apiserver-7844cc77cc-vr2qj eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali26de6cc61ae [] []}} ContainerID="7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007" Namespace="calico-apiserver" Pod="calico-apiserver-7844cc77cc-vr2qj" WorkloadEndpoint="10.0.0.15-k8s-calico--apiserver--7844cc77cc--vr2qj-" Apr 12 18:16:46.572123 env[1109]: 2024-04-12 18:16:46.452 [INFO][2853] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007" Namespace="calico-apiserver" Pod="calico-apiserver-7844cc77cc-vr2qj" WorkloadEndpoint="10.0.0.15-k8s-calico--apiserver--7844cc77cc--vr2qj-eth0" Apr 12 18:16:46.572123 env[1109]: 2024-04-12 18:16:46.482 [INFO][2866] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007" HandleID="k8s-pod-network.7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007" Workload="10.0.0.15-k8s-calico--apiserver--7844cc77cc--vr2qj-eth0" Apr 12 18:16:46.572123 env[1109]: 2024-04-12 18:16:46.500 [INFO][2866] ipam_plugin.go 268: Auto assigning IP ContainerID="7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007" HandleID="k8s-pod-network.7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007" Workload="10.0.0.15-k8s-calico--apiserver--7844cc77cc--vr2qj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002aae50), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"10.0.0.15", "pod":"calico-apiserver-7844cc77cc-vr2qj", "timestamp":"2024-04-12 18:16:46.482202371 +0000 UTC"}, Hostname:"10.0.0.15", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:16:46.572123 env[1109]: 2024-04-12 18:16:46.500 [INFO][2866] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:46.572123 env[1109]: 2024-04-12 18:16:46.500 [INFO][2866] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:46.572123 env[1109]: 2024-04-12 18:16:46.500 [INFO][2866] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.15' Apr 12 18:16:46.572123 env[1109]: 2024-04-12 18:16:46.503 [INFO][2866] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007" host="10.0.0.15" Apr 12 18:16:46.572123 env[1109]: 2024-04-12 18:16:46.513 [INFO][2866] ipam.go 372: Looking up existing affinities for host host="10.0.0.15" Apr 12 18:16:46.572123 env[1109]: 2024-04-12 18:16:46.519 [INFO][2866] ipam.go 489: Trying affinity for 192.168.73.128/26 host="10.0.0.15" Apr 12 18:16:46.572123 env[1109]: 2024-04-12 18:16:46.521 [INFO][2866] ipam.go 155: Attempting to load block cidr=192.168.73.128/26 host="10.0.0.15" Apr 12 18:16:46.572123 env[1109]: 2024-04-12 18:16:46.526 [INFO][2866] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.73.128/26 host="10.0.0.15" Apr 12 18:16:46.572123 env[1109]: 2024-04-12 18:16:46.526 [INFO][2866] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.73.128/26 handle="k8s-pod-network.7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007" host="10.0.0.15" Apr 12 18:16:46.572123 env[1109]: 2024-04-12 18:16:46.529 [INFO][2866] ipam.go 1682: Creating new handle: k8s-pod-network.7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007 Apr 12 18:16:46.572123 env[1109]: 2024-04-12 18:16:46.533 [INFO][2866] ipam.go 1203: Writing block in order to claim IPs block=192.168.73.128/26 handle="k8s-pod-network.7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007" host="10.0.0.15" Apr 12 18:16:46.572123 env[1109]: 2024-04-12 18:16:46.540 [INFO][2866] ipam.go 1216: Successfully claimed IPs: [192.168.73.132/26] block=192.168.73.128/26 handle="k8s-pod-network.7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007" host="10.0.0.15" Apr 12 18:16:46.572123 env[1109]: 2024-04-12 18:16:46.540 [INFO][2866] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.73.132/26] handle="k8s-pod-network.7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007" host="10.0.0.15" Apr 12 18:16:46.572123 env[1109]: 2024-04-12 18:16:46.540 [INFO][2866] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:46.572123 env[1109]: 2024-04-12 18:16:46.540 [INFO][2866] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.73.132/26] IPv6=[] ContainerID="7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007" HandleID="k8s-pod-network.7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007" Workload="10.0.0.15-k8s-calico--apiserver--7844cc77cc--vr2qj-eth0" Apr 12 18:16:46.573047 env[1109]: 2024-04-12 18:16:46.544 [INFO][2853] k8s.go 385: Populated endpoint ContainerID="7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007" Namespace="calico-apiserver" Pod="calico-apiserver-7844cc77cc-vr2qj" WorkloadEndpoint="10.0.0.15-k8s-calico--apiserver--7844cc77cc--vr2qj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15-k8s-calico--apiserver--7844cc77cc--vr2qj-eth0", GenerateName:"calico-apiserver-7844cc77cc-", Namespace:"calico-apiserver", SelfLink:"", UID:"49c5253f-3a53-44cc-840b-c660a6eb580f", ResourceVersion:"1042", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 16, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7844cc77cc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.15", ContainerID:"", Pod:"calico-apiserver-7844cc77cc-vr2qj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.73.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali26de6cc61ae", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:46.573047 env[1109]: 2024-04-12 18:16:46.544 [INFO][2853] k8s.go 386: Calico CNI using IPs: [192.168.73.132/32] ContainerID="7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007" Namespace="calico-apiserver" Pod="calico-apiserver-7844cc77cc-vr2qj" WorkloadEndpoint="10.0.0.15-k8s-calico--apiserver--7844cc77cc--vr2qj-eth0" Apr 12 18:16:46.573047 env[1109]: 2024-04-12 18:16:46.544 [INFO][2853] dataplane_linux.go 68: Setting the host side veth name to cali26de6cc61ae ContainerID="7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007" Namespace="calico-apiserver" Pod="calico-apiserver-7844cc77cc-vr2qj" WorkloadEndpoint="10.0.0.15-k8s-calico--apiserver--7844cc77cc--vr2qj-eth0" Apr 12 18:16:46.573047 env[1109]: 2024-04-12 18:16:46.554 [INFO][2853] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007" Namespace="calico-apiserver" Pod="calico-apiserver-7844cc77cc-vr2qj" WorkloadEndpoint="10.0.0.15-k8s-calico--apiserver--7844cc77cc--vr2qj-eth0" Apr 12 18:16:46.573047 env[1109]: 2024-04-12 18:16:46.554 [INFO][2853] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007" Namespace="calico-apiserver" Pod="calico-apiserver-7844cc77cc-vr2qj" WorkloadEndpoint="10.0.0.15-k8s-calico--apiserver--7844cc77cc--vr2qj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15-k8s-calico--apiserver--7844cc77cc--vr2qj-eth0", GenerateName:"calico-apiserver-7844cc77cc-", Namespace:"calico-apiserver", SelfLink:"", UID:"49c5253f-3a53-44cc-840b-c660a6eb580f", ResourceVersion:"1042", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 16, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7844cc77cc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.15", ContainerID:"7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007", Pod:"calico-apiserver-7844cc77cc-vr2qj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.73.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali26de6cc61ae", MAC:"96:3d:ce:8c:59:67", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:46.573047 env[1109]: 2024-04-12 18:16:46.567 [INFO][2853] k8s.go 498: Wrote updated endpoint to datastore ContainerID="7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007" Namespace="calico-apiserver" Pod="calico-apiserver-7844cc77cc-vr2qj" WorkloadEndpoint="10.0.0.15-k8s-calico--apiserver--7844cc77cc--vr2qj-eth0" Apr 12 18:16:46.589000 audit[2927]: NETFILTER_CFG table=filter:90 family=2 entries=55 op=nft_register_chain pid=2927 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:16:46.589000 audit[2927]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=28952 a0=3 a1=ffffc5d6ee80 a2=0 a3=ffffb90b6fa8 items=0 ppid=2103 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.589000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:16:46.597340 env[1109]: time="2024-04-12T18:16:46.597291414Z" level=info msg="StartContainer for \"ac61d55c7f7779029a7e3227278e80efcd5ff110992ba6e51e845f375cb897cb\" returns successfully" Apr 12 18:16:46.613393 env[1109]: time="2024-04-12T18:16:46.610097374Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:16:46.613393 env[1109]: time="2024-04-12T18:16:46.610150574Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:16:46.613393 env[1109]: time="2024-04-12T18:16:46.610162654Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:16:46.613393 env[1109]: time="2024-04-12T18:16:46.610342734Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007 pid=2936 runtime=io.containerd.runc.v2 Apr 12 18:16:46.626552 systemd[1]: Started cri-containerd-7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007.scope. Apr 12 18:16:46.