Mar 17 18:41:59.067282 kernel: Linux version 5.15.179-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Mar 17 17:12:34 -00 2025 Mar 17 18:41:59.067326 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 18:41:59.067348 kernel: BIOS-provided physical RAM map: Mar 17 18:41:59.067361 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Mar 17 18:41:59.067374 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Mar 17 18:41:59.067387 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Mar 17 18:41:59.067404 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdafff] usable Mar 17 18:41:59.067418 kernel: BIOS-e820: [mem 0x000000007ffdb000-0x000000007fffffff] reserved Mar 17 18:41:59.067434 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Mar 17 18:41:59.067448 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Mar 17 18:41:59.067462 kernel: NX (Execute Disable) protection: active Mar 17 18:41:59.067476 kernel: SMBIOS 2.8 present. Mar 17 18:41:59.067490 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 Mar 17 18:41:59.067504 kernel: Hypervisor detected: KVM Mar 17 18:41:59.067522 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Mar 17 18:41:59.067552 kernel: kvm-clock: cpu 0, msr 6b19a001, primary cpu clock Mar 17 18:41:59.067567 kernel: kvm-clock: using sched offset of 4110633279 cycles Mar 17 18:41:59.067583 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Mar 17 18:41:59.068641 kernel: tsc: Detected 2294.608 MHz processor Mar 17 18:41:59.068661 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Mar 17 18:41:59.068678 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Mar 17 18:41:59.068697 kernel: last_pfn = 0x7ffdb max_arch_pfn = 0x400000000 Mar 17 18:41:59.068717 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Mar 17 18:41:59.068738 kernel: ACPI: Early table checksum verification disabled Mar 17 18:41:59.068749 kernel: ACPI: RSDP 0x00000000000F5950 000014 (v00 BOCHS ) Mar 17 18:41:59.068763 kernel: ACPI: RSDT 0x000000007FFE1986 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 18:41:59.068784 kernel: ACPI: FACP 0x000000007FFE176A 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 18:41:59.068802 kernel: ACPI: DSDT 0x000000007FFE0040 00172A (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 18:41:59.068818 kernel: ACPI: FACS 0x000000007FFE0000 000040 Mar 17 18:41:59.068833 kernel: ACPI: APIC 0x000000007FFE17DE 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 18:41:59.068857 kernel: ACPI: HPET 0x000000007FFE185E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 18:41:59.068873 kernel: ACPI: SRAT 0x000000007FFE1896 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 18:41:59.068893 kernel: ACPI: WAET 0x000000007FFE195E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 18:41:59.068910 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe176a-0x7ffe17dd] Mar 17 18:41:59.068931 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe1769] Mar 17 18:41:59.068945 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Mar 17 18:41:59.068958 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17de-0x7ffe185d] Mar 17 18:41:59.068968 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe185e-0x7ffe1895] Mar 17 18:41:59.068979 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe1896-0x7ffe195d] Mar 17 18:41:59.068991 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe195e-0x7ffe1985] Mar 17 18:41:59.069022 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Mar 17 18:41:59.069038 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Mar 17 18:41:59.069055 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Mar 17 18:41:59.069072 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Mar 17 18:41:59.069089 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdafff] -> [mem 0x00000000-0x7ffdafff] Mar 17 18:41:59.069106 kernel: NODE_DATA(0) allocated [mem 0x7ffd5000-0x7ffdafff] Mar 17 18:41:59.069126 kernel: Zone ranges: Mar 17 18:41:59.069143 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Mar 17 18:41:59.069159 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdafff] Mar 17 18:41:59.069178 kernel: Normal empty Mar 17 18:41:59.069199 kernel: Movable zone start for each node Mar 17 18:41:59.069220 kernel: Early memory node ranges Mar 17 18:41:59.069232 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Mar 17 18:41:59.069245 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdafff] Mar 17 18:41:59.069258 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdafff] Mar 17 18:41:59.069282 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 17 18:41:59.069309 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Mar 17 18:41:59.069326 kernel: On node 0, zone DMA32: 37 pages in unavailable ranges Mar 17 18:41:59.069348 kernel: ACPI: PM-Timer IO Port: 0x608 Mar 17 18:41:59.069369 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Mar 17 18:41:59.069386 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Mar 17 18:41:59.069403 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Mar 17 18:41:59.069419 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Mar 17 18:41:59.069436 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Mar 17 18:41:59.069457 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Mar 17 18:41:59.069477 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Mar 17 18:41:59.069494 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Mar 17 18:41:59.069511 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Mar 17 18:41:59.069528 kernel: TSC deadline timer available Mar 17 18:41:59.069565 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Mar 17 18:41:59.069578 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Mar 17 18:41:59.069590 kernel: Booting paravirtualized kernel on KVM Mar 17 18:41:59.069603 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Mar 17 18:41:59.069626 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Mar 17 18:41:59.069643 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Mar 17 18:41:59.069659 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Mar 17 18:41:59.069681 kernel: pcpu-alloc: [0] 0 1 Mar 17 18:41:59.069704 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Mar 17 18:41:59.069718 kernel: kvm-guest: PV spinlocks disabled, no host support Mar 17 18:41:59.069730 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515803 Mar 17 18:41:59.069750 kernel: Policy zone: DMA32 Mar 17 18:41:59.069773 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 18:41:59.069797 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Mar 17 18:41:59.069816 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Mar 17 18:41:59.069828 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Mar 17 18:41:59.069840 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Mar 17 18:41:59.069857 kernel: Memory: 1973276K/2096612K available (12294K kernel code, 2278K rwdata, 13724K rodata, 47472K init, 4108K bss, 123076K reserved, 0K cma-reserved) Mar 17 18:41:59.069879 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Mar 17 18:41:59.069898 kernel: Kernel/User page tables isolation: enabled Mar 17 18:41:59.069914 kernel: ftrace: allocating 34580 entries in 136 pages Mar 17 18:41:59.069938 kernel: ftrace: allocated 136 pages with 2 groups Mar 17 18:41:59.069950 kernel: rcu: Hierarchical RCU implementation. Mar 17 18:41:59.069966 kernel: rcu: RCU event tracing is enabled. Mar 17 18:41:59.069977 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Mar 17 18:41:59.069989 kernel: Rude variant of Tasks RCU enabled. Mar 17 18:41:59.070001 kernel: Tracing variant of Tasks RCU enabled. Mar 17 18:41:59.070017 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Mar 17 18:41:59.070057 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Mar 17 18:41:59.070072 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Mar 17 18:41:59.070090 kernel: random: crng init done Mar 17 18:41:59.070102 kernel: Console: colour VGA+ 80x25 Mar 17 18:41:59.070115 kernel: printk: console [tty0] enabled Mar 17 18:41:59.070125 kernel: printk: console [ttyS0] enabled Mar 17 18:41:59.070137 kernel: ACPI: Core revision 20210730 Mar 17 18:41:59.070149 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Mar 17 18:41:59.070161 kernel: APIC: Switch to symmetric I/O mode setup Mar 17 18:41:59.070174 kernel: x2apic enabled Mar 17 18:41:59.070187 kernel: Switched APIC routing to physical x2apic. Mar 17 18:41:59.070203 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Mar 17 18:41:59.070229 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x21134f58f0d, max_idle_ns: 440795217993 ns Mar 17 18:41:59.070251 kernel: Calibrating delay loop (skipped) preset value.. 4589.21 BogoMIPS (lpj=2294608) Mar 17 18:41:59.070275 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Mar 17 18:41:59.070292 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Mar 17 18:41:59.070309 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Mar 17 18:41:59.070326 kernel: Spectre V2 : Mitigation: Retpolines Mar 17 18:41:59.070342 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Mar 17 18:41:59.070359 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Mar 17 18:41:59.070380 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Mar 17 18:41:59.070410 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Mar 17 18:41:59.070427 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Mar 17 18:41:59.070448 kernel: MDS: Mitigation: Clear CPU buffers Mar 17 18:41:59.070465 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Mar 17 18:41:59.070491 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Mar 17 18:41:59.070513 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Mar 17 18:41:59.070530 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Mar 17 18:41:59.073110 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Mar 17 18:41:59.073170 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Mar 17 18:41:59.073193 kernel: Freeing SMP alternatives memory: 32K Mar 17 18:41:59.073209 kernel: pid_max: default: 32768 minimum: 301 Mar 17 18:41:59.073224 kernel: LSM: Security Framework initializing Mar 17 18:41:59.073238 kernel: SELinux: Initializing. Mar 17 18:41:59.073253 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Mar 17 18:41:59.073269 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Mar 17 18:41:59.073283 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x4f, stepping: 0x1) Mar 17 18:41:59.073301 kernel: Performance Events: unsupported p6 CPU model 79 no PMU driver, software events only. Mar 17 18:41:59.073317 kernel: signal: max sigframe size: 1776 Mar 17 18:41:59.073331 kernel: rcu: Hierarchical SRCU implementation. Mar 17 18:41:59.073346 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Mar 17 18:41:59.073358 kernel: smp: Bringing up secondary CPUs ... Mar 17 18:41:59.073378 kernel: x86: Booting SMP configuration: Mar 17 18:41:59.073400 kernel: .... node #0, CPUs: #1 Mar 17 18:41:59.073422 kernel: kvm-clock: cpu 1, msr 6b19a041, secondary cpu clock Mar 17 18:41:59.073445 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Mar 17 18:41:59.073464 kernel: smp: Brought up 1 node, 2 CPUs Mar 17 18:41:59.073476 kernel: smpboot: Max logical packages: 1 Mar 17 18:41:59.073488 kernel: smpboot: Total of 2 processors activated (9178.43 BogoMIPS) Mar 17 18:41:59.073505 kernel: devtmpfs: initialized Mar 17 18:41:59.073526 kernel: x86/mm: Memory block size: 128MB Mar 17 18:41:59.073588 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Mar 17 18:41:59.073609 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Mar 17 18:41:59.073627 kernel: pinctrl core: initialized pinctrl subsystem Mar 17 18:41:59.073646 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Mar 17 18:41:59.073668 kernel: audit: initializing netlink subsys (disabled) Mar 17 18:41:59.073686 kernel: audit: type=2000 audit(1742236918.302:1): state=initialized audit_enabled=0 res=1 Mar 17 18:41:59.073703 kernel: thermal_sys: Registered thermal governor 'step_wise' Mar 17 18:41:59.073722 kernel: thermal_sys: Registered thermal governor 'user_space' Mar 17 18:41:59.073739 kernel: cpuidle: using governor menu Mar 17 18:41:59.073757 kernel: ACPI: bus type PCI registered Mar 17 18:41:59.073775 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Mar 17 18:41:59.073794 kernel: dca service started, version 1.12.1 Mar 17 18:41:59.073818 kernel: PCI: Using configuration type 1 for base access Mar 17 18:41:59.073837 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Mar 17 18:41:59.073850 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Mar 17 18:41:59.073862 kernel: ACPI: Added _OSI(Module Device) Mar 17 18:41:59.073874 kernel: ACPI: Added _OSI(Processor Device) Mar 17 18:41:59.073887 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Mar 17 18:41:59.073899 kernel: ACPI: Added _OSI(Processor Aggregator Device) Mar 17 18:41:59.073911 kernel: ACPI: Added _OSI(Linux-Dell-Video) Mar 17 18:41:59.073924 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Mar 17 18:41:59.073949 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Mar 17 18:41:59.073967 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Mar 17 18:41:59.073979 kernel: ACPI: Interpreter enabled Mar 17 18:41:59.073993 kernel: ACPI: PM: (supports S0 S5) Mar 17 18:41:59.074010 kernel: ACPI: Using IOAPIC for interrupt routing Mar 17 18:41:59.074028 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Mar 17 18:41:59.074046 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Mar 17 18:41:59.074064 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Mar 17 18:41:59.074343 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Mar 17 18:41:59.074510 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Mar 17 18:41:59.074532 kernel: acpiphp: Slot [3] registered Mar 17 18:41:59.074561 kernel: acpiphp: Slot [4] registered Mar 17 18:41:59.074574 kernel: acpiphp: Slot [5] registered Mar 17 18:41:59.074586 kernel: acpiphp: Slot [6] registered Mar 17 18:41:59.074598 kernel: acpiphp: Slot [7] registered Mar 17 18:41:59.074610 kernel: acpiphp: Slot [8] registered Mar 17 18:41:59.074624 kernel: acpiphp: Slot [9] registered Mar 17 18:41:59.074636 kernel: acpiphp: Slot [10] registered Mar 17 18:41:59.074654 kernel: acpiphp: Slot [11] registered Mar 17 18:41:59.074666 kernel: acpiphp: Slot [12] registered Mar 17 18:41:59.074679 kernel: acpiphp: Slot [13] registered Mar 17 18:41:59.074693 kernel: acpiphp: Slot [14] registered Mar 17 18:41:59.074709 kernel: acpiphp: Slot [15] registered Mar 17 18:41:59.074722 kernel: acpiphp: Slot [16] registered Mar 17 18:41:59.074735 kernel: acpiphp: Slot [17] registered Mar 17 18:41:59.074752 kernel: acpiphp: Slot [18] registered Mar 17 18:41:59.074765 kernel: acpiphp: Slot [19] registered Mar 17 18:41:59.074789 kernel: acpiphp: Slot [20] registered Mar 17 18:41:59.074807 kernel: acpiphp: Slot [21] registered Mar 17 18:41:59.074825 kernel: acpiphp: Slot [22] registered Mar 17 18:41:59.074862 kernel: acpiphp: Slot [23] registered Mar 17 18:41:59.074883 kernel: acpiphp: Slot [24] registered Mar 17 18:41:59.074903 kernel: acpiphp: Slot [25] registered Mar 17 18:41:59.074916 kernel: acpiphp: Slot [26] registered Mar 17 18:41:59.074930 kernel: acpiphp: Slot [27] registered Mar 17 18:41:59.074945 kernel: acpiphp: Slot [28] registered Mar 17 18:41:59.074958 kernel: acpiphp: Slot [29] registered Mar 17 18:41:59.074976 kernel: acpiphp: Slot [30] registered Mar 17 18:41:59.074989 kernel: acpiphp: Slot [31] registered Mar 17 18:41:59.075001 kernel: PCI host bridge to bus 0000:00 Mar 17 18:41:59.075214 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Mar 17 18:41:59.075378 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Mar 17 18:41:59.075529 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Mar 17 18:41:59.077758 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Mar 17 18:41:59.077904 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Mar 17 18:41:59.078061 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Mar 17 18:41:59.078237 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Mar 17 18:41:59.078385 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Mar 17 18:41:59.078538 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Mar 17 18:41:59.078745 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc1e0-0xc1ef] Mar 17 18:41:59.078921 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Mar 17 18:41:59.079076 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Mar 17 18:41:59.079301 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Mar 17 18:41:59.079475 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Mar 17 18:41:59.079701 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Mar 17 18:41:59.079870 kernel: pci 0000:00:01.2: reg 0x20: [io 0xc180-0xc19f] Mar 17 18:41:59.080087 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Mar 17 18:41:59.080254 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Mar 17 18:41:59.080394 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Mar 17 18:41:59.080573 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Mar 17 18:41:59.080735 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Mar 17 18:41:59.080879 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Mar 17 18:41:59.081023 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebf0000-0xfebf0fff] Mar 17 18:41:59.081163 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Mar 17 18:41:59.081303 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Mar 17 18:41:59.081457 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Mar 17 18:41:59.081603 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc1a0-0xc1bf] Mar 17 18:41:59.081766 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebf1000-0xfebf1fff] Mar 17 18:41:59.081913 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Mar 17 18:41:59.082091 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Mar 17 18:41:59.082267 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc1c0-0xc1df] Mar 17 18:41:59.082417 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebf2000-0xfebf2fff] Mar 17 18:41:59.087763 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Mar 17 18:41:59.088010 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 Mar 17 18:41:59.088154 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc100-0xc13f] Mar 17 18:41:59.088290 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebf3000-0xfebf3fff] Mar 17 18:41:59.088423 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Mar 17 18:41:59.088631 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 Mar 17 18:41:59.088790 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc07f] Mar 17 18:41:59.088953 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfebf4000-0xfebf4fff] Mar 17 18:41:59.089091 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Mar 17 18:41:59.089298 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 Mar 17 18:41:59.089486 kernel: pci 0000:00:07.0: reg 0x10: [io 0xc080-0xc0ff] Mar 17 18:41:59.091815 kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfebf5000-0xfebf5fff] Mar 17 18:41:59.092042 kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfe814000-0xfe817fff 64bit pref] Mar 17 18:41:59.092257 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 Mar 17 18:41:59.092419 kernel: pci 0000:00:08.0: reg 0x10: [io 0xc140-0xc17f] Mar 17 18:41:59.093706 kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfe818000-0xfe81bfff 64bit pref] Mar 17 18:41:59.093755 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Mar 17 18:41:59.093777 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Mar 17 18:41:59.093800 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Mar 17 18:41:59.093831 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Mar 17 18:41:59.093853 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Mar 17 18:41:59.093876 kernel: iommu: Default domain type: Translated Mar 17 18:41:59.093899 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Mar 17 18:41:59.094096 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Mar 17 18:41:59.094272 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Mar 17 18:41:59.094442 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Mar 17 18:41:59.094468 kernel: vgaarb: loaded Mar 17 18:41:59.094492 kernel: pps_core: LinuxPPS API ver. 1 registered Mar 17 18:41:59.094520 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Mar 17 18:41:59.094539 kernel: PTP clock support registered Mar 17 18:41:59.094578 kernel: PCI: Using ACPI for IRQ routing Mar 17 18:41:59.094600 kernel: PCI: pci_cache_line_size set to 64 bytes Mar 17 18:41:59.094614 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Mar 17 18:41:59.094627 kernel: e820: reserve RAM buffer [mem 0x7ffdb000-0x7fffffff] Mar 17 18:41:59.094643 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Mar 17 18:41:59.094666 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Mar 17 18:41:59.094692 kernel: clocksource: Switched to clocksource kvm-clock Mar 17 18:41:59.094715 kernel: VFS: Disk quotas dquot_6.6.0 Mar 17 18:41:59.094740 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Mar 17 18:41:59.094762 kernel: pnp: PnP ACPI init Mar 17 18:41:59.094785 kernel: pnp: PnP ACPI: found 4 devices Mar 17 18:41:59.094809 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Mar 17 18:41:59.094832 kernel: NET: Registered PF_INET protocol family Mar 17 18:41:59.094872 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Mar 17 18:41:59.094931 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Mar 17 18:41:59.094958 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Mar 17 18:41:59.094980 