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.658000 audit: BPF prog-id=117 op=LOAD Apr 12 18:16:46.658000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.658000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2936 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735333538363166643064613636663038656139393833306633313865 Apr 12 18:16:46.658000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.658000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2936 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735333538363166643064613636663038656139393833306633313865 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit: BPF prog-id=118 op=LOAD Apr 12 18:16:46.659000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2936 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735333538363166643064613636663038656139393833306633313865 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit: BPF prog-id=119 op=LOAD Apr 12 18:16:46.659000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2936 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735333538363166643064613636663038656139393833306633313865 Apr 12 18:16:46.659000 audit: BPF prog-id=119 op=UNLOAD Apr 12 18:16:46.659000 audit: BPF prog-id=118 op=UNLOAD Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.659000 audit: BPF prog-id=120 op=LOAD Apr 12 18:16:46.659000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2936 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735333538363166643064613636663038656139393833306633313865 Apr 12 18:16:46.661129 systemd-resolved[1053]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:16:46.680514 kubelet[1408]: I0412 18:16:46.679568 1408 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=0.991920422 podCreationTimestamp="2024-04-12 18:16:41 +0000 UTC" firstStartedPulling="2024-04-12 18:16:41.768951194 +0000 UTC m=+36.955867306" lastFinishedPulling="2024-04-12 18:16:46.456558051 +0000 UTC m=+41.643474123" observedRunningTime="2024-04-12 18:16:46.679408639 +0000 UTC m=+41.866324751" watchObservedRunningTime="2024-04-12 18:16:46.679527239 +0000 UTC m=+41.866443311" Apr 12 18:16:46.680663 env[1109]: time="2024-04-12T18:16:46.680101757Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7844cc77cc-vr2qj,Uid:49c5253f-3a53-44cc-840b-c660a6eb580f,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007\"" Apr 12 18:16:46.682557 env[1109]: time="2024-04-12T18:16:46.681854672Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:16:46.688000 audit[2969]: AVC avc: denied { search } for pid=2969 comm="rpcbind" name="crypto" dev="proc" ino=16904 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c843 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 18:16:46.688000 audit[2969]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8ee2f000 a2=0 a3=0 items=0 ppid=2893 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c591,c843 key=(null) Apr 12 18:16:46.688000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Apr 12 18:16:46.744000 audit[2974]: AVC avc: denied { search } for pid=2974 comm="dbus-daemon" name="crypto" dev="proc" ino=16904 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c843 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 18:16:46.744000 audit[2974]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffac0af000 a2=0 a3=0 items=0 ppid=2893 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c591,c843 key=(null) Apr 12 18:16:46.744000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 18:16:46.756000 audit[2975]: AVC avc: denied { watch } for pid=2975 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c843 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c591,c843 tclass=dir permissive=0 Apr 12 18:16:46.756000 audit[2975]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaabb0bdaf0 a2=2c8 a3=aaaabb09ea60 items=0 ppid=2893 pid=2975 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c591,c843 key=(null) Apr 12 18:16:46.756000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Apr 12 18:16:46.764000 audit[2976]: AVC avc: denied { read } for pid=2976 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=16929 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c843 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Apr 12 18:16:46.764000 audit[2976]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffa8c0a570 a2=80000 a3=0 items=0 ppid=2893 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c591,c843 key=(null) Apr 12 18:16:46.764000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 18:16:46.765000 audit[2976]: AVC avc: denied { search } for pid=2976 comm="ganesha.nfsd" name="crypto" dev="proc" ino=16904 scontext=system_u:system_r:svirt_lxc_net_t:s0:c591,c843 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Apr 12 18:16:46.765000 audit[2976]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa7f9f000 a2=0 a3=0 items=0 ppid=2893 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c591,c843 key=(null) Apr 12 18:16:46.765000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Apr 12 18:16:47.038000 audit[2994]: NETFILTER_CFG table=filter:91 family=2 entries=22 op=nft_register_rule pid=2994 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:47.038000 audit[2994]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffd238eb0 a2=0 a3=1 items=0 ppid=1563 pid=2994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:47.038000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:47.040000 audit[2994]: NETFILTER_CFG table=nat:92 family=2 entries=104 op=nft_register_chain pid=2994 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:47.040000 audit[2994]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48684 a0=3 a1=fffffd238eb0 a2=0 a3=1 items=0 ppid=1563 pid=2994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:47.040000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:47.499305 kubelet[1408]: E0412 18:16:47.499262 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:47.617307 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4166222559.mount: Deactivated successfully. Apr 12 18:16:47.996530 systemd-networkd[1009]: cali26de6cc61ae: Gained IPv6LL Apr 12 18:16:48.499403 kubelet[1408]: E0412 18:16:48.499371 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:48.551127 env[1109]: time="2024-04-12T18:16:48.551078995Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:48.552876 env[1109]: time="2024-04-12T18:16:48.552847390Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:48.554724 env[1109]: time="2024-04-12T18:16:48.554687865Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:48.556106 env[1109]: time="2024-04-12T18:16:48.556081021Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:48.556514 env[1109]: time="2024-04-12T18:16:48.556482980Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4\"" Apr 12 18:16:48.558772 env[1109]: time="2024-04-12T18:16:48.558743094Z" level=info msg="CreateContainer within sandbox \"7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:16:48.570669 env[1109]: time="2024-04-12T18:16:48.570628782Z" level=info msg="CreateContainer within sandbox \"7535861fd0da66f08ea99830f318e2adc76dfafee9eed2b3201bf1904e55e007\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"1a143e47c1a7a359e8c9517b88777a924e59846455786ae98398f10e44531315\"" Apr 12 18:16:48.571338 env[1109]: time="2024-04-12T18:16:48.571301700Z" level=info msg="StartContainer for \"1a143e47c1a7a359e8c9517b88777a924e59846455786ae98398f10e44531315\"" Apr 12 18:16:48.588645 systemd[1]: Started cri-containerd-1a143e47c1a7a359e8c9517b88777a924e59846455786ae98398f10e44531315.scope. Apr 12 18:16:48.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit: BPF prog-id=121 op=LOAD Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2936 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:48.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161313433653437633161376133353965386339353137623838373737 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2936 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:48.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161313433653437633161376133353965386339353137623838373737 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit: BPF prog-id=122 op=LOAD Apr 12 18:16:48.634000 audit[3004]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2936 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:48.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161313433653437633161376133353965386339353137623838373737 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit: BPF prog-id=123 op=LOAD Apr 12 18:16:48.634000 audit[3004]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2936 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:48.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161313433653437633161376133353965386339353137623838373737 Apr 12 18:16:48.634000 audit: BPF prog-id=123 op=UNLOAD Apr 12 18:16:48.634000 audit: BPF prog-id=122 op=UNLOAD Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.634000 audit: BPF prog-id=124 op=LOAD Apr 12 18:16:48.634000 audit[3004]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2936 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:48.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161313433653437633161376133353965386339353137623838373737 Apr 12 18:16:48.652882 env[1109]: time="2024-04-12T18:16:48.652837878Z" level=info msg="StartContainer for \"1a143e47c1a7a359e8c9517b88777a924e59846455786ae98398f10e44531315\" returns successfully" Apr 12 18:16:48.712000 audit[3034]: NETFILTER_CFG table=filter:93 family=2 entries=10 op=nft_register_rule pid=3034 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:48.712000 audit[3034]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe75bbc40 a2=0 a3=1 items=0 ppid=1563 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:48.712000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:48.713000 audit[3034]: NETFILTER_CFG table=nat:94 family=2 entries=44 op=nft_register_rule pid=3034 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:48.713000 audit[3034]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=ffffe75bbc40 a2=0 a3=1 items=0 ppid=1563 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:48.713000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:49.499908 kubelet[1408]: E0412 18:16:49.499857 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:49.535000 audit[3016]: AVC avc: denied { watch } for pid=3016 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_16_46.4187870877/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c172,c943 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c172,c943 tclass=file permissive=0 Apr 12 18:16:49.535000 audit[3016]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000c740a0 a2=fc6 a3=0 items=0 ppid=2936 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c172,c943 key=(null) Apr 12 18:16:49.535000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:16:49.566447 systemd[1]: run-containerd-runc-k8s.io-1a143e47c1a7a359e8c9517b88777a924e59846455786ae98398f10e44531315-runc.e4vnif.mount: Deactivated successfully. Apr 12 18:16:49.725000 audit[3040]: NETFILTER_CFG table=filter:95 family=2 entries=10 op=nft_register_rule pid=3040 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:49.725000 audit[3040]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffcdccbf20 a2=0 a3=1 items=0 ppid=1563 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:49.725000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:49.726000 audit[3040]: NETFILTER_CFG table=nat:96 family=2 entries=44 op=nft_register_rule pid=3040 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:49.726000 audit[3040]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=ffffcdccbf20 a2=0 a3=1 items=0 ppid=1563 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:49.726000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:50.501014 kubelet[1408]: E0412 18:16:50.500977 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:51.502188 kubelet[1408]: E0412 18:16:51.502146 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:52.502465 kubelet[1408]: E0412 18:16:52.502429 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:53.503892 kubelet[1408]: E0412 18:16:53.503854 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:54.504299 kubelet[1408]: E0412 18:16:54.504263 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:55.505324 kubelet[1408]: E0412 18:16:55.505282 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:56.123690 kubelet[1408]: I0412 18:16:56.123648 1408 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7844cc77cc-vr2qj" podStartSLOduration=9.247599761 podCreationTimestamp="2024-04-12 18:16:45 +0000 UTC" firstStartedPulling="2024-04-12 18:16:46.681259394 +0000 UTC m=+41.868175506" lastFinishedPulling="2024-04-12 18:16:48.557268178 +0000 UTC m=+43.744184250" observedRunningTime="2024-04-12 18:16:48.70323878 +0000 UTC m=+43.890154892" watchObservedRunningTime="2024-04-12 18:16:56.123608505 +0000 UTC m=+51.310524577" Apr 12 18:16:56.124155 kubelet[1408]: I0412 18:16:56.124132 1408 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:16:56.128873 systemd[1]: Created slice kubepods-besteffort-pod9e55e748_08a5_451d_a47b_806f80b2424a.slice. Apr 12 18:16:56.238924 kubelet[1408]: I0412 18:16:56.238881 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-65ef5488-2f83-445c-a5f5-b0889d61d175\" (UniqueName: \"kubernetes.io/nfs/9e55e748-08a5-451d-a47b-806f80b2424a-pvc-65ef5488-2f83-445c-a5f5-b0889d61d175\") pod \"test-pod-1\" (UID: \"9e55e748-08a5-451d-a47b-806f80b2424a\") " pod="default/test-pod-1" Apr 12 18:16:56.239050 kubelet[1408]: I0412 18:16:56.238937 1408 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5hpsr\" (UniqueName: \"kubernetes.io/projected/9e55e748-08a5-451d-a47b-806f80b2424a-kube-api-access-5hpsr\") pod \"test-pod-1\" (UID: \"9e55e748-08a5-451d-a47b-806f80b2424a\") " pod="default/test-pod-1" Apr 12 18:16:56.358000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.360558 kernel: Failed to create system directory netfs Apr 12 18:16:56.360607 kernel: kauditd_printk_skb: 212 callbacks suppressed Apr 12 18:16:56.360627 kernel: audit: type=1400 audit(1712945816.358:871): avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.358000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.363667 kernel: Failed to create system directory netfs Apr 12 18:16:56.363723 kernel: audit: type=1400 audit(1712945816.358:871): avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.358000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.366746 kernel: Failed to create system directory netfs Apr 12 18:16:56.366805 kernel: audit: type=1400 audit(1712945816.358:871): avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.366832 kernel: Failed to create system directory netfs Apr 12 18:16:56.358000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.369765 kernel: audit: type=1400 audit(1712945816.358:871): avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.358000 audit[3054]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaadda465e0 a1=12c14 a2=aaaac835e028 a3=aaaadda37010 items=0 ppid=1043 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:56.376415 kernel: audit: type=1300 audit(1712945816.358:871): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaadda465e0 a1=12c14 a2=aaaac835e028 a3=aaaadda37010 items=0 ppid=1043 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:56.376482 kernel: audit: type=1327 audit(1712945816.358:871): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:16:56.358000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:16:56.379000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.385397 kernel: Failed to create system directory fscache Apr 12 18:16:56.385455 kernel: audit: type=1400 audit(1712945816.379:872): avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.385484 kernel: Failed to create system directory fscache Apr 12 18:16:56.379000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.388474 kernel: audit: type=1400 audit(1712945816.379:872): avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.388544 kernel: Failed to create system directory fscache Apr 12 18:16:56.379000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.391481 kernel: audit: type=1400 