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Mar 17 18:41:59.095002 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Mar 17 18:41:59.095025 kernel: TCP: Hash tables configured (established 16384 bind 16384) Mar 17 18:41:59.095048 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Mar 17 18:41:59.095072 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Mar 17 18:41:59.095100 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Mar 17 18:41:59.095115 kernel: NET: Registered PF_XDP protocol family Mar 17 18:41:59.095315 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Mar 17 18:41:59.095470 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Mar 17 18:41:59.095619 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Mar 17 18:41:59.095752 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Mar 17 18:41:59.095884 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Mar 17 18:41:59.096044 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Mar 17 18:41:59.096237 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Mar 17 18:41:59.096393 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Mar 17 18:41:59.096414 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Mar 17 18:41:59.096583 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x740 took 47110 usecs Mar 17 18:41:59.096603 kernel: PCI: CLS 0 bytes, default 64 Mar 17 18:41:59.096617 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Mar 17 18:41:59.096632 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x21134f58f0d, max_idle_ns: 440795217993 ns Mar 17 18:41:59.096648 kernel: Initialise system trusted keyrings Mar 17 18:41:59.096663 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Mar 17 18:41:59.096678 kernel: Key type asymmetric registered Mar 17 18:41:59.096693 kernel: Asymmetric key parser 'x509' registered Mar 17 18:41:59.096708 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Mar 17 18:41:59.096729 kernel: io scheduler mq-deadline registered Mar 17 18:41:59.096741 kernel: io scheduler kyber registered Mar 17 18:41:59.096754 kernel: io scheduler bfq registered Mar 17 18:41:59.096768 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Mar 17 18:41:59.096783 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Mar 17 18:41:59.096797 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Mar 17 18:41:59.096812 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Mar 17 18:41:59.096828 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Mar 17 18:41:59.096844 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Mar 17 18:41:59.096860 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Mar 17 18:41:59.096872 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Mar 17 18:41:59.096888 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Mar 17 18:41:59.096901 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Mar 17 18:41:59.097086 kernel: rtc_cmos 00:03: RTC can wake from S4 Mar 17 18:41:59.097241 kernel: rtc_cmos 00:03: registered as rtc0 Mar 17 18:41:59.097374 kernel: rtc_cmos 00:03: setting system clock to 2025-03-17T18:41:58 UTC (1742236918) Mar 17 18:41:59.097512 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Mar 17 18:41:59.097534 kernel: intel_pstate: CPU model not supported Mar 17 18:41:59.097570 kernel: NET: Registered PF_INET6 protocol family Mar 17 18:41:59.097592 kernel: Segment Routing with IPv6 Mar 17 18:41:59.097614 kernel: In-situ OAM (IOAM) with IPv6 Mar 17 18:41:59.097637 kernel: NET: Registered PF_PACKET protocol family Mar 17 18:41:59.097661 kernel: Key type dns_resolver registered Mar 17 18:41:59.097688 kernel: IPI shorthand broadcast: enabled Mar 17 18:41:59.097703 kernel: sched_clock: Marking stable (831658053, 176649937)->(1247607879, -239299889) Mar 17 18:41:59.097724 kernel: registered taskstats version 1 Mar 17 18:41:59.097764 kernel: Loading compiled-in X.509 certificates Mar 17 18:41:59.097777 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.179-flatcar: d5b956bbabb2d386c0246a969032c0de9eaa8220' Mar 17 18:41:59.097790 kernel: Key type .fscrypt registered Mar 17 18:41:59.097803 kernel: Key type fscrypt-provisioning registered Mar 17 18:41:59.097816 kernel: ima: No TPM chip found, activating TPM-bypass! Mar 17 18:41:59.097828 kernel: ima: Allocated hash algorithm: sha1 Mar 17 18:41:59.097841 kernel: ima: No architecture policies found Mar 17 18:41:59.097856 kernel: clk: Disabling unused clocks Mar 17 18:41:59.097881 kernel: Freeing unused kernel image (initmem) memory: 47472K Mar 17 18:41:59.097893 kernel: Write protecting the kernel read-only data: 28672k Mar 17 18:41:59.097906 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Mar 17 18:41:59.097918 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K Mar 17 18:41:59.097929 kernel: Run /init as init process Mar 17 18:41:59.097942 kernel: with arguments: Mar 17 18:41:59.098011 kernel: /init Mar 17 18:41:59.098030 kernel: with environment: Mar 17 18:41:59.098042 kernel: HOME=/ Mar 17 18:41:59.098054 kernel: TERM=linux Mar 17 18:41:59.098075 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Mar 17 18:41:59.098093 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 17 18:41:59.098109 systemd[1]: Detected virtualization kvm. Mar 17 18:41:59.098122 systemd[1]: Detected architecture x86-64. Mar 17 18:41:59.098135 systemd[1]: Running in initrd. Mar 17 18:41:59.098147 systemd[1]: No hostname configured, using default hostname. Mar 17 18:41:59.098159 systemd[1]: Hostname set to . Mar 17 18:41:59.098182 systemd[1]: Initializing machine ID from VM UUID. Mar 17 18:41:59.098198 systemd[1]: Queued start job for default target initrd.target. Mar 17 18:41:59.098213 systemd[1]: Started systemd-ask-password-console.path. Mar 17 18:41:59.098225 systemd[1]: Reached target cryptsetup.target. Mar 17 18:41:59.098239 systemd[1]: Reached target paths.target. Mar 17 18:41:59.098252 systemd[1]: Reached target slices.target. Mar 17 18:41:59.098266 systemd[1]: Reached target swap.target. Mar 17 18:41:59.098279 systemd[1]: Reached target timers.target. Mar 17 18:41:59.098309 systemd[1]: Listening on iscsid.socket. Mar 17 18:41:59.098325 systemd[1]: Listening on iscsiuio.socket. Mar 17 18:41:59.098339 systemd[1]: Listening on systemd-journald-audit.socket. Mar 17 18:41:59.098353 systemd[1]: Listening on systemd-journald-dev-log.socket. Mar 17 18:41:59.098372 systemd[1]: Listening on systemd-journald.socket. Mar 17 18:41:59.098396 systemd[1]: Listening on systemd-networkd.socket. Mar 17 18:41:59.098420 systemd[1]: Listening on systemd-udevd-control.socket. Mar 17 18:41:59.098445 systemd[1]: Listening on systemd-udevd-kernel.socket. Mar 17 18:41:59.098482 systemd[1]: Reached target sockets.target. Mar 17 18:41:59.098501 systemd[1]: Starting kmod-static-nodes.service... Mar 17 18:41:59.098527 systemd[1]: Finished network-cleanup.service. Mar 17 18:41:59.103675 systemd[1]: Starting systemd-fsck-usr.service... Mar 17 18:41:59.103734 systemd[1]: Starting systemd-journald.service... Mar 17 18:41:59.103799 systemd[1]: Starting systemd-modules-load.service... Mar 17 18:41:59.103816 systemd[1]: Starting systemd-resolved.service... Mar 17 18:41:59.103830 systemd[1]: Starting systemd-vconsole-setup.service... Mar 17 18:41:59.103845 systemd[1]: Finished kmod-static-nodes.service. Mar 17 18:41:59.103861 kernel: audit: type=1130 audit(1742236919.067:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:41:59.103879 systemd[1]: Finished systemd-fsck-usr.service. Mar 17 18:41:59.103911 systemd-journald[184]: Journal started Mar 17 18:41:59.104051 systemd-journald[184]: Runtime Journal (/run/log/journal/9fac265d0c2e4e8ea4b8522543a2fdcf) is 4.9M, max 39.5M, 34.5M free. Mar 17 18:41:59.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:41:59.064292 systemd-modules-load[185]: Inserted module 'overlay' Mar 17 18:41:59.202730 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Mar 17 18:41:59.202774 kernel: Bridge firewalling registered Mar 17 18:41:59.202795 kernel: SCSI subsystem initialized Mar 17 18:41:59.202814 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Mar 17 18:41:59.202941 kernel: device-mapper: uevent: version 1.0.3 Mar 17 18:41:59.202962 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Mar 17 18:41:59.202980 systemd[1]: Started systemd-journald.service. Mar 17 18:41:59.203004 kernel: audit: type=1130 audit(1742236919.193:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:41:59.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:41:59.133843 systemd-modules-load[185]: Inserted module 'br_netfilter' Mar 17 18:41:59.209493 kernel: audit: type=1130 audit(1742236919.202:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:41:59.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:41:59.148765 systemd-resolved[186]: Positive Trust Anchors: Mar 17 18:41:59.216468 kernel: audit: type=1130 audit(1742236919.209:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:41:59.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:41:59.148791 systemd-resolved[186]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 17 18:41:59.228951 kernel: audit: type=1130 audit(1742236919.215:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:41:59.229032 kernel: audit: type=1130 audit(1742236919.216:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:41:59.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:41:59.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:41:59.148853 systemd-resolved[186]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 17 18:41:59.158449 systemd-resolved[186]: Defaulting to hostname 'linux'. Mar 17 18:41:59.186364 systemd-modules-load[185]: Inserted module 'dm_multipath' Mar 17 18:41:59.203884 systemd[1]: Started systemd-resolved.service. Mar 17 18:41:59.211101 systemd[1]: Finished systemd-modules-load.service. Mar 17 18:41:59.216160 systemd[1]: Finished systemd-vconsole-setup.service. Mar 17 18:41:59.217253 systemd[1]: Reached target nss-lookup.target. Mar 17 18:41:59.230834 systemd[1]: Starting dracut-cmdline-ask.service... Mar 17 18:41:59.235150 systemd[1]: Starting systemd-sysctl.service... Mar 17 18:41:59.249016 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Mar 17 18:41:59.268772 systemd[1]: Finished systemd-sysctl.service. Mar 17 18:41:59.291361 kernel: audit: type=1130 audit(1742236919.269:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:41:59.291414 kernel: audit: type=1130 audit(1742236919.289:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:41:59.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:41:59.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:41:59.270504 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Mar 17 18:41:59.291166 systemd[1]: Finished dracut-cmdline-ask.service. Mar 17 18:41:59.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:41:59.299869 systemd[1]: Starting dracut-cmdline.service... Mar 17 18:41:59.306290 kernel: audit: type=1130 audit(1742236919.296:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:41:59.321495 dracut-cmdline[206]: dracut-dracut-053 Mar 17 18:41:59.327733 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 18:41:59.462612 kernel: Loading iSCSI transport class v2.0-870. Mar 17 18:41:59.491664 kernel: iscsi: registered transport (tcp) Mar 17 18:41:59.529524 kernel: iscsi: registered transport (qla4xxx) Mar 17 18:41:59.529666 kernel: QLogic iSCSI HBA Driver Mar 17 18:41:59.597272 systemd[1]: Finished dracut-cmdline.service. Mar 17 18:41:59.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:41:59.599681 systemd[1]: Starting dracut-pre-udev.service... Mar 17 18:41:59.667631 kernel: raid6: avx2x4 gen() 15769 MB/s Mar 17 18:41:59.685609 kernel: raid6: avx2x4 xor() 8607 MB/s Mar 17 18:41:59.703631 kernel: raid6: avx2x2 gen() 15883 MB/s Mar 17 18:41:59.721611 kernel: raid6: avx2x2 xor() 16322 MB/s Mar 17 18:41:59.739618 kernel: raid6: avx2x1 gen() 12621 MB/s Mar 17 18:41:59.757616 kernel: raid6: avx2x1 xor() 12841 MB/s Mar 17 18:41:59.775643 kernel: raid6: sse2x4 gen() 10426 MB/s Mar 17 18:41:59.793616 kernel: raid6: sse2x4 xor() 5801 MB/s Mar 17 18:41:59.811624 kernel: raid6: sse2x2 gen() 10782 MB/s Mar 17 18:41:59.829610 kernel: raid6: sse2x2 xor() 7338 MB/s Mar 17 18:41:59.847609 kernel: raid6: sse2x1 gen() 10939 MB/s Mar 17 18:41:59.866038 kernel: raid6: sse2x1 xor() 5293 MB/s Mar 17 18:41:59.866138 kernel: raid6: using algorithm avx2x2 gen() 15883 MB/s Mar 17 18:41:59.866161 kernel: raid6: .... xor() 16322 MB/s, rmw enabled Mar 17 18:41:59.867248 kernel: raid6: using avx2x2 recovery algorithm Mar 17 18:41:59.885597 kernel: xor: automatically using best checksumming function avx Mar 17 18:42:00.018602 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Mar 17 18:42:00.035009 systemd[1]: Finished dracut-pre-udev.service. Mar 17 18:42:00.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:00.036000 audit: BPF prog-id=7 op=LOAD Mar 17 18:42:00.036000 audit: BPF prog-id=8 op=LOAD Mar 17 18:42:00.037487 systemd[1]: Starting systemd-udevd.service... Mar 17 18:42:00.057472 systemd-udevd[383]: Using default interface naming scheme 'v252'. Mar 17 18:42:00.068477 systemd[1]: Started systemd-udevd.service. Mar 17 18:42:00.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:00.074236 systemd[1]: Starting dracut-pre-trigger.service... Mar 17 18:42:00.096836 dracut-pre-trigger[397]: rd.md=0: removing MD RAID activation Mar 17 18:42:00.150994 systemd[1]: Finished dracut-pre-trigger.service. Mar 17 18:42:00.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:00.152888 systemd[1]: Starting systemd-udev-trigger.service... Mar 17 18:42:00.229669 systemd[1]: Finished systemd-udev-trigger.service. Mar 17 18:42:00.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:00.316609 kernel: scsi host0: Virtio SCSI HBA Mar 17 18:42:00.321603 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Mar 17 18:42:00.393383 kernel: cryptd: max_cpu_qlen set to 1000 Mar 17 18:42:00.393417 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Mar 17 18:42:00.393440 kernel: GPT:9289727 != 125829119 Mar 17 18:42:00.393460 kernel: GPT:Alternate GPT header not at the end of the disk. Mar 17 18:42:00.393481 kernel: GPT:9289727 != 125829119 Mar 17 18:42:00.393503 kernel: GPT: Use GNU Parted to correct GPT errors. Mar 17 18:42:00.393524 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Mar 17 18:42:00.393561 kernel: AVX2 version of gcm_enc/dec engaged. Mar 17 18:42:00.396579 kernel: virtio_blk virtio5: [vdb] 932 512-byte logical blocks (477 kB/466 KiB) Mar 17 18:42:00.405870 kernel: AES CTR mode by8 optimization enabled Mar 17 18:42:00.439578 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (439) Mar 17 18:42:00.457584 kernel: libata version 3.00 loaded. Mar 17 18:42:00.465686 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Mar 17 18:42:00.556167 kernel: ata_piix 0000:00:01.1: version 2.13 Mar 17 18:42:00.556480 kernel: ACPI: bus type USB registered Mar 17 18:42:00.556532 kernel: usbcore: registered new interface driver usbfs Mar 17 18:42:00.556573 kernel: usbcore: registered new interface driver hub Mar 17 18:42:00.556595 kernel: usbcore: registered new device driver usb Mar 17 18:42:00.556618 kernel: scsi host1: ata_piix Mar 17 18:42:00.556809 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Mar 17 18:42:00.556832 kernel: ehci-pci: EHCI PCI platform driver Mar 17 18:42:00.556855 kernel: scsi host2: ata_piix Mar 17 18:42:00.557044 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 Mar 17 18:42:00.557085 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 Mar 17 18:42:00.557108 kernel: uhci_hcd: USB Universal Host Controller Interface driver Mar 17 18:42:00.557130 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Mar 17 18:42:00.557313 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Mar 17 18:42:00.557487 kernel: uhci_hcd 0000:00:01.2: detected 2 ports Mar 17 18:42:00.557689 kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c180 Mar 17 18:42:00.557844 kernel: hub 1-0:1.0: USB hub found Mar 17 18:42:00.558052 kernel: hub 1-0:1.0: 2 ports detected Mar 17 18:42:00.567490 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Mar 17 18:42:00.573364 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Mar 17 18:42:00.574366 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Mar 17 18:42:00.585382 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Mar 17 18:42:00.587588 systemd[1]: Starting disk-uuid.service... Mar 17 18:42:00.595886 disk-uuid[503]: Primary Header is updated. Mar 17 18:42:00.595886 disk-uuid[503]: Secondary Entries is updated. Mar 17 18:42:00.595886 disk-uuid[503]: Secondary Header is updated. Mar 17 18:42:00.600057 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Mar 17 18:42:00.624586 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Mar 17 18:42:01.620577 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Mar 17 18:42:01.621070 disk-uuid[504]: The operation has completed successfully. Mar 17 18:42:01.684481 systemd[1]: disk-uuid.service: Deactivated successfully. Mar 17 18:42:01.684635 systemd[1]: Finished disk-uuid.service. Mar 17 18:42:01.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:01.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:01.696831 systemd[1]: Starting verity-setup.service... Mar 17 18:42:01.724722 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Mar 17 18:42:01.789106 systemd[1]: Found device dev-mapper-usr.device. Mar 17 18:42:01.793021 systemd[1]: Mounting sysusr-usr.mount... Mar 17 18:42:01.795306 systemd[1]: Finished verity-setup.service. Mar 17 18:42:01.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:01.898585 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Mar 17 18:42:01.900231 systemd[1]: Mounted sysusr-usr.mount. Mar 17 18:42:01.901885 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Mar 17 18:42:01.904449 systemd[1]: Starting ignition-setup.service... Mar 17 18:42:01.906724 systemd[1]: Starting parse-ip-for-networkd.service... Mar 17 18:42:01.931652 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Mar 17 18:42:01.931779 kernel: BTRFS info (device vda6): using free space tree Mar 17 18:42:01.931804 kernel: BTRFS info (device vda6): has skinny extents Mar 17 18:42:01.956672 systemd[1]: mnt-oem.mount: Deactivated successfully. Mar 17 18:42:01.970243 systemd[1]: Finished ignition-setup.service. Mar 17 18:42:01.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:01.972899 systemd[1]: Starting ignition-fetch-offline.service... Mar 17 18:42:02.124954 systemd[1]: Finished parse-ip-for-networkd.service. Mar 17 18:42:02.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:02.127000 audit: BPF prog-id=9 op=LOAD Mar 17 18:42:02.128801 systemd[1]: Starting systemd-networkd.service... Mar 17 18:42:02.158244 ignition[611]: Ignition 2.14.0 Mar 17 18:42:02.159498 ignition[611]: Stage: fetch-offline Mar 17 18:42:02.160408 ignition[611]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:42:02.161416 ignition[611]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Mar 17 18:42:02.167600 systemd-networkd[687]: lo: Link UP Mar 17 18:42:02.167613 systemd-networkd[687]: lo: Gained carrier Mar 17 18:42:02.169231 systemd-networkd[687]: Enumeration completed Mar 17 18:42:02.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:02.170200 systemd[1]: Started systemd-networkd.service. Mar 17 18:42:02.170224 systemd-networkd[687]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 18:42:02.171249 systemd[1]: Reached target network.target. Mar 17 18:42:02.172553 systemd-networkd[687]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. Mar 17 18:42:02.181227 ignition[611]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Mar 17 18:42:02.175116 systemd[1]: Starting iscsiuio.service... Mar 17 18:42:02.181392 ignition[611]: parsed url from cmdline: "" Mar 17 18:42:02.175234 systemd-networkd[687]: eth1: Link UP Mar 17 18:42:02.181402 ignition[611]: no config URL provided Mar 17 18:42:02.175243 systemd-networkd[687]: eth1: Gained carrier Mar 17 18:42:02.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:02.181414 ignition[611]: reading system config file "/usr/lib/ignition/user.ign" Mar 17 18:42:02.186760 systemd[1]: Finished ignition-fetch-offline.service. Mar 17 18:42:02.181430 ignition[611]: no config at "/usr/lib/ignition/user.ign" Mar 17 18:42:02.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:02.188752 systemd[1]: Starting ignition-fetch.service... Mar 17 18:42:02.181440 ignition[611]: failed to fetch config: resource requires networking Mar 17 18:42:02.192326 systemd-networkd[687]: eth0: Link UP Mar 17 18:42:02.181635 ignition[611]: Ignition finished successfully Mar 17 18:42:02.192334 systemd-networkd[687]: eth0: Gained carrier Mar 17 18:42:02.221359 iscsid[697]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Mar 17 18:42:02.221359 iscsid[697]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Mar 17 18:42:02.221359 iscsid[697]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Mar 17 18:42:02.221359 iscsid[697]: If using hardware iscsi like qla4xxx this message can be ignored. Mar 17 18:42:02.221359 iscsid[697]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Mar 17 18:42:02.221359 iscsid[697]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Mar 17 18:42:02.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:02.211172 systemd[1]: Started iscsiuio.service. Mar 17 18:42:02.226646 ignition[691]: Ignition 2.14.0 Mar 17 18:42:02.213200 systemd[1]: Starting iscsid.service... Mar 17 18:42:02.226655 ignition[691]: Stage: fetch Mar 17 18:42:02.226080 systemd[1]: Started iscsid.service. Mar 17 18:42:02.226934 ignition[691]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:42:02.227694 systemd-networkd[687]: eth1: DHCPv4 address 10.124.0.24/20 acquired from 169.254.169.253 Mar 17 18:42:02.226971 ignition[691]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Mar 17 18:42:02.228429 systemd[1]: Starting dracut-initqueue.service... Mar 17 18:42:02.237826 systemd-networkd[687]: eth0: DHCPv4 address 64.23.131.98/20, gateway 64.23.128.1 acquired from 169.254.169.253 Mar 17 18:42:02.243464 ignition[691]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Mar 17 18:42:02.243629 ignition[691]: parsed url from cmdline: "" Mar 17 18:42:02.243634 ignition[691]: no config URL provided Mar 17 18:42:02.243645 ignition[691]: reading system config file "/usr/lib/ignition/user.ign" Mar 17 18:42:02.243659 ignition[691]: no config at "/usr/lib/ignition/user.ign" Mar 17 18:42:02.243720 ignition[691]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 Mar 17 18:42:02.259906 systemd[1]: Finished dracut-initqueue.service. Mar 17 18:42:02.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:02.260926 systemd[1]: Reached target remote-fs-pre.target. Mar 17 18:42:02.261931 systemd[1]: Reached target remote-cryptsetup.target. Mar 17 18:42:02.263276 systemd[1]: Reached target remote-fs.target. Mar 17 18:42:02.266221 systemd[1]: Starting dracut-pre-mount.service... Mar 17 18:42:02.283981 systemd[1]: Finished dracut-pre-mount.service. Mar 17 18:42:02.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:02.287069 ignition[691]: GET result: OK Mar 17 18:42:02.287208 ignition[691]: parsing config with SHA512: 7ee1d37a39b3eb40cb01242535718b90d7d4b69e9d3fce25bf021aa23346069eff9db4251250bf2b1be0313b45ee9c05ea68b0513464004f82cf05a2fa931fbc Mar 17 18:42:02.299379 unknown[691]: fetched base config from "system" Mar 17 18:42:02.299397 unknown[691]: fetched base config from "system" Mar 17 18:42:02.299828 ignition[691]: fetch: fetch complete Mar 17 18:42:02.299406 unknown[691]: fetched user config from "digitalocean" Mar 17 18:42:02.299837 ignition[691]: fetch: fetch passed Mar 17 18:42:02.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:02.302013 systemd[1]: Finished ignition-fetch.service. Mar 17 18:42:02.299910 ignition[691]: Ignition finished successfully Mar 17 18:42:02.304800 systemd[1]: Starting ignition-kargs.service... Mar 17 18:42:02.325662 ignition[712]: Ignition 2.14.0 Mar 17 18:42:02.325680 ignition[712]: Stage: kargs Mar 17 18:42:02.325955 ignition[712]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:42:02.325980 ignition[712]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Mar 17 18:42:02.329412 ignition[712]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Mar 17 18:42:02.330956 ignition[712]: kargs: kargs passed Mar 17 18:42:02.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:02.332213 systemd[1]: Finished ignition-kargs.service. Mar 17 18:42:02.331022 ignition[712]: Ignition finished successfully Mar 17 18:42:02.334343 systemd[1]: Starting ignition-disks.service... Mar 17 18:42:02.348280 ignition[717]: Ignition 2.14.0 Mar 17 18:42:02.348292 ignition[717]: Stage: disks Mar 17 18:42:02.348488 ignition[717]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:42:02.348514 ignition[717]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Mar 17 18:42:02.351392 ignition[717]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Mar 17 18:42:02.352711 ignition[717]: disks: disks passed Mar 17 18:42:02.352775 ignition[717]: Ignition finished successfully Mar 17 18:42:02.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:02.353878 systemd[1]: Finished ignition-disks.service. Mar 17 18:42:02.354970 systemd[1]: Reached target initrd-root-device.target. Mar 17 18:42:02.355870 systemd[1]: Reached target local-fs-pre.target. Mar 17 18:42:02.357046 systemd[1]: Reached target local-fs.target. Mar 17 18:42:02.358183 systemd[1]: Reached target sysinit.target. Mar 17 18:42:02.359258 systemd[1]: Reached target basic.target. Mar 17 18:42:02.362110 systemd[1]: Starting systemd-fsck-root.service... Mar 17 18:42:02.384058 systemd-fsck[724]: ROOT: clean, 623/553520 files, 56022/553472 blocks Mar 17 18:42:02.390261 systemd[1]: Finished systemd-fsck-root.service. Mar 17 18:42:02.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:02.394002 systemd[1]: Mounting sysroot.mount... Mar 17 18:42:02.410680 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Mar 17 18:42:02.411389 systemd[1]: Mounted sysroot.mount. Mar 17 18:42:02.412735 systemd[1]: Reached target initrd-root-fs.target. Mar 17 18:42:02.415942 systemd[1]: Mounting sysroot-usr.mount... Mar 17 18:42:02.419032 systemd[1]: Starting flatcar-digitalocean-network.service... Mar 17 18:42:02.423299 systemd[1]: Starting flatcar-metadata-hostname.service... Mar 17 18:42:02.425435 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Mar 17 18:42:02.426672 systemd[1]: Reached target ignition-diskful.target. Mar 17 18:42:02.431167 systemd[1]: Mounted sysroot-usr.mount. Mar 17 18:42:02.435985 systemd[1]: Starting initrd-setup-root.service... Mar 17 18:42:02.448231 initrd-setup-root[736]: cut: /sysroot/etc/passwd: No such file or directory Mar 17 18:42:02.465287 initrd-setup-root[744]: cut: /sysroot/etc/group: No such file or directory Mar 17 18:42:02.476462 initrd-setup-root[752]: cut: /sysroot/etc/shadow: No such file or directory Mar 17 18:42:02.488130 initrd-setup-root[762]: cut: /sysroot/etc/gshadow: No such file or directory Mar 17 18:42:02.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:02.597076 systemd[1]: Finished initrd-setup-root.service. Mar 17 18:42:02.599321 systemd[1]: Starting ignition-mount.service... Mar 17 18:42:02.605907 systemd[1]: Starting sysroot-boot.service... Mar 17 18:42:02.617627 bash[781]: umount: /sysroot/usr/share/oem: not mounted. Mar 17 18:42:02.630894 coreos-metadata[730]: Mar 17 18:42:02.630 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Mar 17 18:42:02.647907 coreos-metadata[730]: Mar 17 18:42:02.647 INFO Fetch successful Mar 17 18:42:02.657693 ignition[782]: INFO : Ignition 2.14.0 Mar 17 18:42:02.657693 ignition[782]: INFO : Stage: mount Mar 17 18:42:02.659829 ignition[782]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:42:02.659829 ignition[782]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Mar 17 18:42:02.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:02.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:02.662710 systemd[1]: flatcar-digitalocean-network.service: Deactivated successfully. Mar 17 18:42:02.666664 ignition[782]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Mar 17 18:42:02.666664 ignition[782]: INFO : mount: mount passed Mar 17 18:42:02.666664 ignition[782]: INFO : Ignition finished successfully Mar 17 18:42:02.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:02.662970 systemd[1]: Finished flatcar-digitalocean-network.service. Mar 17 18:42:02.665767 systemd[1]: Finished ignition-mount.service. Mar 17 18:42:02.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:02.677379 systemd[1]: Finished sysroot-boot.service. Mar 17 18:42:02.693559 coreos-metadata[731]: Mar 17 18:42:02.693 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Mar 17 18:42:02.708832 coreos-metadata[731]: Mar 17 18:42:02.708 INFO Fetch successful Mar 17 18:42:02.716024 coreos-metadata[731]: Mar 17 18:42:02.715 INFO wrote hostname ci-3510.3.7-c-f6a0b63c70 to /sysroot/etc/hostname Mar 17 18:42:02.718662 systemd[1]: Finished flatcar-metadata-hostname.service. Mar 17 18:42:02.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:02.816818 systemd[1]: Mounting sysroot-usr-share-oem.mount... Mar 17 18:42:02.837641 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (791) Mar 17 18:42:02.842350 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Mar 17 18:42:02.842508 kernel: BTRFS info (device vda6): using free space tree Mar 17 18:42:02.842534 kernel: BTRFS info (device vda6): has skinny extents Mar 17 18:42:02.867195 systemd[1]: Mounted sysroot-usr-share-oem.mount. Mar 17 18:42:02.870660 systemd[1]: Starting ignition-files.service... Mar 17 18:42:02.899103 ignition[811]: INFO : Ignition 2.14.0 Mar 17 18:42:02.899103 ignition[811]: INFO : Stage: files Mar 17 18:42:02.900828 ignition[811]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:42:02.900828 ignition[811]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Mar 17 18:42:02.903314 ignition[811]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Mar 17 18:42:02.904647 ignition[811]: DEBUG : files: compiled without relabeling support, skipping Mar 17 18:42:02.906102 ignition[811]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Mar 17 18:42:02.906102 ignition[811]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Mar 17 18:42:02.910603 ignition[811]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Mar 17 18:42:02.910603 ignition[811]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Mar 17 18:42:02.913762 ignition[811]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Mar 17 18:42:02.911697 unknown[811]: wrote ssh authorized keys file for user: core Mar 17 18:42:02.916171 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Mar 17 18:42:02.916171 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Mar 17 18:42:02.916171 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Mar 17 18:42:02.916171 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Mar 17 18:42:02.916171 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" Mar 17 18:42:02.916171 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" Mar 17 18:42:02.916171 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" Mar 17 18:42:02.916171 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-x86-64.raw: attempt #1 Mar 17 18:42:03.297111 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Mar 17 18:42:03.396964 systemd-networkd[687]: eth1: Gained IPv6LL Mar 17 18:42:03.695833 ignition[811]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" Mar 17 18:42:03.695833 ignition[811]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" Mar 17 18:42:03.695833 ignition[811]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" Mar 17 18:42:03.695833 ignition[811]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Mar 17 18:42:03.701162 ignition[811]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Mar 17 18:42:03.709510 ignition[811]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Mar 17 18:42:03.709510 ignition[811]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Mar 17 18:42:03.709510 ignition[811]: INFO : files: files passed Mar 17 18:42:03.709510 ignition[811]: INFO : Ignition finished successfully Mar 17 18:42:03.715642 systemd[1]: Finished ignition-files.service. Mar 17 18:42:03.731060 kernel: kauditd_printk_skb: 29 callbacks suppressed Mar 17 18:42:03.731107 kernel: audit: type=1130 audit(1742236923.716:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.721017 systemd[1]: Starting initrd-setup-root-after-ignition.service... Mar 17 18:42:03.726622 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Mar 17 18:42:03.729865 systemd[1]: Starting ignition-quench.service... Mar 17 18:42:03.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.736675 systemd[1]: ignition-quench.service: Deactivated successfully. Mar 17 18:42:03.745068 kernel: audit: type=1130 audit(1742236923.737:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.736861 systemd[1]: Finished ignition-quench.service. Mar 17 18:42:03.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.749289 initrd-setup-root-after-ignition[836]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Mar 17 18:42:03.753161 kernel: audit: type=1131 audit(1742236923.737:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.751980 systemd[1]: Finished initrd-setup-root-after-ignition.service. Mar 17 18:42:03.760410 kernel: audit: type=1130 audit(1742236923.753:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.754338 systemd[1]: Reached target ignition-complete.target. Mar 17 18:42:03.762758 systemd[1]: Starting initrd-parse-etc.service... Mar 17 18:42:03.790408 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Mar 17 18:42:03.791689 systemd[1]: Finished initrd-parse-etc.service. Mar 17 18:42:03.793469 systemd[1]: Reached target initrd-fs.target. Mar 17 18:42:03.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.800054 kernel: audit: type=1130 audit(1742236923.791:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.800147 kernel: audit: type=1131 audit(1742236923.791:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.805350 systemd[1]: Reached target initrd.target. Mar 17 18:42:03.807116 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Mar 17 18:42:03.810216 systemd[1]: Starting dracut-pre-pivot.service... Mar 17 18:42:03.834447 systemd[1]: Finished dracut-pre-pivot.service. Mar 17 18:42:03.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.837790 systemd[1]: Starting initrd-cleanup.service... Mar 17 18:42:03.844468 kernel: audit: type=1130 audit(1742236923.834:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.845084 systemd-networkd[687]: eth0: Gained IPv6LL Mar 17 18:42:03.861274 systemd[1]: Stopped target nss-lookup.target. Mar 17 18:42:03.862234 systemd[1]: Stopped target remote-cryptsetup.target. Mar 17 18:42:03.863735 systemd[1]: Stopped target timers.target. Mar 17 18:42:03.865250 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Mar 17 18:42:03.865661 systemd[1]: Stopped dracut-pre-pivot.service. Mar 17 18:42:03.873079 kernel: audit: type=1131 audit(1742236923.866:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.868954 systemd[1]: Stopped target initrd.target. Mar 17 18:42:03.874282 systemd[1]: Stopped target basic.target. Mar 17 18:42:03.875372 systemd[1]: Stopped target ignition-complete.target. Mar 17 18:42:03.876573 systemd[1]: Stopped target ignition-diskful.target. Mar 17 18:42:03.878214 systemd[1]: Stopped target initrd-root-device.target. Mar 17 18:42:03.879568 systemd[1]: Stopped target remote-fs.target. Mar 17 18:42:03.880713 systemd[1]: Stopped target remote-fs-pre.target. Mar 17 18:42:03.881878 systemd[1]: Stopped target sysinit.target. Mar 17 18:42:03.883051 systemd[1]: Stopped target local-fs.target. Mar 17 18:42:03.884130 systemd[1]: Stopped target local-fs-pre.target. Mar 17 18:42:03.885174 systemd[1]: Stopped target swap.target. Mar 17 18:42:03.886187 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Mar 17 18:42:03.893529 kernel: audit: type=1131 audit(1742236923.886:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.886530 systemd[1]: Stopped dracut-pre-mount.service. Mar 17 18:42:03.887754 systemd[1]: Stopped target cryptsetup.target. Mar 17 18:42:03.901909 kernel: audit: type=1131 audit(1742236923.895:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.894447 systemd[1]: dracut-initqueue.service: Deactivated successfully. Mar 17 18:42:03.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.894834 systemd[1]: Stopped dracut-initqueue.service. Mar 17 18:42:03.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.896091 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Mar 17 18:42:03.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.896425 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Mar 17 18:42:03.903017 systemd[1]: ignition-files.service: Deactivated successfully. Mar 17 18:42:03.903312 systemd[1]: Stopped ignition-files.service. Mar 17 18:42:03.904302 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Mar 17 18:42:03.904596 systemd[1]: Stopped flatcar-metadata-hostname.service. Mar 17 18:42:03.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.944263 ignition[849]: INFO : Ignition 2.14.0 Mar 17 18:42:03.944263 ignition[849]: INFO : Stage: umount Mar 17 18:42:03.944263 ignition[849]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:42:03.944263 ignition[849]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Mar 17 18:42:03.944263 ignition[849]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Mar 17 18:42:03.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.909112 systemd[1]: Stopping ignition-mount.service... Mar 17 18:42:03.952884 ignition[849]: INFO : umount: umount passed Mar 17 18:42:03.952884 ignition[849]: INFO : Ignition finished successfully Mar 17 18:42:03.923622 systemd[1]: Stopping iscsiuio.service... Mar 17 18:42:03.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.930253 systemd[1]: Stopping sysroot-boot.service... Mar 17 18:42:03.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.939288 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Mar 17 18:42:03.939614 systemd[1]: Stopped systemd-udev-trigger.service. Mar 17 18:42:03.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.940597 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Mar 17 18:42:03.940816 systemd[1]: Stopped dracut-pre-trigger.service. Mar 17 18:42:03.945625 systemd[1]: iscsiuio.service: Deactivated successfully. Mar 17 18:42:03.947595 systemd[1]: Stopped iscsiuio.service. Mar 17 18:42:03.954261 systemd[1]: ignition-mount.service: Deactivated successfully. Mar 17 18:42:03.954473 systemd[1]: Stopped ignition-mount.service. Mar 17 18:42:03.959644 systemd[1]: initrd-cleanup.service: Deactivated successfully. Mar 17 18:42:03.959836 systemd[1]: Finished initrd-cleanup.service. Mar 17 18:42:03.962473 systemd[1]: ignition-disks.service: Deactivated successfully. Mar 17 18:42:03.962617 systemd[1]: Stopped ignition-disks.service. Mar 17 18:42:03.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.963428 systemd[1]: ignition-kargs.service: Deactivated successfully. Mar 17 18:42:03.963507 systemd[1]: Stopped ignition-kargs.service. Mar 17 18:42:03.964216 systemd[1]: ignition-fetch.service: Deactivated successfully. Mar 17 18:42:03.964292 systemd[1]: Stopped ignition-fetch.service. Mar 17 18:42:03.968608 systemd[1]: Stopped target network.target. Mar 17 18:42:03.971297 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Mar 17 18:42:03.971400 systemd[1]: Stopped ignition-fetch-offline.service. Mar 17 18:42:03.972945 systemd[1]: Stopped target paths.target. Mar 17 18:42:03.974400 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Mar 17 18:42:03.978693 systemd[1]: Stopped systemd-ask-password-console.path. Mar 17 18:42:03.980259 systemd[1]: Stopped target slices.target. Mar 17 18:42:03.981677 systemd[1]: Stopped target sockets.target. Mar 17 18:42:03.988211 systemd[1]: iscsid.socket: Deactivated successfully. Mar 17 18:42:03.988278 systemd[1]: Closed iscsid.socket. Mar 17 18:42:03.989604 systemd[1]: iscsiuio.socket: Deactivated successfully. Mar 17 18:42:03.989691 systemd[1]: Closed iscsiuio.socket. Mar 17 18:42:04.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.990736 systemd[1]: ignition-setup.service: Deactivated successfully. Mar 17 18:42:03.990961 systemd[1]: Stopped ignition-setup.service. Mar 17 18:42:04.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:03.996354 systemd[1]: Stopping systemd-networkd.service... Mar 17 18:42:04.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:04.023000 audit: BPF prog-id=6 op=UNLOAD Mar 17 18:42:03.997931 systemd[1]: Stopping systemd-resolved.service... Mar 17 18:42:04.000643 systemd-networkd[687]: eth1: DHCPv6 lease lost Mar 17 18:42:04.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:04.002506 systemd[1]: sysroot-boot.mount: Deactivated successfully. Mar 17 18:42:04.006196 systemd-networkd[687]: eth0: DHCPv6 lease lost Mar 17 18:42:04.010065 systemd[1]: systemd-networkd.service: Deactivated successfully. Mar 17 18:42:04.028000 audit: BPF prog-id=9 op=UNLOAD Mar 17 18:42:04.010264 systemd[1]: Stopped systemd-networkd.service. Mar 17 18:42:04.020308 systemd[1]: systemd-resolved.service: Deactivated successfully. Mar 17 18:42:04.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:04.020494 systemd[1]: Stopped systemd-resolved.service. Mar 17 18:42:04.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:04.022441 systemd[1]: sysroot-boot.service: Deactivated successfully. Mar 17 18:42:04.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:04.022716 systemd[1]: Stopped sysroot-boot.service. Mar 17 18:42:04.023930 systemd[1]: systemd-networkd.socket: Deactivated successfully. Mar 17 18:42:04.024004 systemd[1]: Closed systemd-networkd.socket. Mar 17 18:42:04.024774 systemd[1]: initrd-setup-root.service: Deactivated successfully. Mar 17 18:42:04.024854 systemd[1]: Stopped initrd-setup-root.service. Mar 17 18:42:04.027737 systemd[1]: Stopping network-cleanup.service... Mar 17 18:42:04.031436 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Mar 17 18:42:04.031577 systemd[1]: Stopped parse-ip-for-networkd.service. Mar 17 18:42:04.033317 systemd[1]: systemd-sysctl.service: Deactivated successfully. Mar 17 18:42:04.033409 systemd[1]: Stopped systemd-sysctl.service. Mar 17 18:42:04.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:04.035273 systemd[1]: systemd-modules-load.service: Deactivated successfully. Mar 17 18:42:04.035364 systemd[1]: Stopped systemd-modules-load.service. Mar 17 18:42:04.036751 systemd[1]: Stopping systemd-udevd.service... Mar 17 18:42:04.046060 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Mar 17 18:42:04.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:04.050697 systemd[1]: systemd-udevd.service: Deactivated successfully. Mar 17 18:42:04.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:04.051009 systemd[1]: Stopped systemd-udevd.service. Mar 17 18:42:04.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:04.052974 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Mar 17 18:42:04.053035 systemd[1]: Closed systemd-udevd-control.socket. Mar 17 18:42:04.057297 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Mar 17 18:42:04.