audit(1712945816.379:872): avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.391539 kernel: Failed to create system directory fscache Apr 12 18:16:56.379000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.394530 kernel: audit: type=1400 audit(1712945816.379:872): avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.394608 kernel: Failed to create system directory fscache Apr 12 18:16:56.379000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.379000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.395384 kernel: Failed to create system directory fscache Apr 12 18:16:56.379000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.379000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.396793 kernel: Failed to create system directory fscache Apr 12 18:16:56.396822 kernel: Failed to create system directory fscache Apr 12 18:16:56.396854 kernel: Failed to create system directory fscache Apr 12 18:16:56.379000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.379000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.379000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.398497 kernel: Failed to create system directory fscache Apr 12 18:16:56.398535 kernel: Failed to create system directory fscache Apr 12 18:16:56.398558 kernel: Failed to create system directory fscache Apr 12 18:16:56.379000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.379000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.399644 kernel: Failed to create system directory fscache Apr 12 18:16:56.399669 kernel: Failed to create system directory fscache Apr 12 18:16:56.379000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.379000 audit[3054]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaddc59210 a1=4c344 a2=aaaac835e028 a3=aaaadda37010 items=0 ppid=1043 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:56.379000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:16:56.401380 kernel: FS-Cache: Loaded Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.424772 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.424861 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.424883 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.424905 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.425925 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.426517 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.426540 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.427676 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.428845 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.428878 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.428893 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.430616 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.430637 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.430660 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.431853 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.431901 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.433562 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.433594 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.433623 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.434666 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.434700 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.435726 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.435756 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.436799 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.437876 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.437892 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.437905 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.439450 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.439466 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.439488 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.440518 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.440538 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.441581 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.442640 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.442660 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.442684 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.443758 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.444906 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.444931 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.444945 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.446494 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.446509 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.446522 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.447552 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.447578 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.448662 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.448684 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.449757 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.450856 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.450880 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.450906 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.452491 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.452511 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.452524 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.453631 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.453652 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.454722 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.454741 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.455810 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.456926 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.456944 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.456957 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.458554 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.458575 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.458588 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.459653 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.459682 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.460802 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.461408 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.461427 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.462598 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.463824 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.463847 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.464414 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.465569 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.465588 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.466715 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.466741 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.467848 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.467873 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.468427 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.469546 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.469583 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.469608 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.470676 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.471810 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.471837 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.472423 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.473574 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.473624 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.473644 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.474731 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.474757 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.475902 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.476492 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.477643 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.477663 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.477679 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.478800 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.479434 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.479472 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.480508 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.480538 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.481586 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.481696 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.482685 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.482778 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.483828 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.483889 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.485469 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.485507 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.485524 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.486577 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.486613 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.487711 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.487739 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.488785 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.488828 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.489925 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.489949 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.491536 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.491603 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.491636 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.492711 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.492760 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.416000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.493878 kernel: Failed to create system directory sunrpc Apr 12 18:16:56.505831 kernel: RPC: Registered named UNIX socket transport module. Apr 12 18:16:56.505871 kernel: RPC: Registered udp transport module. Apr 12 18:16:56.505886 kernel: RPC: Registered tcp transport module. Apr 12 18:16:56.505899 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Apr 12 18:16:56.505913 kubelet[1408]: E0412 18:16:56.505883 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:56.416000 audit[3054]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaddca5560 a1=14a344 a2=aaaac835e028 a3=aaaadda37010 items=6 ppid=1043 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:56.416000 audit: CWD cwd="/" Apr 12 18:16:56.416000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:16:56.416000 audit: PATH item=1 name=(null) inode=19796 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:16:56.416000 audit: PATH item=2 name=(null) inode=19796 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:16:56.416000 audit: PATH item=3 name=(null) inode=19797 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:16:56.416000 audit: PATH item=4 name=(null) inode=19796 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:16:56.416000 audit: PATH item=5 name=(null) inode=19798 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:16:56.416000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.541462 kernel: Failed to create system directory nfs Apr 12 18:16:56.541532 kernel: Failed to create system directory nfs Apr 12 18:16:56.541558 kernel: Failed to create system directory nfs Apr 12 18:16:56.541575 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.542535 kernel: Failed to create system directory nfs Apr 12 18:16:56.542567 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.543593 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.544763 kernel: Failed to create system directory nfs Apr 12 18:16:56.544803 kernel: Failed to create system directory nfs Apr 12 18:16:56.544822 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.545856 kernel: Failed to create system directory nfs Apr 12 18:16:56.545917 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.547536 kernel: Failed to create system directory nfs Apr 12 18:16:56.547568 kernel: Failed to create system directory nfs Apr 12 18:16:56.547584 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.548537 kernel: Failed to create system directory nfs Apr 12 18:16:56.548601 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.549702 kernel: Failed to create system directory nfs Apr 12 18:16:56.549739 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.550785 kernel: Failed to create system directory nfs Apr 12 18:16:56.550839 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.551853 kernel: Failed to create system directory nfs Apr 12 18:16:56.551961 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.553479 kernel: Failed to create system directory nfs Apr 12 18:16:56.553567 kernel: Failed to create system directory nfs Apr 12 18:16:56.553586 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.554552 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.555652 kernel: Failed to create system directory nfs Apr 12 18:16:56.555705 kernel: Failed to create system directory nfs Apr 12 18:16:56.555722 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.556701 kernel: Failed to create system directory nfs Apr 12 18:16:56.556732 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.557766 kernel: Failed to create system directory nfs Apr 12 18:16:56.557825 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.558831 kernel: Failed to create system directory nfs Apr 12 18:16:56.558878 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.560452 kernel: Failed to create system directory nfs Apr 12 18:16:56.560474 kernel: Failed to create system directory nfs Apr 12 18:16:56.560487 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.561480 kernel: Failed to create system directory nfs Apr 12 18:16:56.561505 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.562565 kernel: Failed to create system directory nfs Apr 12 18:16:56.562588 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.563674 kernel: Failed to create system directory nfs Apr 12 18:16:56.563710 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.564729 kernel: Failed to create system directory nfs Apr 12 18:16:56.564779 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.565786 kernel: Failed to create system directory nfs Apr 12 18:16:56.565806 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.566923 kernel: Failed to create system directory nfs Apr 12 18:16:56.566949 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.568466 kernel: Failed to create system directory nfs Apr 12 18:16:56.568527 kernel: Failed to create system directory nfs Apr 12 18:16:56.568544 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.569503 kernel: Failed to create system directory nfs Apr 12 18:16:56.569532 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.570598 kernel: Failed to create system directory nfs Apr 12 18:16:56.570632 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.535000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.571613 kernel: Failed to create system directory nfs Apr 12 18:16:56.535000 audit[3054]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaadde4e4f0 a1=115814 a2=aaaac835e028 a3=aaaadda37010 items=0 ppid=1043 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:56.535000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:16:56.588381 kernel: FS-Cache: Netfs 'nfs' registered for caching Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.616984 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.617083 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.617099 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.618825 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.618853 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.618866 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.620768 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.620831 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.620861 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.622556 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.622585 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.622619 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.623821 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.623856 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.626452 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.626514 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.627671 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.627701 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.629252 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.629295 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.630443 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.631912 