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:04.057382 systemd[1]: Closed systemd-udevd-kernel.socket. Mar 17 18:42:04.059135 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Mar 17 18:42:04.059238 systemd[1]: Stopped dracut-pre-udev.service. Mar 17 18:42:04.060053 systemd[1]: dracut-cmdline.service: Deactivated successfully. Mar 17 18:42:04.060156 systemd[1]: Stopped dracut-cmdline.service. Mar 17 18:42:04.061699 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Mar 17 18:42:04.061815 systemd[1]: Stopped dracut-cmdline-ask.service. Mar 17 18:42:04.064324 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Mar 17 18:42:04.065097 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Mar 17 18:42:04.065536 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Mar 17 18:42:04.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:04.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:04.074863 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Mar 17 18:42:04.074979 systemd[1]: Stopped kmod-static-nodes.service. Mar 17 18:42:04.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:04.077791 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Mar 17 18:42:04.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:04.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:04.077876 systemd[1]: Stopped systemd-vconsole-setup.service. Mar 17 18:42:04.081447 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Mar 17 18:42:04.082637 systemd[1]: network-cleanup.service: Deactivated successfully. Mar 17 18:42:04.082854 systemd[1]: Stopped network-cleanup.service. Mar 17 18:42:04.084339 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Mar 17 18:42:04.084500 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Mar 17 18:42:04.085726 systemd[1]: Reached target initrd-switch-root.target. Mar 17 18:42:04.088270 systemd[1]: Starting initrd-switch-root.service... Mar 17 18:42:04.108873 systemd[1]: Switching root. Mar 17 18:42:04.137746 iscsid[697]: iscsid shutting down. Mar 17 18:42:04.138584 systemd-journald[184]: Received SIGTERM from PID 1 (n/a). Mar 17 18:42:04.138701 systemd-journald[184]: Journal stopped Mar 17 18:42:09.844084 kernel: SELinux: Class mctp_socket not defined in policy. Mar 17 18:42:09.844175 kernel: SELinux: Class anon_inode not defined in policy. Mar 17 18:42:09.844211 kernel: SELinux: the above unknown classes and permissions will be allowed Mar 17 18:42:09.844229 kernel: SELinux: policy capability network_peer_controls=1 Mar 17 18:42:09.844246 kernel: SELinux: policy capability open_perms=1 Mar 17 18:42:09.844264 kernel: SELinux: policy capability extended_socket_class=1 Mar 17 18:42:09.844281 kernel: SELinux: policy capability always_check_network=0 Mar 17 18:42:09.844303 kernel: SELinux: policy capability cgroup_seclabel=1 Mar 17 18:42:09.844320 kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 17 18:42:09.844337 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Mar 17 18:42:09.844361 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Mar 17 18:42:09.844385 systemd[1]: Successfully loaded SELinux policy in 72.072ms. Mar 17 18:42:09.844415 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 15.734ms. Mar 17 18:42:09.844435 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 17 18:42:09.844455 systemd[1]: Detected virtualization kvm. Mar 17 18:42:09.844473 systemd[1]: Detected architecture x86-64. Mar 17 18:42:09.844490 systemd[1]: Detected first boot. Mar 17 18:42:09.844509 systemd[1]: Hostname set to . Mar 17 18:42:09.844605 systemd[1]: Initializing machine ID from VM UUID. Mar 17 18:42:09.844627 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Mar 17 18:42:09.844645 systemd[1]: Populated /etc with preset unit settings. Mar 17 18:42:09.844664 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:42:09.844705 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:42:09.844726 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:42:09.844745 kernel: kauditd_printk_skb: 49 callbacks suppressed Mar 17 18:42:09.844763 kernel: audit: type=1334 audit(1742236929.548:92): prog-id=12 op=LOAD Mar 17 18:42:09.844780 kernel: audit: type=1334 audit(1742236929.548:93): prog-id=3 op=UNLOAD Mar 17 18:42:09.844808 kernel: audit: type=1334 audit(1742236929.548:94): prog-id=13 op=LOAD Mar 17 18:42:09.844825 kernel: audit: type=1334 audit(1742236929.549:95): prog-id=14 op=LOAD Mar 17 18:42:09.844844 kernel: audit: type=1334 audit(1742236929.549:96): prog-id=4 op=UNLOAD Mar 17 18:42:09.844862 kernel: audit: type=1334 audit(1742236929.549:97): prog-id=5 op=UNLOAD Mar 17 18:42:09.844887 kernel: audit: type=1334 audit(1742236929.552:98): prog-id=15 op=LOAD Mar 17 18:42:09.844905 kernel: audit: type=1334 audit(1742236929.552:99): prog-id=12 op=UNLOAD Mar 17 18:42:09.844922 kernel: audit: type=1334 audit(1742236929.554:100): prog-id=16 op=LOAD Mar 17 18:42:09.844946 kernel: audit: type=1334 audit(1742236929.557:101): prog-id=17 op=LOAD Mar 17 18:42:09.844964 systemd[1]: iscsid.service: Deactivated successfully. Mar 17 18:42:09.844981 systemd[1]: Stopped iscsid.service. Mar 17 18:42:09.845000 systemd[1]: initrd-switch-root.service: Deactivated successfully. Mar 17 18:42:09.845018 systemd[1]: Stopped initrd-switch-root.service. Mar 17 18:42:09.845046 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Mar 17 18:42:09.845067 systemd[1]: Created slice system-addon\x2dconfig.slice. Mar 17 18:42:09.845086 systemd[1]: Created slice system-addon\x2drun.slice. Mar 17 18:42:09.845104 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Mar 17 18:42:09.845123 systemd[1]: Created slice system-getty.slice. Mar 17 18:42:09.845141 systemd[1]: Created slice system-modprobe.slice. Mar 17 18:42:09.845166 systemd[1]: Created slice system-serial\x2dgetty.slice. Mar 17 18:42:09.845185 systemd[1]: Created slice system-system\x2dcloudinit.slice. Mar 17 18:42:09.845204 systemd[1]: Created slice system-systemd\x2dfsck.slice. Mar 17 18:42:09.845231 systemd[1]: Created slice user.slice. Mar 17 18:42:09.845250 systemd[1]: Started systemd-ask-password-console.path. Mar 17 18:42:09.845268 systemd[1]: Started systemd-ask-password-wall.path. Mar 17 18:42:09.845287 systemd[1]: Set up automount boot.automount. Mar 17 18:42:09.845305 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Mar 17 18:42:09.845331 systemd[1]: Stopped target initrd-switch-root.target. Mar 17 18:42:09.845359 systemd[1]: Stopped target initrd-fs.target. Mar 17 18:42:09.845378 systemd[1]: Stopped target initrd-root-fs.target. Mar 17 18:42:09.845402 systemd[1]: Reached target integritysetup.target. Mar 17 18:42:09.845421 systemd[1]: Reached target remote-cryptsetup.target. Mar 17 18:42:09.845439 systemd[1]: Reached target remote-fs.target. Mar 17 18:42:09.845459 systemd[1]: Reached target slices.target. Mar 17 18:42:09.845479 systemd[1]: Reached target swap.target. Mar 17 18:42:09.845498 systemd[1]: Reached target torcx.target. Mar 17 18:42:09.845518 systemd[1]: Reached target veritysetup.target. Mar 17 18:42:09.845538 systemd[1]: Listening on systemd-coredump.socket. Mar 17 18:42:09.845585 systemd[1]: Listening on systemd-initctl.socket. Mar 17 18:42:09.845605 systemd[1]: Listening on systemd-networkd.socket. Mar 17 18:42:09.845625 systemd[1]: Listening on systemd-udevd-control.socket. Mar 17 18:42:09.845644 systemd[1]: Listening on systemd-udevd-kernel.socket. Mar 17 18:42:09.845663 systemd[1]: Listening on systemd-userdbd.socket. Mar 17 18:42:09.845690 systemd[1]: Mounting dev-hugepages.mount... Mar 17 18:42:09.845709 systemd[1]: Mounting dev-mqueue.mount... Mar 17 18:42:09.845727 systemd[1]: Mounting media.mount... Mar 17 18:42:09.845746 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:09.845773 systemd[1]: Mounting sys-kernel-debug.mount... Mar 17 18:42:09.845793 systemd[1]: Mounting sys-kernel-tracing.mount... Mar 17 18:42:09.845811 systemd[1]: Mounting tmp.mount... Mar 17 18:42:09.845830 systemd[1]: Starting flatcar-tmpfiles.service... Mar 17 18:42:09.845850 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:42:09.845869 systemd[1]: Starting kmod-static-nodes.service... Mar 17 18:42:09.845889 systemd[1]: Starting modprobe@configfs.service... Mar 17 18:42:09.845907 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:42:09.845926 systemd[1]: Starting modprobe@drm.service... Mar 17 18:42:09.845958 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:42:09.845978 systemd[1]: Starting modprobe@fuse.service... Mar 17 18:42:09.845997 systemd[1]: Starting modprobe@loop.service... Mar 17 18:42:09.846017 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Mar 17 18:42:09.846036 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Mar 17 18:42:09.846055 systemd[1]: Stopped systemd-fsck-root.service. Mar 17 18:42:09.846074 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Mar 17 18:42:09.846094 systemd[1]: Stopped systemd-fsck-usr.service. Mar 17 18:42:09.846124 systemd[1]: Stopped systemd-journald.service. Mar 17 18:42:09.846150 systemd[1]: Starting systemd-journald.service... Mar 17 18:42:09.846169 systemd[1]: Starting systemd-modules-load.service... Mar 17 18:42:09.846187 systemd[1]: Starting systemd-network-generator.service... Mar 17 18:42:09.846207 kernel: loop: module loaded Mar 17 18:42:09.846228 kernel: fuse: init (API version 7.34) Mar 17 18:42:09.846250 systemd[1]: Starting systemd-remount-fs.service... Mar 17 18:42:09.846270 systemd[1]: Starting systemd-udev-trigger.service... Mar 17 18:42:09.846288 systemd[1]: verity-setup.service: Deactivated successfully. Mar 17 18:42:09.846307 systemd[1]: Stopped verity-setup.service. Mar 17 18:42:09.846326 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:09.846353 systemd[1]: Mounted dev-hugepages.mount. Mar 17 18:42:09.846372 systemd[1]: Mounted dev-mqueue.mount. Mar 17 18:42:09.846391 systemd[1]: Mounted media.mount. Mar 17 18:42:09.846410 systemd[1]: Mounted sys-kernel-debug.mount. Mar 17 18:42:09.846428 systemd[1]: Mounted sys-kernel-tracing.mount. Mar 17 18:42:09.846453 systemd-journald[952]: Journal started Mar 17 18:42:09.846538 systemd-journald[952]: Runtime Journal (/run/log/journal/9fac265d0c2e4e8ea4b8522543a2fdcf) is 4.9M, max 39.5M, 34.5M free. Mar 17 18:42:04.407000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Mar 17 18:42:04.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 18:42:04.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 18:42:04.514000 audit: BPF prog-id=10 op=LOAD Mar 17 18:42:04.515000 audit: BPF prog-id=10 op=UNLOAD Mar 17 18:42:04.515000 audit: BPF prog-id=11 op=LOAD Mar 17 18:42:04.515000 audit: BPF prog-id=11 op=UNLOAD Mar 17 18:42:04.686000 audit[883]: AVC avc: denied { associate } for pid=883 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Mar 17 18:42:04.686000 audit[883]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d89c a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=865 pid=883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:04.686000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Mar 17 18:42:04.689000 audit[883]: AVC avc: denied { associate } for pid=883 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Mar 17 18:42:04.689000 audit[883]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d975 a2=1ed a3=0 items=2 ppid=865 pid=883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:04.689000 audit: CWD cwd="/" Mar 17 18:42:04.689000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:04.689000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:04.689000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Mar 17 18:42:09.548000 audit: BPF prog-id=12 op=LOAD Mar 17 18:42:09.548000 audit: BPF prog-id=3 op=UNLOAD Mar 17 18:42:09.548000 audit: BPF prog-id=13 op=LOAD Mar 17 18:42:09.549000 audit: BPF prog-id=14 op=LOAD Mar 17 18:42:09.850720 systemd[1]: Started systemd-journald.service. Mar 17 18:42:09.549000 audit: BPF prog-id=4 op=UNLOAD Mar 17 18:42:09.549000 audit: BPF prog-id=5 op=UNLOAD Mar 17 18:42:09.552000 audit: BPF prog-id=15 op=LOAD Mar 17 18:42:09.552000 audit: BPF prog-id=12 op=UNLOAD Mar 17 18:42:09.554000 audit: BPF prog-id=16 op=LOAD Mar 17 18:42:09.557000 audit: BPF prog-id=17 op=LOAD Mar 17 18:42:09.557000 audit: BPF prog-id=13 op=UNLOAD Mar 17 18:42:09.557000 audit: BPF prog-id=14 op=UNLOAD Mar 17 18:42:09.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.571000 audit: BPF prog-id=15 op=UNLOAD Mar 17 18:42:09.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.764000 audit: BPF prog-id=18 op=LOAD Mar 17 18:42:09.764000 audit: BPF prog-id=19 op=LOAD Mar 17 18:42:09.764000 audit: BPF prog-id=20 op=LOAD Mar 17 18:42:09.764000 audit: BPF prog-id=16 op=UNLOAD Mar 17 18:42:09.764000 audit: BPF prog-id=17 op=UNLOAD Mar 17 18:42:09.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.841000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Mar 17 18:42:09.841000 audit[952]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe7e109930 a2=4000 a3=7ffe7e1099cc items=0 ppid=1 pid=952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:09.841000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Mar 17 18:42:04.683345 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:42:09.545973 systemd[1]: Queued start job for default target multi-user.target. Mar 17 18:42:09.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:04.684200 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:04Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Mar 17 18:42:09.545998 systemd[1]: Unnecessary job was removed for dev-vda6.device. Mar 17 18:42:04.684230 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:04Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Mar 17 18:42:09.560574 systemd[1]: systemd-journald.service: Deactivated successfully. Mar 17 18:42:04.684286 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:04Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Mar 17 18:42:09.852334 systemd[1]: Mounted tmp.mount. Mar 17 18:42:04.684302 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:04Z" level=debug msg="skipped missing lower profile" missing profile=oem Mar 17 18:42:09.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.853349 systemd[1]: Finished kmod-static-nodes.service. Mar 17 18:42:04.684351 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:04Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Mar 17 18:42:04.684371 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:04Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Mar 17 18:42:04.684662 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:04Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Mar 17 18:42:04.684728 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:04Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Mar 17 18:42:09.855397 systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 17 18:42:04.684755 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:04Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Mar 17 18:42:04.685667 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:04Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Mar 17 18:42:09.855674 systemd[1]: Finished modprobe@configfs.service. Mar 17 18:42:04.685736 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:04Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Mar 17 18:42:04.685769 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:04Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 Mar 17 18:42:04.685794 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:04Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Mar 17 18:42:04.685825 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:04Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 Mar 17 18:42:09.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:04.685845 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:04Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Mar 17 18:42:08.809053 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:08Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:42:08.809528 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:08Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:42:08.809713 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:08Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:42:08.810006 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:08Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:42:08.810125 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:08Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Mar 17 18:42:08.810238 /usr/lib/systemd/system-generators/torcx-generator[883]: time="2025-03-17T18:42:08Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Mar 17 18:42:09.857335 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:42:09.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.857875 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:42:09.860196 systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 17 18:42:09.860414 systemd[1]: Finished modprobe@drm.service. Mar 17 18:42:09.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.862416 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:42:09.862748 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:42:09.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.864267 systemd[1]: modprobe@fuse.service: Deactivated successfully. Mar 17 18:42:09.864480 systemd[1]: Finished modprobe@fuse.service. Mar 17 18:42:09.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.866267 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:42:09.867660 systemd[1]: Finished modprobe@loop.service. Mar 17 18:42:09.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.868943 systemd[1]: Finished systemd-modules-load.service. Mar 17 18:42:09.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.870289 systemd[1]: Finished systemd-network-generator.service. Mar 17 18:42:09.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.891649 systemd[1]: Finished flatcar-tmpfiles.service. Mar 17 18:42:09.892695 systemd[1]: Finished systemd-remount-fs.service. Mar 17 18:42:09.894168 systemd[1]: Reached target network-pre.target. Mar 17 18:42:09.896930 systemd[1]: Mounting sys-fs-fuse-connections.mount... Mar 17 18:42:09.900348 systemd[1]: Mounting sys-kernel-config.mount... Mar 17 18:42:09.902294 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Mar 17 18:42:09.906942 systemd[1]: Starting systemd-hwdb-update.service... Mar 17 18:42:09.911033 systemd[1]: Starting systemd-journal-flush.service... Mar 17 18:42:09.913200 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:42:09.916951 systemd[1]: Starting systemd-random-seed.service... Mar 17 18:42:09.917978 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:42:09.920209 systemd[1]: Starting systemd-sysctl.service... Mar 17 18:42:09.924610 systemd[1]: Starting systemd-sysusers.service... Mar 17 18:42:09.935863 systemd-journald[952]: Time spent on flushing to /var/log/journal/9fac265d0c2e4e8ea4b8522543a2fdcf is 83.609ms for 1145 entries. Mar 17 18:42:09.935863 systemd-journald[952]: System Journal (/var/log/journal/9fac265d0c2e4e8ea4b8522543a2fdcf) is 8.0M, max 195.6M, 187.6M free. Mar 17 18:42:10.029628 systemd-journald[952]: Received client request to flush runtime journal. Mar 17 18:42:09.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:10.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:09.931950 systemd[1]: Mounted sys-fs-fuse-connections.mount. Mar 17 18:42:09.933653 systemd[1]: Mounted sys-kernel-config.mount. Mar 17 18:42:09.954601 systemd[1]: Finished systemd-random-seed.service. Mar 17 18:42:09.955484 systemd[1]: Reached target first-boot-complete.target. Mar 17 18:42:09.979136 systemd[1]: Finished systemd-sysctl.service. Mar 17 18:42:09.987669 systemd[1]: Finished systemd-sysusers.service. Mar 17 18:42:09.990398 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Mar 17 18:42:10.031272 systemd[1]: Finished systemd-journal-flush.service. Mar 17 18:42:10.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:10.061229 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Mar 17 18:42:10.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:10.092361 systemd[1]: Finished systemd-udev-trigger.service. Mar 17 18:42:10.095192 systemd[1]: Starting systemd-udev-settle.service... Mar 17 18:42:10.110519 udevadm[994]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Mar 17 18:42:11.300750 systemd[1]: Finished systemd-hwdb-update.service. Mar 17 18:42:11.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:11.302000 audit: BPF prog-id=21 op=LOAD Mar 17 18:42:11.302000 audit: BPF prog-id=22 op=LOAD Mar 17 18:42:11.302000 audit: BPF prog-id=7 op=UNLOAD Mar 17 18:42:11.302000 audit: BPF prog-id=8 op=UNLOAD Mar 17 18:42:11.304330 systemd[1]: Starting systemd-udevd.service... Mar 17 18:42:11.335644 systemd-udevd[995]: Using default interface naming scheme 'v252'. Mar 17 18:42:11.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:11.385000 audit: BPF prog-id=23 op=LOAD Mar 17 18:42:11.383427 systemd[1]: Started systemd-udevd.service. Mar 17 18:42:11.389969 systemd[1]: Starting systemd-networkd.service... Mar 17 18:42:11.399000 audit: BPF prog-id=24 op=LOAD Mar 17 18:42:11.399000 audit: BPF prog-id=25 op=LOAD Mar 17 18:42:11.399000 audit: BPF prog-id=26 op=LOAD Mar 17 18:42:11.401436 systemd[1]: Starting systemd-userdbd.service... Mar 17 18:42:11.