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.633671 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.636446 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.636573 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.637747 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.637786 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.638912 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.639509 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.640677 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.640703 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.640723 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.641831 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.641867 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.643477 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.643513 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.643531 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.644630 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.645778 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.645806 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.645823 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.646376 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.647489 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.648643 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.648667 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.648704 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.649807 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.649866 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.650407 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.651490 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.651524 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.652517 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.652579 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.653595 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.653648 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.654701 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.654736 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.655730 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.655782 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.656799 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.656852 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.657864 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.657909 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.659454 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.659522 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.659565 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.660513 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.660569 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.661575 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.661623 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.662627 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.662712 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.663814 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.663866 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.664896 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.664957 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.666497 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.666516 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.666566 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.667562 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.667612 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.668619 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.668695 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.669677 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.669711 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.670741 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.670779 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.671804 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.671844 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.672865 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.672899 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.674423 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.674462 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.674483 kernel: Failed to create system directory nfs4 Apr 12 18:16:56.608000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.777412 kernel: NFS: Registering the id_resolver key type Apr 12 18:16:56.777590 kernel: Key type id_resolver registered Apr 12 18:16:56.777633 kernel: Key type id_legacy registered Apr 12 18:16:56.608000 audit[3059]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff9d49b010 a1=19c244 a2=aaaad0dde028 a3=aaaaf0410010 items=0 ppid=1043 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:56.608000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.788503 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.788564 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.789709 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.789751 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.789789 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.790910 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.790937 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.792543 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.792580 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.792614 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.793653 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.793706 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.794764 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.794789 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.795854 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.795887 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.797514 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.797552 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.797589 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.798570 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.799694 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.799743 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.799758 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.800875 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.800916 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.801560 kernel: Failed to create system directory rpcgss Apr 12 18:16:56.785000 audit[3063]: AVC avc: denied { confidentiality } for pid=3063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:16:56.785000 audit[3063]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff90e63010 a1=5ef34 a2=aaaab13fe028 a3=aaaac344b010 items=0 ppid=1043 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:56.785000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Apr 12 18:16:56.821130 nfsidmap[3072]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Apr 12 18:16:56.825591 nfsidmap[3075]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Apr 12 18:16:56.837000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2471 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:16:56.837000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2471 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:16:56.837000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2471 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:16:56.837000 audit[1166]: AVC avc: denied { watch_reads } for pid=1166 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2471 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:16:56.837000 audit[1166]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf22cf6f0 a2=10 a3=0 items=0 ppid=1 pid=1166 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:56.837000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:16:56.837000 audit[1166]: AVC avc: denied { watch_reads } for pid=1166 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2471 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:16:56.837000 audit[1166]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf22cf6f0 a2=10 a3=0 items=0 ppid=1 pid=1166 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:56.837000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:16:56.837000 audit[1166]: AVC avc: denied { watch_reads } for pid=1166 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2471 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:16:56.837000 audit[1166]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf22cf6f0 a2=10 a3=0 items=0 ppid=1 pid=1166 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:56.837000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:16:57.031157 env[1109]: time="2024-04-12T18:16:57.031114792Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:9e55e748-08a5-451d-a47b-806f80b2424a,Namespace:default,Attempt:0,}" Apr 12 18:16:57.192183 systemd-networkd[1009]: cali5ec59c6bf6e: Link UP Apr 12 18:16:57.194500 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:16:57.194616 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Apr 12 18:16:57.194436 systemd-networkd[1009]: cali5ec59c6bf6e: Gained carrier Apr 12 18:16:57.207102 env[1109]: 2024-04-12 18:16:57.117 [INFO][3079] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.15-k8s-test--pod--1-eth0 default 9e55e748-08a5-451d-a47b-806f80b2424a 1111 0 2024-04-12 18:16:41 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.15 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.15-k8s-test--pod--1-" Apr 12 18:16:57.207102 env[1109]: 2024-04-12 18:16:57.117 [INFO][3079] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.15-k8s-test--pod--1-eth0" Apr 12 18:16:57.207102 env[1109]: 2024-04-12 18:16:57.145 [INFO][3092] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17" HandleID="k8s-pod-network.5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17" Workload="10.0.0.15-k8s-test--pod--1-eth0" Apr 12 18:16:57.207102 env[1109]: 2024-04-12 18:16:57.163 [INFO][3092] ipam_plugin.go 268: Auto assigning IP ContainerID="5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17" HandleID="k8s-pod-network.5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17" Workload="10.0.0.15-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002ef3c0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.15", "pod":"test-pod-1", "timestamp":"2024-04-12 18:16:57.145666577 +0000 UTC"}, Hostname:"10.0.0.15", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:16:57.207102 env[1109]: 2024-04-12 18:16:57.164 [INFO][3092] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:57.207102 env[1109]: 2024-04-12 18:16:57.164 [INFO][3092] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:57.207102 env[1109]: 2024-04-12 18:16:57.164 [INFO][3092] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.15' Apr 12 18:16:57.207102 env[1109]: 2024-04-12 18:16:57.165 [INFO][3092] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17" host="10.0.0.15" Apr 12 18:16:57.207102 env[1109]: 2024-04-12 18:16:57.171 [INFO][3092] ipam.go 372: Looking up existing affinities for host host="10.0.0.15" Apr 12 18:16:57.207102 env[1109]: 2024-04-12 18:16:57.175 [INFO][3092] ipam.go 489: Trying affinity for 192.168.73.128/26 host="10.0.0.15" Apr 12 18:16:57.207102 env[1109]: 2024-04-12 18:16:57.177 [INFO][3092] ipam.go 155: Attempting to load block cidr=192.168.73.128/26 host="10.0.0.15" Apr 12 18:16:57.207102 env[1109]: 2024-04-12 18:16:57.179 [INFO][3092] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.73.128/26 host="10.0.0.15" Apr 12 18:16:57.207102 env[1109]: 2024-04-12 18:16:57.179 [INFO][3092] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.73.128/26 handle="k8s-pod-network.5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17" host="10.0.0.15" Apr 12 18:16:57.207102 env[1109]: 2024-04-12 18:16:57.180 [INFO][3092] ipam.go 1682: Creating new handle: k8s-pod-network.5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17 Apr 12 18:16:57.207102 env[1109]: 2024-04-12 18:16:57.184 [INFO][3092] ipam.go 1203: Writing block in order to claim IPs block=192.168.73.128/26 handle="k8s-pod-network.5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17" host="10.0.0.15" Apr 12 18:16:57.207102 env[1109]: 2024-04-12 18:16:57.188 [INFO][3092] ipam.go 1216: Successfully claimed IPs: [192.168.73.133/26] block=192.168.73.128/26 handle="k8s-pod-network.5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17" host="10.0.0.15" Apr 12 18:16:57.207102 env[1109]: 2024-04-12 18:16:57.188 [INFO][3092] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.73.133/26] handle="k8s-pod-network.5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17" host="10.0.0.15" Apr 12 18:16:57.207102 env[1109]: 2024-04-12 18:16:57.188 [INFO][3092] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:57.207102 env[1109]: 2024-04-12 18:16:57.188 [INFO][3092] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.73.133/26] IPv6=[] ContainerID="5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17" HandleID="k8s-pod-network.5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17" Workload="10.0.0.15-k8s-test--pod--1-eth0" Apr 12 18:16:57.207102 env[1109]: 2024-04-12 18:16:57.190 [INFO][3079] k8s.go 385: Populated endpoint ContainerID="5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.15-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"9e55e748-08a5-451d-a47b-806f80b2424a", ResourceVersion:"1111", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 16, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.15", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.73.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:57.207102 env[1109]: 2024-04-12 18:16:57.190 [INFO][3079] k8s.go 386: Calico CNI using IPs: [192.168.73.133/32] ContainerID="5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.15-k8s-test--pod--1-eth0" Apr 12 18:16:57.208133 env[1109]: 2024-04-12 18:16:57.190 [INFO][3079] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.15-k8s-test--pod--1-eth0" Apr 12 18:16:57.208133 env[1109]: 2024-04-12 18:16:57.194 [INFO][3079] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.15-k8s-test--pod--1-eth0" Apr 12 18:16:57.208133 env[1109]: 2024-04-12 18:16:57.195 [INFO][3079] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.15-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.15-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"9e55e748-08a5-451d-a47b-806f80b2424a", ResourceVersion:"1111", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 16, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.15", ContainerID:"5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.73.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"2e:39:66:2a:57:ea", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:57.208133 env[1109]: 2024-04-12 18:16:57.205 [INFO][3079] k8s.go 498: Wrote updated endpoint to datastore ContainerID="5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.15-k8s-test--pod--1-eth0" Apr 12 18:16:57.217000 audit[3114]: NETFILTER_CFG table=filter:97 family=2 entries=42 op=nft_register_chain pid=3114 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:16:57.217000 audit[3114]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20588 a0=3 a1=ffffc2cc2070 a2=0 a3=ffffb9599fa8 items=0 ppid=2103 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:57.217000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:16:57.266797 env[1109]: time="2024-04-12T18:16:57.266726272Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:16:57.266923 env[1109]: time="2024-04-12T18:16:57.266808072Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:16:57.266923 env[1109]: time="2024-04-12T18:16:57.266852832Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:16:57.267100 env[1109]: time="2024-04-12T18:16:57.267055632Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17 pid=3123 runtime=io.containerd.runc.v2 Apr 12 18:16:57.277724 systemd[1]: Started cri-containerd-5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17.scope. Apr 12 18:16:57.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.314000 audit: BPF prog-id=125 op=LOAD Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3123 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:57.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532383835303264313232363434663661323232643939303037383436 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3123 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:57.