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:11.477957 systemd[1]: Started systemd-userdbd.service. Mar 17 18:42:11.523275 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Mar 17 18:42:11.585897 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:11.586306 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:42:11.591323 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:42:11.597161 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:42:11.604271 systemd[1]: Starting modprobe@loop.service... Mar 17 18:42:11.605195 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Mar 17 18:42:11.605355 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Mar 17 18:42:11.605598 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:11.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:11.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:11.606937 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:42:11.607767 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:42:11.610005 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:42:11.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:11.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:11.612128 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:42:11.616946 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:42:11.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:11.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:11.618215 systemd[1]: Finished modprobe@loop.service. Mar 17 18:42:11.619509 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:42:11.619590 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:42:11.629371 systemd-networkd[1002]: lo: Link UP Mar 17 18:42:11.629391 systemd-networkd[1002]: lo: Gained carrier Mar 17 18:42:11.630291 systemd-networkd[1002]: Enumeration completed Mar 17 18:42:11.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:11.630450 systemd-networkd[1002]: eth1: Configuring with /run/systemd/network/10-06:76:25:a3:28:c1.network. Mar 17 18:42:11.630528 systemd[1]: Started systemd-networkd.service. Mar 17 18:42:11.632906 systemd-networkd[1002]: eth0: Configuring with /run/systemd/network/10-96:46:92:eb:4f:f5.network. Mar 17 18:42:11.635771 systemd-networkd[1002]: eth1: Link UP Mar 17 18:42:11.635788 systemd-networkd[1002]: eth1: Gained carrier Mar 17 18:42:11.643268 systemd-networkd[1002]: eth0: Link UP Mar 17 18:42:11.643287 systemd-networkd[1002]: eth0: Gained carrier Mar 17 18:42:11.710625 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Mar 17 18:42:11.733648 kernel: ACPI: button: Power Button [PWRF] Mar 17 18:42:11.773799 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Mar 17 18:42:11.761000 audit[1012]: AVC avc: denied { confidentiality } for pid=1012 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Mar 17 18:42:11.761000 audit[1012]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558149f453c0 a1=338ac a2=7fcf61041bc5 a3=5 items=110 ppid=995 pid=1012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:11.761000 audit: CWD cwd="/" Mar 17 18:42:11.761000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=1 name=(null) inode=14723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=2 name=(null) inode=14723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=3 name=(null) inode=14724 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=4 name=(null) inode=14723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=5 name=(null) inode=14725 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=6 name=(null) inode=14723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=7 name=(null) inode=14726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=8 name=(null) inode=14726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=9 name=(null) inode=14727 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=10 name=(null) inode=14726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=11 name=(null) inode=14728 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=12 name=(null) inode=14726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=13 name=(null) inode=14729 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=14 name=(null) inode=14726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=15 name=(null) inode=14730 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=16 name=(null) inode=14726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=17 name=(null) inode=14731 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=18 name=(null) inode=14723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=19 name=(null) inode=14732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=20 name=(null) inode=14732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=21 name=(null) inode=14733 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=22 name=(null) inode=14732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=23 name=(null) inode=14734 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=24 name=(null) inode=14732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=25 name=(null) inode=14735 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=26 name=(null) inode=14732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=27 name=(null) inode=14736 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=28 name=(null) inode=14732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=29 name=(null) inode=14737 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=30 name=(null) inode=14723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=31 name=(null) inode=14738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=32 name=(null) inode=14738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=33 name=(null) inode=14739 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=34 name=(null) inode=14738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=35 name=(null) inode=14740 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=36 name=(null) inode=14738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=37 name=(null) inode=14741 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=38 name=(null) inode=14738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=39 name=(null) inode=14742 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=40 name=(null) inode=14738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=41 name=(null) inode=14743 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=42 name=(null) inode=14723 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=43 name=(null) inode=14744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=44 name=(null) inode=14744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=45 name=(null) inode=14745 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=46 name=(null) inode=14744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=47 name=(null) inode=14746 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=48 name=(null) inode=14744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=49 name=(null) inode=14747 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=50 name=(null) inode=14744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=51 name=(null) inode=14748 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=52 name=(null) inode=14744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=53 name=(null) inode=14749 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=55 name=(null) inode=14750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=56 name=(null) inode=14750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=57 name=(null) inode=14751 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=58 name=(null) inode=14750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=59 name=(null) inode=14752 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=60 name=(null) inode=14750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=61 name=(null) inode=14753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=62 name=(null) inode=14753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=63 name=(null) inode=14754 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=64 name=(null) inode=14753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=65 name=(null) inode=14755 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=66 name=(null) inode=14753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=67 name=(null) inode=14756 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=68 name=(null) inode=14753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=69 name=(null) inode=14757 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=70 name=(null) inode=14753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=71 name=(null) inode=14758 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=72 name=(null) inode=14750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=73 name=(null) inode=14759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=74 name=(null) inode=14759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=75 name=(null) inode=14760 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=76 name=(null) inode=14759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=77 name=(null) inode=14761 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=78 name=(null) inode=14759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=79 name=(null) inode=14762 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=80 name=(null) inode=14759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=81 name=(null) inode=14763 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=82 name=(null) inode=14759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=83 name=(null) inode=14764 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=84 name=(null) inode=14750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=85 name=(null) inode=14765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=86 name=(null) inode=14765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=87 name=(null) inode=14766 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=88 name=(null) inode=14765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=89 name=(null) inode=14767 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=90 name=(null) inode=14765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=91 name=(null) inode=14768 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=92 name=(null) inode=14765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=93 name=(null) inode=14769 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=94 name=(null) inode=14765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=95 name=(null) inode=14770 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=96 name=(null) inode=14750 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=97 name=(null) inode=14771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=98 name=(null) inode=14771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=99 name=(null) inode=14772 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=100 name=(null) inode=14771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=101 name=(null) inode=14773 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=102 name=(null) inode=14771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=103 name=(null) inode=14774 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=104 name=(null) inode=14771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=105 name=(null) inode=14775 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=106 name=(null) inode=14771 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=107 name=(null) inode=14776 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PATH item=109 name=(null) inode=14777 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:11.761000 audit: PROCTITLE proctitle="(udev-worker)" Mar 17 18:42:11.839589 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Mar 17 18:42:11.847349 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Mar 17 18:42:11.859607 kernel: mousedev: PS/2 mouse device common for all mice Mar 17 18:42:12.016697 kernel: EDAC MC: Ver: 3.0.0 Mar 17 18:42:12.046286 systemd[1]: Finished systemd-udev-settle.service. Mar 17 18:42:12.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:12.048999 systemd[1]: Starting lvm2-activation-early.service... Mar 17 18:42:12.075478 lvm[1034]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Mar 17 18:42:12.117526 systemd[1]: Finished lvm2-activation-early.service. Mar 17 18:42:12.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:12.118350 systemd[1]: Reached target cryptsetup.target. Mar 17 18:42:12.120941 systemd[1]: Starting lvm2-activation.service... Mar 17 18:42:12.129495 lvm[1035]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Mar 17 18:42:12.160850 systemd[1]: Finished lvm2-activation.service. Mar 17 18:42:12.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:12.161780 systemd[1]: Reached target local-fs-pre.target. Mar 17 18:42:12.164947 systemd[1]: Mounting media-configdrive.mount... Mar 17 18:42:12.165747 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Mar 17 18:42:12.165816 systemd[1]: Reached target machines.target. Mar 17 18:42:12.168058 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Mar 17 18:42:12.186486 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Mar 17 18:42:12.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:12.190570 kernel: ISO 9660 Extensions: RRIP_1991A Mar 17 18:42:12.192860 systemd[1]: Mounted media-configdrive.mount. Mar 17 18:42:12.193857 systemd[1]: Reached target local-fs.target. Mar 17 18:42:12.196700 systemd[1]: Starting ldconfig.service... Mar 17 18:42:12.198145 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:42:12.198221 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:42:12.201294 systemd[1]: Starting systemd-boot-update.service... Mar 17 18:42:12.205198 systemd[1]: Starting systemd-machine-id-commit.service... Mar 17 18:42:12.212100 systemd[1]: Starting systemd-sysext.service... Mar 17 18:42:12.221854 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1041 (bootctl) Mar 17 18:42:12.224068 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Mar 17 18:42:12.236560 systemd[1]: Unmounting usr-share-oem.mount... Mar 17 18:42:12.250196 systemd[1]: usr-share-oem.mount: Deactivated successfully. Mar 17 18:42:12.250444 systemd[1]: Unmounted usr-share-oem.mount. Mar 17 18:42:12.272743 kernel: loop0: detected capacity change from 0 to 218376 Mar 17 18:42:12.298342 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Mar 17 18:42:12.300215 systemd[1]: Finished systemd-machine-id-commit.service. Mar 17 18:42:12.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:12.319583 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Mar 17 18:42:12.341581 kernel: loop1: detected capacity change from 0 to 218376 Mar 17 18:42:12.362870 (sd-sysext)[1051]: Using extensions 'kubernetes'. Mar 17 18:42:12.365112 (sd-sysext)[1051]: Merged extensions into '/usr'. Mar 17 18:42:12.385465 systemd-fsck[1048]: fsck.fat 4.2 (2021-01-31) Mar 17 18:42:12.385465 systemd-fsck[1048]: /dev/vda1: 789 files, 119299/258078 clusters Mar 17 18:42:12.392295 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Mar 17 18:42:12.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:12.395766 systemd[1]: Mounting boot.mount... Mar 17 18:42:12.425228 systemd[1]: Mounted boot.mount. Mar 17 18:42:12.432161 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:12.435044 systemd[1]: Mounting usr-share-oem.mount... Mar 17 18:42:12.436274 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:42:12.442095 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:42:12.447809 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:42:12.451469 systemd[1]: Starting modprobe@loop.service... Mar 17 18:42:12.454770 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:42:12.455102 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:42:12.455698 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:12.460185 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:42:12.460433 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:42:12.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:12.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:12.463423 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:42:12.463744 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:42:12.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:12.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:12.465987 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:42:12.466352 systemd[1]: Finished modprobe@loop.service. Mar 17 18:42:12.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:12.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:12.467805 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:42:12.468023 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:42:12.478285 systemd[1]: Mounted usr-share-oem.mount. Mar 17 18:42:12.481216 systemd[1]: Finished systemd-sysext.service. Mar 17 18:42:12.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:12.485452 systemd[1]: Finished systemd-boot-update.service. Mar 17 18:42:12.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:12.489331 systemd[1]: Starting ensure-sysext.service... Mar 17 18:42:12.492247 systemd[1]: Starting systemd-tmpfiles-setup.service... Mar 17 18:42:12.508974 systemd[1]: Reloading. Mar 17 18:42:12.561793 systemd-tmpfiles[1059]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Mar 17 18:42:12.566423 systemd-tmpfiles[1059]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Mar 17 18:42:12.573079 systemd-tmpfiles[1059]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Mar 17 18:42:12.720816 /usr/lib/systemd/system-generators/torcx-generator[1078]: time="2025-03-17T18:42:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:42:12.720853 /usr/lib/systemd/system-generators/torcx-generator[1078]: time="2025-03-17T18:42:12Z" level=info msg="torcx already run" Mar 17 18:42:12.750678 ldconfig[1040]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Mar 17 18:42:12.928508 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:42:12.928582 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:42:12.975168 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:42:13.104000 audit: BPF prog-id=27 op=LOAD Mar 17 18:42:13.104000 audit: BPF prog-id=28 op=LOAD Mar 17 18:42:13.104000 audit: BPF prog-id=21 op=UNLOAD Mar 17 18:42:13.104000 audit: BPF prog-id=22 op=UNLOAD Mar 17 18:42:13.108000 audit: BPF prog-id=29 op=LOAD Mar 17 18:42:13.108000 audit: BPF prog-id=18 op=UNLOAD Mar 17 18:42:13.109000 audit: BPF prog-id=30 op=LOAD Mar 17 18:42:13.109000 audit: BPF prog-id=31 op=LOAD Mar 17 18:42:13.109000 audit: BPF prog-id=19 op=UNLOAD Mar 17 18:42:13.109000 audit: BPF prog-id=20 op=UNLOAD Mar 17 18:42:13.110000 audit: BPF prog-id=32 op=LOAD Mar 17 18:42:13.110000 audit: BPF prog-id=24 op=UNLOAD Mar 17 18:42:13.110000 audit: BPF prog-id=33 op=LOAD Mar 17 18:42:13.110000 audit: BPF prog-id=34 op=LOAD Mar 17 18:42:13.110000 audit: BPF prog-id=25 op=UNLOAD Mar 17 18:42:13.110000 audit: BPF prog-id=26 op=UNLOAD Mar 17 18:42:13.111000 audit: BPF prog-id=35 op=LOAD Mar 17 18:42:13.111000 audit: BPF prog-id=23 op=UNLOAD Mar 17 18:42:13.120664 systemd[1]: Finished ldconfig.service. Mar 17 18:42:13.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.123720 systemd[1]: Finished systemd-tmpfiles-setup.service. Mar 17 18:42:13.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.130850 systemd[1]: Starting audit-rules.service... Mar 17 18:42:13.134100 systemd[1]: Starting clean-ca-certificates.service... Mar 17 18:42:13.138352 systemd[1]: Starting systemd-journal-catalog-update.service... Mar 17 18:42:13.143000 audit: BPF prog-id=36 op=LOAD Mar 17 18:42:13.145985 systemd[1]: Starting systemd-resolved.service... Mar 17 18:42:13.147000 audit: BPF prog-id=37 op=LOAD Mar 17 18:42:13.150980 systemd[1]: Starting systemd-timesyncd.service... Mar 17 18:42:13.155522 systemd[1]: Starting systemd-update-utmp.service... Mar 17 18:42:13.177843 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:42:13.180552 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:42:13.185276 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:42:13.190300 systemd[1]: Starting modprobe@loop.service... Mar 17 18:42:13.191260 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:42:13.192864 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:42:13.201195 systemd[1]: Finished clean-ca-certificates.service. Mar 17 18:42:13.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.202708 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:42:13.202922 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:42:13.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.205055 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:42:13.205275 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:42:13.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.207737 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:13.207939 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:42:13.208108 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 18:42:13.208311 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:13.208000 audit[1131]: SYSTEM_BOOT pid=1131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.219907 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:42:13.220143 systemd[1]: Finished modprobe@loop.service. Mar 17 18:42:13.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.222169 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:13.223953 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:42:13.227049 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:42:13.232514 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:42:13.233235 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:42:13.234006 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:42:13.234662 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 18:42:13.235035 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:13.241020 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:42:13.241274 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:42:13.