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532383835303264313232363434663661323232643939303037383436 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit: BPF prog-id=126 op=LOAD Apr 12 18:16:57.315000 audit[3133]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3123 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:57.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532383835303264313232363434663661323232643939303037383436 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit: BPF prog-id=127 op=LOAD Apr 12 18:16:57.315000 audit[3133]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3123 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:57.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532383835303264313232363434663661323232643939303037383436 Apr 12 18:16:57.315000 audit: BPF prog-id=127 op=UNLOAD Apr 12 18:16:57.315000 audit: BPF prog-id=126 op=UNLOAD Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.315000 audit: BPF prog-id=128 op=LOAD Apr 12 18:16:57.315000 audit[3133]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3123 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:57.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532383835303264313232363434663661323232643939303037383436 Apr 12 18:16:57.318354 systemd-resolved[1053]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:16:57.333991 env[1109]: time="2024-04-12T18:16:57.333947850Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:9e55e748-08a5-451d-a47b-806f80b2424a,Namespace:default,Attempt:0,} returns sandbox id \"5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17\"" Apr 12 18:16:57.335501 env[1109]: time="2024-04-12T18:16:57.335470848Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 18:16:57.506619 kubelet[1408]: E0412 18:16:57.506573 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:57.595448 env[1109]: time="2024-04-12T18:16:57.595296211Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:57.597267 env[1109]: time="2024-04-12T18:16:57.597219769Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:57.598918 env[1109]: time="2024-04-12T18:16:57.598875206Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:57.603683 env[1109]: time="2024-04-12T18:16:57.603641279Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:57.604423 env[1109]: time="2024-04-12T18:16:57.604395118Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7c9d4415537dd79835685ddfb3fdec1efecbf38aada406c280c76cc82afd6a56\"" Apr 12 18:16:57.606595 env[1109]: time="2024-04-12T18:16:57.606533074Z" level=info msg="CreateContainer within sandbox \"5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17\" for container &ContainerMetadata{Name:test,Attempt:0,}" Apr 12 18:16:57.616902 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount516007831.mount: Deactivated successfully. Apr 12 18:16:57.622753 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount968754007.mount: Deactivated successfully. Apr 12 18:16:57.627317 env[1109]: time="2024-04-12T18:16:57.627262003Z" level=info msg="CreateContainer within sandbox \"5288502d122644f6a222d990078462e732cd2fa7701e9f7c527823344cbb9c17\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"ad058e03192e19c61e55f5775ba7853a92ff8b5e64ac8efef6d30bbcc16d94e7\"" Apr 12 18:16:57.628015 env[1109]: time="2024-04-12T18:16:57.627982402Z" level=info msg="StartContainer for \"ad058e03192e19c61e55f5775ba7853a92ff8b5e64ac8efef6d30bbcc16d94e7\"" Apr 12 18:16:57.641123 systemd[1]: Started cri-containerd-ad058e03192e19c61e55f5775ba7853a92ff8b5e64ac8efef6d30bbcc16d94e7.scope. Apr 12 18:16:57.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.667000 audit: BPF prog-id=129 op=LOAD Apr 12 18:16:57.667000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.667000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3123 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:57.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164303538653033313932653139633631653535663537373562613738 Apr 12 18:16:57.668000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.668000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3123 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:57.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164303538653033313932653139633631653535663537373562613738 Apr 12 18:16:57.668000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.668000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.668000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.668000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.668000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.668000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.668000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.668000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.668000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.668000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.668000 audit: BPF prog-id=130 op=LOAD Apr 12 18:16:57.668000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3123 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:57.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164303538653033313932653139633631653535663537373562613738 Apr 12 18:16:57.669000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.669000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.669000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.669000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.669000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.669000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.669000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.669000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.669000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.669000 audit: BPF prog-id=131 op=LOAD Apr 12 18:16:57.669000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3123 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:57.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164303538653033313932653139633631653535663537373562613738 Apr 12 18:16:57.669000 audit: BPF prog-id=131 op=UNLOAD Apr 12 18:16:57.669000 audit: BPF prog-id=130 op=UNLOAD Apr 12 18:16:57.670000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.670000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.670000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.670000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.670000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.670000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.670000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.670000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.670000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.670000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:57.670000 audit: BPF prog-id=132 op=LOAD Apr 12 18:16:57.670000 audit[3165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3123 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:57.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164303538653033313932653139633631653535663537373562613738 Apr 12 18:16:57.684570 env[1109]: time="2024-04-12T18:16:57.684521155Z" level=info msg="StartContainer for \"ad058e03192e19c61e55f5775ba7853a92ff8b5e64ac8efef6d30bbcc16d94e7\" returns successfully" Apr 12 18:16:57.697200 kubelet[1408]: I0412 18:16:57.697172 1408 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=16.427542347 podCreationTimestamp="2024-04-12 18:16:41 +0000 UTC" firstStartedPulling="2024-04-12 18:16:57.335041488 +0000 UTC m=+52.521957600" lastFinishedPulling="2024-04-12 18:16:57.604626077 +0000 UTC m=+52.791542189" observedRunningTime="2024-04-12 18:16:57.697002456 +0000 UTC m=+52.883918568" watchObservedRunningTime="2024-04-12 18:16:57.697126936 +0000 UTC m=+52.884043048" Apr 12 18:16:58.507176 kubelet[1408]: E0412 18:16:58.507119 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:16:59.195846 systemd-networkd[1009]: cali5ec59c6bf6e: Gained IPv6LL Apr 12 18:16:59.507273 kubelet[1408]: E0412 18:16:59.507243 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:17:00.508666 kubelet[1408]: E0412 18:17:00.508622 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:17:01.509130 kubelet[1408]: E0412 18:17:01.509093 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:17:02.510497 kubelet[1408]: E0412 18:17:02.510454 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:17:03.511044 kubelet[1408]: E0412 18:17:03.511007 1408 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"