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.243253 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:42:13.243487 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:42:13.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.252044 systemd[1]: Finished systemd-update-utmp.service. Mar 17 18:42:13.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.255506 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:13.255972 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:42:13.259851 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:42:13.263201 systemd[1]: Starting modprobe@drm.service... Mar 17 18:42:13.267177 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:42:13.271447 systemd[1]: Starting modprobe@loop.service... Mar 17 18:42:13.272390 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:42:13.272568 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:42:13.276217 systemd[1]: Starting systemd-networkd-wait-online.service... Mar 17 18:42:13.277138 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 18:42:13.277242 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:42:13.279262 systemd[1]: Finished ensure-sysext.service. Mar 17 18:42:13.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.280560 systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 17 18:42:13.281297 systemd[1]: Finished modprobe@drm.service. Mar 17 18:42:13.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.283399 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:42:13.283666 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:42:13.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.293089 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:42:13.293287 systemd[1]: Finished modprobe@loop.service. Mar 17 18:42:13.294224 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:42:13.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.295193 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:42:13.295453 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:42:13.296435 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:42:13.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.319773 systemd[1]: Finished systemd-journal-catalog-update.service. Mar 17 18:42:13.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.322742 systemd[1]: Starting systemd-update-done.service... Mar 17 18:42:13.346311 systemd[1]: Finished systemd-update-done.service. Mar 17 18:42:13.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:13.360000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Mar 17 18:42:13.360000 audit[1157]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc86c5d470 a2=420 a3=0 items=0 ppid=1126 pid=1157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:13.360000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Mar 17 18:42:13.361230 augenrules[1157]: No rules Mar 17 18:42:13.363033 systemd[1]: Finished audit-rules.service. Mar 17 18:42:13.380911 systemd-networkd[1002]: eth1: Gained IPv6LL Mar 17 18:42:13.385227 systemd[1]: Finished systemd-networkd-wait-online.service. Mar 17 18:42:13.390421 systemd[1]: Started systemd-timesyncd.service. Mar 17 18:42:13.391361 systemd[1]: Reached target time-set.target. Mar 17 18:42:13.410874 systemd-resolved[1129]: Positive Trust Anchors: Mar 17 18:42:13.411581 systemd-resolved[1129]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 17 18:42:13.411784 systemd-resolved[1129]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 17 18:42:13.421831 systemd-resolved[1129]: Using system hostname 'ci-3510.3.7-c-f6a0b63c70'. Mar 17 18:42:13.425470 systemd[1]: Started systemd-resolved.service. Mar 17 18:42:13.426254 systemd[1]: Reached target network.target. Mar 17 18:42:13.426908 systemd[1]: Reached target network-online.target. Mar 17 18:42:13.427587 systemd[1]: Reached target nss-lookup.target. Mar 17 18:42:13.428229 systemd[1]: Reached target sysinit.target. Mar 17 18:42:13.429043 systemd[1]: Started motdgen.path. Mar 17 18:42:13.429733 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Mar 17 18:42:13.430722 systemd[1]: Started logrotate.timer. Mar 17 18:42:13.431467 systemd[1]: Started mdadm.timer. Mar 17 18:42:13.432083 systemd[1]: Started systemd-tmpfiles-clean.timer. Mar 17 18:42:13.432664 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Mar 17 18:42:13.432737 systemd[1]: Reached target paths.target. Mar 17 18:42:13.433214 systemd[1]: Reached target timers.target. Mar 17 18:42:13.434306 systemd[1]: Listening on dbus.socket. Mar 17 18:42:13.436814 systemd[1]: Starting docker.socket... Mar 17 18:42:13.442702 systemd[1]: Listening on sshd.socket. Mar 17 18:42:13.443722 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:42:13.444754 systemd[1]: Listening on docker.socket. Mar 17 18:42:13.445574 systemd[1]: Reached target sockets.target. Mar 17 18:42:13.446222 systemd[1]: Reached target basic.target. Mar 17 18:42:13.446903 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Mar 17 18:42:13.446946 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Mar 17 18:42:13.448790 systemd[1]: Starting containerd.service... Mar 17 18:42:13.452523 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Mar 17 18:42:13.455457 systemd[1]: Starting dbus.service... Mar 17 18:42:13.458245 systemd[1]: Starting enable-oem-cloudinit.service... Mar 17 18:42:13.461809 systemd[1]: Starting extend-filesystems.service... Mar 17 18:42:13.467462 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Mar 17 18:42:13.470967 jq[1169]: false Mar 17 18:42:13.471313 systemd[1]: Starting kubelet.service... Mar 17 18:42:13.474872 systemd[1]: Starting motdgen.service... Mar 17 18:42:13.480527 systemd[1]: Starting ssh-key-proc-cmdline.service... Mar 17 18:42:13.484275 systemd[1]: Starting sshd-keygen.service... Mar 17 18:42:14.404542 systemd-timesyncd[1130]: Contacted time server 45.55.58.103:123 (0.flatcar.pool.ntp.org). Mar 17 18:42:14.406435 systemd-timesyncd[1130]: Initial clock synchronization to Mon 2025-03-17 18:42:14.403909 UTC. Mar 17 18:42:14.410188 systemd[1]: Starting systemd-logind.service... Mar 17 18:42:14.412841 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:42:14.412939 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Mar 17 18:42:14.413848 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Mar 17 18:42:14.415078 systemd[1]: Starting update-engine.service... Mar 17 18:42:14.417850 systemd[1]: Starting update-ssh-keys-after-ignition.service... Mar 17 18:42:14.425095 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Mar 17 18:42:14.426116 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Mar 17 18:42:14.426881 jq[1182]: true Mar 17 18:42:14.461042 systemd-resolved[1129]: Clock change detected. Flushing caches. Mar 17 18:42:14.466456 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Mar 17 18:42:14.466759 systemd[1]: Finished ssh-key-proc-cmdline.service. Mar 17 18:42:14.467604 jq[1185]: true Mar 17 18:42:14.494036 dbus-daemon[1167]: [system] SELinux support is enabled Mar 17 18:42:14.495395 systemd[1]: Started dbus.service. Mar 17 18:42:14.500392 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Mar 17 18:42:14.500448 systemd[1]: Reached target system-config.target. Mar 17 18:42:14.501221 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Mar 17 18:42:14.501283 systemd[1]: Reached target user-config.target. Mar 17 18:42:14.515514 systemd[1]: motdgen.service: Deactivated successfully. Mar 17 18:42:14.515780 systemd[1]: Finished motdgen.service. Mar 17 18:42:14.555567 extend-filesystems[1170]: Found loop1 Mar 17 18:42:14.555944 systemd-networkd[1002]: eth0: Gained IPv6LL Mar 17 18:42:14.558748 extend-filesystems[1170]: Found vda Mar 17 18:42:14.558748 extend-filesystems[1170]: Found vda1 Mar 17 18:42:14.558748 extend-filesystems[1170]: Found vda2 Mar 17 18:42:14.558748 extend-filesystems[1170]: Found vda3 Mar 17 18:42:14.558748 extend-filesystems[1170]: Found usr Mar 17 18:42:14.558748 extend-filesystems[1170]: Found vda4 Mar 17 18:42:14.558748 extend-filesystems[1170]: Found vda6 Mar 17 18:42:14.558748 extend-filesystems[1170]: Found vda7 Mar 17 18:42:14.558748 extend-filesystems[1170]: Found vda9 Mar 17 18:42:14.558748 extend-filesystems[1170]: Checking size of /dev/vda9 Mar 17 18:42:14.601091 update_engine[1181]: I0317 18:42:14.600045 1181 main.cc:92] Flatcar Update Engine starting Mar 17 18:42:14.607417 systemd[1]: Started update-engine.service. Mar 17 18:42:14.611844 systemd[1]: Started locksmithd.service. Mar 17 18:42:14.614766 update_engine[1181]: I0317 18:42:14.614697 1181 update_check_scheduler.cc:74] Next update check in 10m19s Mar 17 18:42:14.634595 bash[1215]: Updated "/home/core/.ssh/authorized_keys" Mar 17 18:42:14.636299 systemd[1]: Finished update-ssh-keys-after-ignition.service. Mar 17 18:42:14.646631 extend-filesystems[1170]: Resized partition /dev/vda9 Mar 17 18:42:14.661958 extend-filesystems[1219]: resize2fs 1.46.5 (30-Dec-2021) Mar 17 18:42:14.672733 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 15121403 blocks Mar 17 18:42:14.710553 env[1187]: time="2025-03-17T18:42:14.710219638Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Mar 17 18:42:14.787081 systemd-logind[1180]: Watching system buttons on /dev/input/event1 (Power Button) Mar 17 18:42:14.790601 systemd-logind[1180]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Mar 17 18:42:14.796321 systemd-logind[1180]: New seat seat0. Mar 17 18:42:14.809411 systemd[1]: Started systemd-logind.service. Mar 17 18:42:14.828716 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Mar 17 18:42:14.865998 env[1187]: time="2025-03-17T18:42:14.844324104Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Mar 17 18:42:14.865998 env[1187]: time="2025-03-17T18:42:14.865411051Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:42:14.869238 extend-filesystems[1219]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Mar 17 18:42:14.869238 extend-filesystems[1219]: old_desc_blocks = 1, new_desc_blocks = 8 Mar 17 18:42:14.869238 extend-filesystems[1219]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Mar 17 18:42:14.890542 extend-filesystems[1170]: Resized filesystem in /dev/vda9 Mar 17 18:42:14.890542 extend-filesystems[1170]: Found vdb Mar 17 18:42:14.891975 env[1187]: time="2025-03-17T18:42:14.885480033Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.179-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Mar 17 18:42:14.891975 env[1187]: time="2025-03-17T18:42:14.885561948Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:42:14.891975 env[1187]: time="2025-03-17T18:42:14.885942681Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 17 18:42:14.891975 env[1187]: time="2025-03-17T18:42:14.885981425Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Mar 17 18:42:14.891975 env[1187]: time="2025-03-17T18:42:14.886003209Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Mar 17 18:42:14.891975 env[1187]: time="2025-03-17T18:42:14.886019013Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Mar 17 18:42:14.891975 env[1187]: time="2025-03-17T18:42:14.886143539Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:42:14.891975 env[1187]: time="2025-03-17T18:42:14.886530167Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:42:14.891975 env[1187]: time="2025-03-17T18:42:14.886747475Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 17 18:42:14.891975 env[1187]: time="2025-03-17T18:42:14.886772933Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Mar 17 18:42:14.869773 systemd[1]: extend-filesystems.service: Deactivated successfully. Mar 17 18:42:14.892535 coreos-metadata[1166]: Mar 17 18:42:14.881 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Mar 17 18:42:14.893035 env[1187]: time="2025-03-17T18:42:14.886837408Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Mar 17 18:42:14.893035 env[1187]: time="2025-03-17T18:42:14.886853896Z" level=info msg="metadata content store policy set" policy=shared Mar 17 18:42:14.870045 systemd[1]: Finished extend-filesystems.service. Mar 17 18:42:14.897061 coreos-metadata[1166]: Mar 17 18:42:14.896 INFO Fetch successful Mar 17 18:42:14.899145 env[1187]: time="2025-03-17T18:42:14.897830794Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Mar 17 18:42:14.899145 env[1187]: time="2025-03-17T18:42:14.897891999Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Mar 17 18:42:14.899145 env[1187]: time="2025-03-17T18:42:14.897911674Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Mar 17 18:42:14.899145 env[1187]: time="2025-03-17T18:42:14.897975395Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Mar 17 18:42:14.899145 env[1187]: time="2025-03-17T18:42:14.897997774Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Mar 17 18:42:14.899145 env[1187]: time="2025-03-17T18:42:14.898073819Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Mar 17 18:42:14.899145 env[1187]: time="2025-03-17T18:42:14.898097866Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Mar 17 18:42:14.899145 env[1187]: time="2025-03-17T18:42:14.898130111Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Mar 17 18:42:14.899145 env[1187]: time="2025-03-17T18:42:14.898153164Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Mar 17 18:42:14.899145 env[1187]: time="2025-03-17T18:42:14.898173362Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Mar 17 18:42:14.899145 env[1187]: time="2025-03-17T18:42:14.898191304Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Mar 17 18:42:14.899145 env[1187]: time="2025-03-17T18:42:14.898211053Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Mar 17 18:42:14.899145 env[1187]: time="2025-03-17T18:42:14.898389596Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Mar 17 18:42:14.899145 env[1187]: time="2025-03-17T18:42:14.898490778Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Mar 17 18:42:14.899908 env[1187]: time="2025-03-17T18:42:14.898962648Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Mar 17 18:42:14.899908 env[1187]: time="2025-03-17T18:42:14.899020046Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Mar 17 18:42:14.899908 env[1187]: time="2025-03-17T18:42:14.899050841Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Mar 17 18:42:14.900785 env[1187]: time="2025-03-17T18:42:14.900120409Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Mar 17 18:42:14.900785 env[1187]: time="2025-03-17T18:42:14.900274391Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Mar 17 18:42:14.900785 env[1187]: time="2025-03-17T18:42:14.900304195Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Mar 17 18:42:14.900785 env[1187]: time="2025-03-17T18:42:14.900331269Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Mar 17 18:42:14.900785 env[1187]: time="2025-03-17T18:42:14.900355474Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Mar 17 18:42:14.900785 env[1187]: time="2025-03-17T18:42:14.900377116Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Mar 17 18:42:14.900785 env[1187]: time="2025-03-17T18:42:14.900401519Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Mar 17 18:42:14.900785 env[1187]: time="2025-03-17T18:42:14.900424063Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Mar 17 18:42:14.900785 env[1187]: time="2025-03-17T18:42:14.900452076Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Mar 17 18:42:14.900785 env[1187]: time="2025-03-17T18:42:14.900668796Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Mar 17 18:42:14.902704 env[1187]: time="2025-03-17T18:42:14.901420173Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Mar 17 18:42:14.902704 env[1187]: time="2025-03-17T18:42:14.901462033Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Mar 17 18:42:14.902704 env[1187]: time="2025-03-17T18:42:14.901486801Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Mar 17 18:42:14.902704 env[1187]: time="2025-03-17T18:42:14.901519108Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Mar 17 18:42:14.902704 env[1187]: time="2025-03-17T18:42:14.901539256Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Mar 17 18:42:14.902704 env[1187]: time="2025-03-17T18:42:14.901580417Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Mar 17 18:42:14.902704 env[1187]: time="2025-03-17T18:42:14.901672829Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Mar 17 18:42:14.903144 env[1187]: time="2025-03-17T18:42:14.902102289Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Mar 17 18:42:14.903144 env[1187]: time="2025-03-17T18:42:14.902242747Z" level=info msg="Connect containerd service" Mar 17 18:42:14.903144 env[1187]: time="2025-03-17T18:42:14.902299180Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Mar 17 18:42:14.906522 env[1187]: time="2025-03-17T18:42:14.903854659Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Mar 17 18:42:14.906522 env[1187]: time="2025-03-17T18:42:14.904964920Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Mar 17 18:42:14.906522 env[1187]: time="2025-03-17T18:42:14.905033388Z" level=info msg=serving... address=/run/containerd/containerd.sock Mar 17 18:42:14.906522 env[1187]: time="2025-03-17T18:42:14.905522901Z" level=info msg="Start subscribing containerd event" Mar 17 18:42:14.906522 env[1187]: time="2025-03-17T18:42:14.906188351Z" level=info msg="Start recovering state" Mar 17 18:42:14.906522 env[1187]: time="2025-03-17T18:42:14.906297010Z" level=info msg="Start event monitor" Mar 17 18:42:14.906522 env[1187]: time="2025-03-17T18:42:14.906334674Z" level=info msg="Start snapshots syncer" Mar 17 18:42:14.906522 env[1187]: time="2025-03-17T18:42:14.906349310Z" level=info msg="Start cni network conf syncer for default" Mar 17 18:42:14.906522 env[1187]: time="2025-03-17T18:42:14.906360179Z" level=info msg="Start streaming server" Mar 17 18:42:14.905207 systemd[1]: Started containerd.service. Mar 17 18:42:14.907570 env[1187]: time="2025-03-17T18:42:14.907528355Z" level=info msg="containerd successfully booted in 0.208284s" Mar 17 18:42:14.924279 unknown[1166]: wrote ssh authorized keys file for user: core Mar 17 18:42:14.943555 update-ssh-keys[1226]: Updated "/home/core/.ssh/authorized_keys" Mar 17 18:42:14.944382 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Mar 17 18:42:15.124191 locksmithd[1216]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Mar 17 18:42:16.381374 systemd[1]: Started kubelet.service. Mar 17 18:42:16.529334 sshd_keygen[1196]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Mar 17 18:42:16.574476 systemd[1]: Finished sshd-keygen.service. Mar 17 18:42:16.577989 systemd[1]: Starting issuegen.service... Mar 17 18:42:16.592557 systemd[1]: issuegen.service: Deactivated successfully. Mar 17 18:42:16.592941 systemd[1]: Finished issuegen.service. Mar 17 18:42:16.596287 systemd[1]: Starting systemd-user-sessions.service... Mar 17 18:42:16.610182 systemd[1]: Finished systemd-user-sessions.service. Mar 17 18:42:16.613410 systemd[1]: Started getty@tty1.service. Mar 17 18:42:16.617466 systemd[1]: Started serial-getty@ttyS0.service. Mar 17 18:42:16.618925 systemd[1]: Reached target getty.target. Mar 17 18:42:16.619772 systemd[1]: Reached target multi-user.target. Mar 17 18:42:16.624912 systemd[1]: Starting systemd-update-utmp-runlevel.service... Mar 17 18:42:16.639040 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Mar 17 18:42:16.639305 systemd[1]: Finished systemd-update-utmp-runlevel.service. Mar 17 18:42:16.640259 systemd[1]: Startup finished in 1.056s (kernel) + 5.567s (initrd) + 11.415s (userspace) = 18.039s. Mar 17 18:42:17.253010 kubelet[1233]: E0317 18:42:17.252889 1233 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:42:17.255931 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:42:17.256126 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:42:17.256515 systemd[1]: kubelet.service: Consumed 1.569s CPU time. Mar 17 18:42:22.933197 systemd[1]: Created slice system-sshd.slice. Mar 17 18:42:22.937938 systemd[1]: Started sshd@0-64.23.131.98:22-139.178.68.195:43240.service. Mar 17 18:42:23.043643 sshd[1255]: Accepted publickey for core from 139.178.68.195 port 43240 ssh2: RSA SHA256:8go6IuoP0Sh4aBcdoE6kISxrWrUSPJh2gvf/N4TtaPg Mar 17 18:42:23.047151 sshd[1255]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:42:23.064247 systemd[1]: Created slice user-500.slice. Mar 17 18:42:23.066521 systemd[1]: Starting user-runtime-dir@500.service... Mar 17 18:42:23.072287 systemd-logind[1180]: New session 1 of user core. Mar 17 18:42:23.082016 systemd[1]: Finished user-runtime-dir@500.service. Mar 17 18:42:23.084823 systemd[1]: Starting user@500.service... Mar 17 18:42:23.090929 (systemd)[1258]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:42:23.233021 systemd[1258]: Queued start job for default target default.target. Mar 17 18:42:23.233967 systemd[1258]: Reached target paths.target. Mar 17 18:42:23.234005 systemd[1258]: Reached target sockets.target. Mar 17 18:42:23.234024 systemd[1258]: Reached target timers.target. Mar 17 18:42:23.234042 systemd[1258]: Reached target basic.target. Mar 17 18:42:23.234122 systemd[1258]: Reached target default.target. Mar 17 18:42:23.234172 systemd[1258]: Startup finished in 132ms. Mar 17 18:42:23.234833 systemd[1]: Started user@500.service. Mar 17 18:42:23.236999 systemd[1]: Started session-1.scope. Mar 17 18:42:23.307594 systemd[1]: Started sshd@1-64.23.131.98:22-139.178.68.195:43248.service. Mar 17 18:42:23.370579 sshd[1267]: Accepted publickey for core from 139.178.68.195 port 43248 ssh2: RSA SHA256:8go6IuoP0Sh4aBcdoE6kISxrWrUSPJh2gvf/N4TtaPg Mar 17 18:42:23.373636 sshd[1267]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:42:23.386543 systemd-logind[1180]: New session 2 of user core. Mar 17 18:42:23.386835 systemd[1]: Started session-2.scope. Mar 17 18:42:23.458428 sshd[1267]: pam_unix(sshd:session): session closed for user core Mar 17 18:42:23.465864 systemd[1]: sshd@1-64.23.131.98:22-139.178.68.195:43248.service: Deactivated successfully. Mar 17 18:42:23.466791 systemd[1]: session-2.scope: Deactivated successfully. Mar 17 18:42:23.468808 systemd-logind[1180]: Session 2 logged out. Waiting for processes to exit. Mar 17 18:42:23.471101 systemd[1]: Started sshd@2-64.23.131.98:22-139.178.68.195:43258.service. Mar 17 18:42:23.474391 systemd-logind[1180]: Removed session 2. Mar 17 18:42:23.526653 sshd[1273]: Accepted publickey for core from 139.178.68.195 port 43258 ssh2: RSA SHA256:8go6IuoP0Sh4aBcdoE6kISxrWrUSPJh2gvf/N4TtaPg Mar 17 18:42:23.531011 sshd[1273]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:42:23.542245 systemd[1]: Started session-3.scope. Mar 17 18:42:23.543150 systemd-logind[1180]: New session 3 of user core. Mar 17 18:42:23.610462 sshd[1273]: pam_unix(sshd:session): session closed for user core Mar 17 18:42:23.618156 systemd-logind[1180]: Session 3 logged out. Waiting for processes to exit. Mar 17 18:42:23.618534 systemd[1]: sshd@2-64.23.131.98:22-139.178.68.195:43258.service: Deactivated successfully. Mar 17 18:42:23.619820 systemd[1]: session-3.scope: Deactivated successfully. Mar 17 18:42:23.623050 systemd[1]: Started sshd@3-64.23.131.98:22-139.178.68.195:43266.service. Mar 17 18:42:23.625858 systemd-logind[1180]: Removed session 3. Mar 17 18:42:23.678917 sshd[1279]: Accepted publickey for core from 139.178.68.195 port 43266 ssh2: RSA SHA256:8go6IuoP0Sh4aBcdoE6kISxrWrUSPJh2gvf/N4TtaPg Mar 17 18:42:23.681598 sshd[1279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:42:23.689825 systemd-logind[1180]: New session 4 of user core. Mar 17 18:42:23.690387 systemd[1]: Started session-4.scope. Mar 17 18:42:23.763953 sshd[1279]: pam_unix(sshd:session): session closed for user core Mar 17 18:42:23.770736 systemd[1]: sshd@3-64.23.131.98:22-139.178.68.195:43266.service: Deactivated successfully. Mar 17 18:42:23.772015 systemd[1]: session-4.scope: Deactivated successfully. Mar 17 18:42:23.773108 systemd-logind[1180]: Session 4 logged out. Waiting for processes to exit. Mar 17 18:42:23.775314 systemd[1]: Started sshd@4-64.23.131.98:22-139.178.68.195:43276.service. Mar 17 18:42:23.778146 systemd-logind[1180]: Removed session 4. Mar 17 18:42:23.834496 sshd[1285]: Accepted publickey for core from 139.178.68.195 port 43276 ssh2: RSA SHA256:8go6IuoP0Sh4aBcdoE6kISxrWrUSPJh2gvf/N4TtaPg Mar 17 18:42:23.836979 sshd[1285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:42:23.845780 systemd-logind[1180]: New session 5 of user core. Mar 17 18:42:23.846292 systemd[1]: Started session-5.scope. Mar 17 18:42:23.928953 sudo[1289]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Mar 17 18:42:23.930106 sudo[1289]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:42:23.941966 dbus-daemon[1167]: \xd0\xddR\u001d\xd2U: received setenforce notice (enforcing=-1461330720) Mar 17 18:42:23.942732 sudo[1289]: pam_unix(sudo:session): session closed for user root Mar 17 18:42:23.947961 sshd[1285]: pam_unix(sshd:session): session closed for user core Mar 17 18:42:23.955836 systemd[1]: Started sshd@5-64.23.131.98:22-139.178.68.195:43284.service. Mar 17 18:42:23.957083 systemd[1]: sshd@4-64.23.131.98:22-139.178.68.195:43276.service: Deactivated successfully. Mar 17 18:42:23.958677 systemd[1]: session-5.scope: Deactivated successfully. Mar 17 18:42:23.960238 systemd-logind[1180]: Session 5 logged out. Waiting for processes to exit. Mar 17 18:42:23.962259 systemd-logind[1180]: Removed session 5. Mar 17 18:42:24.013169 sshd[1292]: Accepted publickey for core from 139.178.68.195 port 43284 ssh2: RSA SHA256:8go6IuoP0Sh4aBcdoE6kISxrWrUSPJh2gvf/N4TtaPg Mar 17 18:42:24.016128 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:42:24.024858 systemd[1]: Started session-6.scope. Mar 17 18:42:24.025804 systemd-logind[1180]: New session 6 of user core. Mar 17 18:42:24.094225 sudo[1297]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Mar 17 18:42:24.095239 sudo[1297]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:42:24.100443 sudo[1297]: pam_unix(sudo:session): session closed for user root Mar 17 18:42:24.108716 sudo[1296]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Mar 17 18:42:24.109113 sudo[1296]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:42:24.127030 systemd[1]: Stopping audit-rules.service... Mar 17 18:42:24.126000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Mar 17 18:42:24.129258 kernel: kauditd_printk_skb: 239 callbacks suppressed Mar 17 18:42:24.129384 kernel: audit: type=1305 audit(1742236944.126:224): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Mar 17 18:42:24.126000 audit[1300]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe3d6e9f30 a2=420 a3=0 items=0 ppid=1 pid=1300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:24.133057 auditctl[1300]: No rules Mar 17 18:42:24.138855 kernel: audit: type=1300 audit(1742236944.126:224): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe3d6e9f30 a2=420 a3=0 items=0 ppid=1 pid=1300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:24.133813 systemd[1]: audit-rules.service: Deactivated successfully. Mar 17 18:42:24.134093 systemd[1]: Stopped audit-rules.service. Mar 17 18:42:24.126000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Mar 17 18:42:24.140666 systemd[1]: Starting audit-rules.service... Mar 17 18:42:24.141854 kernel: audit: type=1327 audit(1742236944.126:224): proctitle=2F7362696E2F617564697463746C002D44 Mar 17 18:42:24.147752 kernel: audit: type=1131 audit(1742236944.131:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:24.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:24.173512 augenrules[1317]: No rules Mar 17 18:42:24.174951 systemd[1]: Finished audit-rules.service. Mar 17 18:42:24.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:24.177016 sudo[1296]: pam_unix(sudo:session): session closed for user root Mar 17 18:42:24.174000 audit[1296]: USER_END pid=1296 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:42:24.195425 kernel: audit: type=1130 audit(1742236944.173:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:24.195580 kernel: audit: type=1106 audit(1742236944.174:227): pid=1296 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:42:24.195622 kernel: audit: type=1104 audit(1742236944.174:228): pid=1296 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:42:24.174000 audit[1296]: CRED_DISP pid=1296 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:42:24.194745 systemd[1]: Started sshd@6-64.23.131.98:22-139.178.68.195:43300.service. Mar 17 18:42:24.187294 sshd[1292]: pam_unix(sshd:session): session closed for user core Mar 17 18:42:24.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-64.23.131.98:22-139.178.68.195:43300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:24.201695 systemd[1]: sshd@5-64.23.131.98:22-139.178.68.195:43284.service: Deactivated successfully. Mar 17 18:42:24.203759 kernel: audit: type=1130 audit(1742236944.193:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-64.23.131.98:22-139.178.68.195:43300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:24.202804 systemd[1]: session-6.scope: Deactivated successfully. Mar 17 18:42:24.196000 audit[1292]: USER_END pid=1292 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Mar 17 18:42:24.205468 systemd-logind[1180]: Session 6 logged out. Waiting for processes to exit. Mar 17 18:42:24.207659 systemd-logind[1180]: Removed session 6. Mar 17 18:42:24.196000 audit[1292]: CRED_DISP pid=1292 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Mar 17 18:42:24.218824 kernel: audit: type=1106 audit(1742236944.196:230): pid=1292 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Mar 17 18:42:24.218997 kernel: audit: type=1104 audit(1742236944.196:231): pid=1292 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Mar 17 18:42:24.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-64.23.131.98:22-139.178.68.195:43284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:24.262000 audit[1322]: USER_ACCT pid=1322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Mar 17 18:42:24.264151 sshd[1322]: Accepted publickey for core from 139.178.68.195 port 43300 ssh2: RSA SHA256:8go6IuoP0Sh4aBcdoE6kISxrWrUSPJh2gvf/N4TtaPg Mar 17 18:42:24.264000 audit[1322]: CRED_ACQ pid=1322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Mar 17 18:42:24.264000 audit[1322]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb0a8cc00 a2=3 a3=0 items=0 ppid=1 pid=1322 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:24.264000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:42:24.267061 sshd[1322]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:42:24.276274 systemd[1]: Started session-7.scope. Mar 17 18:42:24.277080 systemd-logind[1180]: New session 7 of user core. Mar 17 18:42:24.283000 audit[1322]: USER_START pid=1322 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Mar 17 18:42:24.286000 audit[1325]: CRED_ACQ pid=1325 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Mar 17 18:42:24.343000 audit[1326]: USER_ACCT pid=1326 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:42:24.345362 sudo[1326]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Mar 17 18:42:24.344000 audit[1326]: CRED_REFR pid=1326 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:42:24.346389 sudo[1326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:42:24.348000 audit[1326]: USER_START pid=1326 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:42:24.370851 systemd[1]: Starting coreos-metadata.service... Mar 17 18:42:24.461650 coreos-metadata[1330]: Mar 17 18:42:24.461 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Mar 17 18:42:24.475375 coreos-metadata[1330]: Mar 17 18:42:24.475 INFO Fetch successful Mar 17 18:42:24.492085 systemd[1]: Finished coreos-metadata.service. Mar 17 18:42:24.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:25.382903 systemd[1]: Stopped kubelet.service. Mar 17 18:42:25.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:25.383705 systemd[1]: kubelet.service: Consumed 1.569s CPU time. Mar 17 18:42:25.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:25.388047 systemd[1]: Starting kubelet.service... Mar 17 18:42:25.437518 systemd[1]: Reloading. Mar 17 18:42:25.606786 /usr/lib/systemd/system-generators/torcx-generator[1386]: time="2025-03-17T18:42:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:42:25.614822 /usr/lib/systemd/system-generators/torcx-generator[1386]: time="2025-03-17T18:42:25Z" level=info msg="torcx already run" Mar 17 18:42:25.758655 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:42:25.759015 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:42:25.806786 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:42:25.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.956000 audit: BPF prog-id=43 op=LOAD Mar 17 18:42:25.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.956000 audit: BPF prog-id=44 op=LOAD Mar 17 18:42:25.956000 audit: BPF prog-id=27 op=UNLOAD Mar 17 18:42:25.956000 audit: BPF prog-id=28 op=UNLOAD Mar 17 18:42:25.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.960000 audit: BPF prog-id=45 op=LOAD Mar 17 18:42:25.960000 audit: BPF prog-id=29 op=UNLOAD Mar 17 18:42:25.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.961000 audit: BPF prog-id=46 op=LOAD Mar 17 18:42:25.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.961000 audit: BPF prog-id=47 op=LOAD Mar 17 18:42:25.961000 audit: BPF prog-id=30 op=UNLOAD Mar 17 18:42:25.961000 audit: BPF prog-id=31 op=UNLOAD Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit: BPF prog-id=48 op=LOAD Mar 17 18:42:25.962000 audit: BPF prog-id=32 op=UNLOAD Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit: BPF prog-id=49 op=LOAD Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.962000 audit: BPF prog-id=50 op=LOAD Mar 17 18:42:25.962000 audit: BPF prog-id=33 op=UNLOAD Mar 17 18:42:25.962000 audit: BPF prog-id=34 op=UNLOAD Mar 17 18:42:25.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.964000 audit: BPF prog-id=51 op=LOAD Mar 17 18:42:25.964000 audit: BPF prog-id=35 op=UNLOAD Mar 17 18:42:25.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.967000 audit: BPF prog-id=52 op=LOAD Mar 17 18:42:25.967000 audit: BPF prog-id=37 op=UNLOAD Mar 17 18:42:25.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.970000 audit: BPF prog-id=53 op=LOAD Mar 17 18:42:25.970000 audit: BPF prog-id=36 op=UNLOAD Mar 17 18:42:25.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.975000 audit: BPF prog-id=54 op=LOAD Mar 17 18:42:25.975000 audit: BPF prog-id=38 op=UNLOAD Mar 17 18:42:25.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.975000 audit: BPF prog-id=55 op=LOAD Mar 17 18:42:25.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.976000 audit: BPF prog-id=56 op=LOAD Mar 17 18:42:25.976000 audit: BPF prog-id=39 op=UNLOAD Mar 17 18:42:25.976000 audit: BPF prog-id=40 op=UNLOAD Mar 17 18:42:25.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:25.976000 audit: BPF prog-id=57 op=LOAD Mar 17 18:42:25.976000 audit: BPF prog-id=41 op=UNLOAD Mar 17 18:42:26.004362 systemd[1]: Started kubelet.service. Mar 17 18:42:26.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.008562 systemd[1]: Stopping kubelet.service... Mar 17 18:42:26.009522 systemd[1]: kubelet.service: Deactivated successfully. Mar 17 18:42:26.010083 systemd[1]: Stopped kubelet.service. Mar 17 18:42:26.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.013574 systemd[1]: Starting kubelet.service... Mar 17 18:42:26.163807 systemd[1]: Started kubelet.service. Mar 17 18:42:26.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:26.231562 kubelet[1437]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 18:42:26.232048 kubelet[1437]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Mar 17 18:42:26.232133 kubelet[1437]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 18:42:26.232353 kubelet[1437]: I0317 18:42:26.232318 1437 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Mar 17 18:42:26.764061 kubelet[1437]: I0317 18:42:26.764001 1437 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" Mar 17 18:42:26.764298 kubelet[1437]: I0317 18:42:26.764280 1437 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Mar 17 18:42:26.764967 kubelet[1437]: I0317 18:42:26.764937 1437 server.go:954] "Client rotation is on, will bootstrap in background" Mar 17 18:42:26.826170 kubelet[1437]: I0317 18:42:26.826091 1437 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Mar 17 18:42:26.844034 kubelet[1437]: E0317 18:42:26.843897 1437 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Mar 17 18:42:26.844034 kubelet[1437]: I0317 18:42:26.843997 1437 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Mar 17 18:42:26.849610 kubelet[1437]: I0317 18:42:26.849534 1437 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Mar 17 18:42:26.849998 kubelet[1437]: I0317 18:42:26.849920 1437 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Mar 17 18:42:26.850345 kubelet[1437]: I0317 18:42:26.849988 1437 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"64.23.131.98","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Mar 17 18:42:26.850576 kubelet[1437]: I0317 18:42:26.850357 1437 topology_manager.go:138] "Creating topology manager with none policy" Mar 17 18:42:26.850576 kubelet[1437]: I0317 18:42:26.850375 1437 container_manager_linux.go:304] "Creating device plugin manager" Mar 17 18:42:26.850576 kubelet[1437]: I0317 18:42:26.850571 1437 state_mem.go:36] "Initialized new in-memory state store" Mar 17 18:42:26.856184 kubelet[1437]: I0317 18:42:26.856076 1437 kubelet.go:446] "Attempting to sync node with API server" Mar 17 18:42:26.856184 kubelet[1437]: I0317 18:42:26.856168 1437 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Mar 17 18:42:26.856483 kubelet[1437]: I0317 18:42:26.856212 1437 kubelet.go:352] "Adding apiserver pod source" Mar 17 18:42:26.856483 kubelet[1437]: I0317 18:42:26.856228 1437 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Mar 17 18:42:26.863449 kubelet[1437]: E0317 18:42:26.863366 1437 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:26.863449 kubelet[1437]: E0317 18:42:26.863445 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:26.864822 kubelet[1437]: I0317 18:42:26.864784 1437 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Mar 17 18:42:26.865499 kubelet[1437]: I0317 18:42:26.865435 1437 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Mar 17 18:42:26.866954 kubelet[1437]: W0317 18:42:26.866896 1437 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Mar 17 18:42:26.869818 kubelet[1437]: I0317 18:42:26.869753 1437 watchdog_linux.go:99] "Systemd watchdog is not enabled" Mar 17 18:42:26.869995 kubelet[1437]: I0317 18:42:26.869831 1437 server.go:1287] "Started kubelet" Mar 17 18:42:26.871379 kubelet[1437]: I0317 18:42:26.871264 1437 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Mar 17 18:42:26.871953 kubelet[1437]: I0317 18:42:26.871923 1437 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Mar 17 18:42:26.872062 kubelet[1437]: I0317 18:42:26.871293 1437 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Mar 17 18:42:26.873621 kubelet[1437]: I0317 18:42:26.873582 1437 server.go:490] "Adding debug handlers to kubelet server" Mar 17 18:42:26.872000 audit[1437]: AVC avc: denied { mac_admin } for pid=1437 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:26.872000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:42:26.872000 audit[1437]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000816e40 a1=c00086e648 a2=c000816e10 a3=25 items=0 ppid=1 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:26.872000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:42:26.874760 kubelet[1437]: I0317 18:42:26.874674 1437 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Mar 17 18:42:26.873000 audit[1437]: AVC avc: denied { mac_admin } for pid=1437 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:26.873000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:42:26.873000 audit[1437]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00053fea0 a1=c00086e660 a2=c000816ed0 a3=25 items=0 ppid=1 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:26.873000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:42:26.875364 kubelet[1437]: I0317 18:42:26.875338 1437 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Mar 17 18:42:26.875593 kubelet[1437]: I0317 18:42:26.875573 1437 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Mar 17 18:42:26.884279 kubelet[1437]: W0317 18:42:26.884196 1437 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "64.23.131.98" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Mar 17 18:42:26.884279 kubelet[1437]: E0317 18:42:26.884266 1437 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"64.23.131.98\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Mar 17 18:42:26.884714 kubelet[1437]: W0317 18:42:26.884347 1437 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Mar 17 18:42:26.884714 kubelet[1437]: E0317 18:42:26.884468 1437 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Mar 17 18:42:26.885351 kubelet[1437]: I0317 18:42:26.885314 1437 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Mar 17 18:42:26.887459 kubelet[1437]: I0317 18:42:26.887426 1437 volume_manager.go:297] "Starting Kubelet Volume Manager" Mar 17 18:42:26.888057 kubelet[1437]: E0317 18:42:26.888018 1437 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"64.23.131.98\" not found" Mar 17 18:42:26.892626 kubelet[1437]: E0317 18:42:26.889065 1437 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{64.23.131.98.182dab45bcbc3757 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:64.23.131.98,UID:64.23.131.98,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:64.23.131.98,},FirstTimestamp:2025-03-17 18:42:26.869794647 +0000 UTC m=+0.695403579,LastTimestamp:2025-03-17 18:42:26.869794647 +0000 UTC m=+0.695403579,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:64.23.131.98,}" Mar 17 18:42:26.892914 kubelet[1437]: I0317 18:42:26.891438 1437 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Mar 17 18:42:26.893207 kubelet[1437]: I0317 18:42:26.893183 1437 reconciler.go:26] "Reconciler: start to sync state" Mar 17 18:42:26.894766 kubelet[1437]: I0317 18:42:26.893606 1437 factory.go:221] Registration of the systemd container factory successfully Mar 17 18:42:26.894766 kubelet[1437]: I0317 18:42:26.893750 1437 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Mar 17 18:42:26.908331 kubelet[1437]: I0317 18:42:26.908268 1437 factory.go:221] Registration of the containerd container factory successfully Mar 17 18:42:26.924845 kubelet[1437]: E0317 18:42:26.908449 1437 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Mar 17 18:42:26.924845 kubelet[1437]: E0317 18:42:26.909047 1437 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"64.23.131.98\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Mar 17 18:42:26.924845 kubelet[1437]: W0317 18:42:26.908323 1437 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Mar 17 18:42:26.925183 kubelet[1437]: E0317 18:42:26.924909 1437 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Mar 17 18:42:26.969647 kubelet[1437]: I0317 18:42:26.969612 1437 cpu_manager.go:221] "Starting CPU manager" policy="none" Mar 17 18:42:26.969873 kubelet[1437]: I0317 18:42:26.969856 1437 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Mar 17 18:42:26.969973 kubelet[1437]: I0317 18:42:26.969959 1437 state_mem.go:36] "Initialized new in-memory state store" Mar 17 18:42:26.970000 audit[1451]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:26.970000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe856e6280 a2=0 a3=7ffe856e626c items=0 ppid=1437 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:26.970000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Mar 17 18:42:26.973286 kubelet[1437]: I0317 18:42:26.973251 1437 policy_none.go:49] "None policy: Start" Mar 17 18:42:26.973477 kubelet[1437]: I0317 18:42:26.973451 1437 memory_manager.go:186] "Starting memorymanager" policy="None" Mar 17 18:42:26.973609 kubelet[1437]: I0317 18:42:26.973590 1437 state_mem.go:35] "Initializing new in-memory state store" Mar 17 18:42:26.974000 audit[1456]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:26.974000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff4f034ae0 a2=0 a3=7fff4f034acc items=0 ppid=1437 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:26.974000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Mar 17 18:42:26.984973 systemd[1]: Created slice kubepods.slice. Mar 17 18:42:26.993735 kubelet[1437]: E0317 18:42:26.993652 1437 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"64.23.131.98\" not found" Mar 17 18:42:27.002815 systemd[1]: Created slice kubepods-burstable.slice. Mar 17 18:42:26.984000 audit[1458]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:26.984000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffd8e3fcd0 a2=0 a3=7fffd8e3fcbc items=0 ppid=1437 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:26.984000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:42:27.013597 systemd[1]: Created slice kubepods-besteffort.slice. Mar 17 18:42:27.018000 audit[1464]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:27.018000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff9d9819e0 a2=0 a3=7fff9d9819cc items=0 ppid=1437 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:27.018000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:42:27.026396 kubelet[1437]: I0317 18:42:27.026337 1437 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Mar 17 18:42:27.024000 audit[1437]: AVC avc: denied { mac_admin } for pid=1437 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:27.024000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:42:27.024000 audit[1437]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006a59b0 a1=c000c22e10 a2=c0006a5980 a3=25 items=0 ppid=1 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:27.024000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:42:27.028066 kubelet[1437]: I0317 18:42:27.027811 1437 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Mar 17 18:42:27.028066 kubelet[1437]: I0317 18:42:27.028030 1437 eviction_manager.go:189] "Eviction manager: starting control loop" Mar 17 18:42:27.028272 kubelet[1437]: I0317 18:42:27.028063 1437 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Mar 17 18:42:27.029724 kubelet[1437]: I0317 18:42:27.028746 1437 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Mar 17 18:42:27.033023 kubelet[1437]: E0317 18:42:27.032973 1437 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Mar 17 18:42:27.033251 kubelet[1437]: E0317 18:42:27.033233 1437 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"64.23.131.98\" not found" Mar 17 18:42:27.100000 audit[1469]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:27.100000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe173b76a0 a2=0 a3=7ffe173b768c items=0 ppid=1437 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:27.100000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Mar 17 18:42:27.103482 kubelet[1437]: I0317 18:42:27.103388 1437 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Mar 17 18:42:27.103000 audit[1470]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:27.103000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff91ff5650 a2=0 a3=7fff91ff563c items=0 ppid=1437 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:27.103000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Mar 17 18:42:27.105000 audit[1471]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1471 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:27.105000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffff2cff2f0 a2=0 a3=7ffff2cff2dc items=0 ppid=1437 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:27.105000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Mar 17 18:42:27.106000 audit[1472]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:27.106000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc611b0ba0 a2=0 a3=7ffc611b0b8c items=0 ppid=1437 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:27.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Mar 17 18:42:27.108437 kubelet[1437]: I0317 18:42:27.108387 1437 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Mar 17 18:42:27.108812 kubelet[1437]: I0317 18:42:27.108790 1437 status_manager.go:227] "Starting to sync pod status with apiserver" Mar 17 18:42:27.109033 kubelet[1437]: I0317 18:42:27.109002 1437 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Mar 17 18:42:27.110054 kubelet[1437]: I0317 18:42:27.110028 1437 kubelet.go:2388] "Starting kubelet main sync loop" Mar 17 18:42:27.110433 kubelet[1437]: E0317 18:42:27.110391 1437 kubelet.go:2412] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Mar 17 18:42:27.111000 audit[1474]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:27.111000 audit[1473]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:27.111000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe66b4f790 a2=0 a3=10e3 items=0 ppid=1437 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:27.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Mar 17 18:42:27.111000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffee2cdb1c0 a2=0 a3=7ffee2cdb1ac items=0 ppid=1437 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:27.111000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Mar 17 18:42:27.114000 audit[1475]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1475 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:27.114000 audit[1475]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd165b7e90 a2=0 a3=7ffd165b7e7c items=0 ppid=1437 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:27.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Mar 17 18:42:27.116000 audit[1476]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1476 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:27.116000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff0ea1c530 a2=0 a3=7fff0ea1c51c items=0 ppid=1437 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:27.116000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Mar 17 18:42:27.129651 kubelet[1437]: I0317 18:42:27.129574 1437 kubelet_node_status.go:76] "Attempting to register node" node="64.23.131.98" Mar 17 18:42:27.163467 kubelet[1437]: I0317 18:42:27.163409 1437 kubelet_node_status.go:79] "Successfully registered node" node="64.23.131.98" Mar 17 18:42:27.163467 kubelet[1437]: E0317 18:42:27.163458 1437 kubelet_node_status.go:549] "Error updating node status, will retry" err="error getting node \"64.23.131.98\": node \"64.23.131.98\" not found" Mar 17 18:42:27.173263 kubelet[1437]: E0317 18:42:27.173193 1437 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"64.23.131.98\" not found" Mar 17 18:42:27.245360 sudo[1326]: pam_unix(sudo:session): session closed for user root Mar 17 18:42:27.243000 audit[1326]: USER_END pid=1326 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:42:27.243000 audit[1326]: CRED_DISP pid=1326 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:42:27.249471 sshd[1322]: pam_unix(sshd:session): session closed for user core Mar 17 18:42:27.250000 audit[1322]: USER_END pid=1322 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Mar 17 18:42:27.250000 audit[1322]: CRED_DISP pid=1322 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Mar 17 18:42:27.255489 systemd-logind[1180]: Session 7 logged out. Waiting for processes to exit. Mar 17 18:42:27.255652 systemd[1]: sshd@6-64.23.131.98:22-139.178.68.195:43300.service: Deactivated successfully. Mar 17 18:42:27.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-64.23.131.98:22-139.178.68.195:43300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:27.256991 systemd[1]: session-7.scope: Deactivated successfully. Mar 17 18:42:27.258784 systemd-logind[1180]: Removed session 7. Mar 17 18:42:27.274324 kubelet[1437]: E0317 18:42:27.274203 1437 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"64.23.131.98\" not found" Mar 17 18:42:27.375119 kubelet[1437]: E0317 18:42:27.374928 1437 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"64.23.131.98\" not found" Mar 17 18:42:27.476031 kubelet[1437]: E0317 18:42:27.475928 1437 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"64.23.131.98\" not found" Mar 17 18:42:27.577217 kubelet[1437]: E0317 18:42:27.577069 1437 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"64.23.131.98\" not found" Mar 17 18:42:27.677561 kubelet[1437]: E0317 18:42:27.677317 1437 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"64.23.131.98\" not found" Mar 17 18:42:27.767770 kubelet[1437]: I0317 18:42:27.767649 1437 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Mar 17 18:42:27.768065 kubelet[1437]: W0317 18:42:27.767954 1437 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Mar 17 18:42:27.778426 kubelet[1437]: E0317 18:42:27.778300 1437 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"64.23.131.98\" not found" Mar 17 18:42:27.864827 kubelet[1437]: E0317 18:42:27.864713 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:27.879376 kubelet[1437]: E0317 18:42:27.879280 1437 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"64.23.131.98\" not found" Mar 17 18:42:27.982358 kubelet[1437]: I0317 18:42:27.981789 1437 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Mar 17 18:42:27.983556 env[1187]: time="2025-03-17T18:42:27.983408466Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Mar 17 18:42:27.984490 kubelet[1437]: I0317 18:42:27.984456 1437 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Mar 17 18:42:28.860295 kubelet[1437]: I0317 18:42:28.860232 1437 apiserver.go:52] "Watching apiserver" Mar 17 18:42:28.865033 kubelet[1437]: E0317 18:42:28.864986 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:28.866986 kubelet[1437]: E0317 18:42:28.866856 1437 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m4g44" podUID="60254480-f0fc-46e2-9905-22c26f6d2e77" Mar 17 18:42:28.876760 systemd[1]: Created slice kubepods-besteffort-pod4e4d1185_e650_4b80_9b12_0f4d010d5420.slice. Mar 17 18:42:28.893139 systemd[1]: Created slice kubepods-besteffort-podab98fb51_f86a_4cef_ae9c_ff099021999b.slice. Mar 17 18:42:28.894252 kubelet[1437]: I0317 18:42:28.894220 1437 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Mar 17 18:42:28.904530 kubelet[1437]: I0317 18:42:28.904460 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/60254480-f0fc-46e2-9905-22c26f6d2e77-socket-dir\") pod \"csi-node-driver-m4g44\" (UID: \"60254480-f0fc-46e2-9905-22c26f6d2e77\") " pod="calico-system/csi-node-driver-m4g44" Mar 17 18:42:28.905885 kubelet[1437]: I0317 18:42:28.905828 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/ab98fb51-f86a-4cef-ae9c-ff099021999b-var-run-calico\") pod \"calico-node-p86qz\" (UID: \"ab98fb51-f86a-4cef-ae9c-ff099021999b\") " pod="calico-system/calico-node-p86qz" Mar 17 18:42:28.906055 kubelet[1437]: I0317 18:42:28.905913 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/ab98fb51-f86a-4cef-ae9c-ff099021999b-cni-net-dir\") pod \"calico-node-p86qz\" (UID: \"ab98fb51-f86a-4cef-ae9c-ff099021999b\") " pod="calico-system/calico-node-p86qz" Mar 17 18:42:28.906055 kubelet[1437]: I0317 18:42:28.905952 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/ab98fb51-f86a-4cef-ae9c-ff099021999b-policysync\") pod \"calico-node-p86qz\" (UID: \"ab98fb51-f86a-4cef-ae9c-ff099021999b\") " pod="calico-system/calico-node-p86qz" Mar 17 18:42:28.906055 kubelet[1437]: I0317 18:42:28.905978 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/ab98fb51-f86a-4cef-ae9c-ff099021999b-node-certs\") pod \"calico-node-p86qz\" (UID: \"ab98fb51-f86a-4cef-ae9c-ff099021999b\") " pod="calico-system/calico-node-p86qz" Mar 17 18:42:28.906055 kubelet[1437]: I0317 18:42:28.906010 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/ab98fb51-f86a-4cef-ae9c-ff099021999b-cni-log-dir\") pod \"calico-node-p86qz\" (UID: \"ab98fb51-f86a-4cef-ae9c-ff099021999b\") " pod="calico-system/calico-node-p86qz" Mar 17 18:42:28.906055 kubelet[1437]: I0317 18:42:28.906039 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/60254480-f0fc-46e2-9905-22c26f6d2e77-varrun\") pod \"csi-node-driver-m4g44\" (UID: \"60254480-f0fc-46e2-9905-22c26f6d2e77\") " pod="calico-system/csi-node-driver-m4g44" Mar 17 18:42:28.906377 kubelet[1437]: I0317 18:42:28.906082 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/60254480-f0fc-46e2-9905-22c26f6d2e77-kubelet-dir\") pod \"csi-node-driver-m4g44\" (UID: \"60254480-f0fc-46e2-9905-22c26f6d2e77\") " pod="calico-system/csi-node-driver-m4g44" Mar 17 18:42:28.906377 kubelet[1437]: I0317 18:42:28.906138 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wsvmf\" (UniqueName: \"kubernetes.io/projected/60254480-f0fc-46e2-9905-22c26f6d2e77-kube-api-access-wsvmf\") pod \"csi-node-driver-m4g44\" (UID: \"60254480-f0fc-46e2-9905-22c26f6d2e77\") " pod="calico-system/csi-node-driver-m4g44" Mar 17 18:42:28.906377 kubelet[1437]: I0317 18:42:28.906174 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/4e4d1185-e650-4b80-9b12-0f4d010d5420-kube-proxy\") pod \"kube-proxy-45tnx\" (UID: \"4e4d1185-e650-4b80-9b12-0f4d010d5420\") " pod="kube-system/kube-proxy-45tnx" Mar 17 18:42:28.906377 kubelet[1437]: I0317 18:42:28.906205 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4e4d1185-e650-4b80-9b12-0f4d010d5420-lib-modules\") pod \"kube-proxy-45tnx\" (UID: \"4e4d1185-e650-4b80-9b12-0f4d010d5420\") " pod="kube-system/kube-proxy-45tnx" Mar 17 18:42:28.906377 kubelet[1437]: I0317 18:42:28.906259 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t7wcb\" (UniqueName: \"kubernetes.io/projected/4e4d1185-e650-4b80-9b12-0f4d010d5420-kube-api-access-t7wcb\") pod \"kube-proxy-45tnx\" (UID: \"4e4d1185-e650-4b80-9b12-0f4d010d5420\") " pod="kube-system/kube-proxy-45tnx" Mar 17 18:42:28.906666 kubelet[1437]: I0317 18:42:28.906295 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ab98fb51-f86a-4cef-ae9c-ff099021999b-tigera-ca-bundle\") pod \"calico-node-p86qz\" (UID: \"ab98fb51-f86a-4cef-ae9c-ff099021999b\") " pod="calico-system/calico-node-p86qz" Mar 17 18:42:28.906666 kubelet[1437]: I0317 18:42:28.906330 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-prrq9\" (UniqueName: \"kubernetes.io/projected/ab98fb51-f86a-4cef-ae9c-ff099021999b-kube-api-access-prrq9\") pod \"calico-node-p86qz\" (UID: \"ab98fb51-f86a-4cef-ae9c-ff099021999b\") " pod="calico-system/calico-node-p86qz" Mar 17 18:42:28.906666 kubelet[1437]: I0317 18:42:28.906357 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/60254480-f0fc-46e2-9905-22c26f6d2e77-registration-dir\") pod \"csi-node-driver-m4g44\" (UID: \"60254480-f0fc-46e2-9905-22c26f6d2e77\") " pod="calico-system/csi-node-driver-m4g44" Mar 17 18:42:28.906666 kubelet[1437]: I0317 18:42:28.906396 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4e4d1185-e650-4b80-9b12-0f4d010d5420-xtables-lock\") pod \"kube-proxy-45tnx\" (UID: \"4e4d1185-e650-4b80-9b12-0f4d010d5420\") " pod="kube-system/kube-proxy-45tnx" Mar 17 18:42:28.906666 kubelet[1437]: I0317 18:42:28.906434 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ab98fb51-f86a-4cef-ae9c-ff099021999b-lib-modules\") pod \"calico-node-p86qz\" (UID: \"ab98fb51-f86a-4cef-ae9c-ff099021999b\") " pod="calico-system/calico-node-p86qz" Mar 17 18:42:28.907054 kubelet[1437]: I0317 18:42:28.906469 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ab98fb51-f86a-4cef-ae9c-ff099021999b-xtables-lock\") pod \"calico-node-p86qz\" (UID: \"ab98fb51-f86a-4cef-ae9c-ff099021999b\") " pod="calico-system/calico-node-p86qz" Mar 17 18:42:28.907054 kubelet[1437]: I0317 18:42:28.906506 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ab98fb51-f86a-4cef-ae9c-ff099021999b-var-lib-calico\") pod \"calico-node-p86qz\" (UID: \"ab98fb51-f86a-4cef-ae9c-ff099021999b\") " pod="calico-system/calico-node-p86qz" Mar 17 18:42:28.907054 kubelet[1437]: I0317 18:42:28.906544 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/ab98fb51-f86a-4cef-ae9c-ff099021999b-cni-bin-dir\") pod \"calico-node-p86qz\" (UID: \"ab98fb51-f86a-4cef-ae9c-ff099021999b\") " pod="calico-system/calico-node-p86qz" Mar 17 18:42:28.907054 kubelet[1437]: I0317 18:42:28.906580 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/ab98fb51-f86a-4cef-ae9c-ff099021999b-flexvol-driver-host\") pod \"calico-node-p86qz\" (UID: \"ab98fb51-f86a-4cef-ae9c-ff099021999b\") " pod="calico-system/calico-node-p86qz" Mar 17 18:42:29.010986 kubelet[1437]: I0317 18:42:29.010933 1437 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Mar 17 18:42:29.012829 kubelet[1437]: E0317 18:42:29.012778 1437 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:42:29.012829 kubelet[1437]: W0317 18:42:29.012817 1437 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:42:29.013108 kubelet[1437]: E0317 18:42:29.012847 1437 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:42:29.027140 kubelet[1437]: E0317 18:42:29.027097 1437 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:42:29.027379 kubelet[1437]: W0317 18:42:29.027353 1437 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:42:29.027547 kubelet[1437]: E0317 18:42:29.027525 1437 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:42:29.046938 kubelet[1437]: E0317 18:42:29.046873 1437 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:42:29.047246 kubelet[1437]: W0317 18:42:29.047210 1437 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:42:29.047449 kubelet[1437]: E0317 18:42:29.047421 1437 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:42:29.065853 kubelet[1437]: E0317 18:42:29.059805 1437 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:42:29.065853 kubelet[1437]: W0317 18:42:29.064870 1437 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:42:29.065853 kubelet[1437]: E0317 18:42:29.064945 1437 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:42:29.070466 kubelet[1437]: E0317 18:42:29.070426 1437 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:42:29.070758 kubelet[1437]: W0317 18:42:29.070722 1437 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:42:29.070967 kubelet[1437]: E0317 18:42:29.070944 1437 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:42:29.190750 kubelet[1437]: E0317 18:42:29.188835 1437 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Mar 17 18:42:29.191268 env[1187]: time="2025-03-17T18:42:29.191149034Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-45tnx,Uid:4e4d1185-e650-4b80-9b12-0f4d010d5420,Namespace:kube-system,Attempt:0,}" Mar 17 18:42:29.198581 kubelet[1437]: E0317 18:42:29.198530 1437 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Mar 17 18:42:29.200546 env[1187]: time="2025-03-17T18:42:29.199815593Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-p86qz,Uid:ab98fb51-f86a-4cef-ae9c-ff099021999b,Namespace:calico-system,Attempt:0,}" Mar 17 18:42:29.865999 kubelet[1437]: E0317 18:42:29.865874 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:29.915343 env[1187]: time="2025-03-17T18:42:29.915228447Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:29.919051 env[1187]: time="2025-03-17T18:42:29.918964606Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:29.920768 env[1187]: time="2025-03-17T18:42:29.920670689Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:29.925897 env[1187]: time="2025-03-17T18:42:29.925806915Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:29.929251 env[1187]: time="2025-03-17T18:42:29.929173162Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:29.933394 env[1187]: time="2025-03-17T18:42:29.933319115Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:29.937475 env[1187]: time="2025-03-17T18:42:29.937405761Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:29.943632 env[1187]: time="2025-03-17T18:42:29.943517105Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:29.991220 env[1187]: time="2025-03-17T18:42:29.991056567Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:42:29.991220 env[1187]: time="2025-03-17T18:42:29.991149567Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:42:29.991220 env[1187]: time="2025-03-17T18:42:29.991168513Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:42:29.991572 env[1187]: time="2025-03-17T18:42:29.991405829Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:42:29.991572 env[1187]: time="2025-03-17T18:42:29.991484635Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:42:29.991572 env[1187]: time="2025-03-17T18:42:29.991516983Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:42:29.991780 env[1187]: time="2025-03-17T18:42:29.991728880Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/771a002c4b23d20217ff23b7d5c5d70e2a974c4b6b2529335b727103d4a59f66 pid=1508 runtime=io.containerd.runc.v2 Mar 17 18:42:29.992194 env[1187]: time="2025-03-17T18:42:29.992120058Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b81bbd0c77539ecb7a4c70194f55972fcdf37b35affba6c113003a7e6f6c9528 pid=1495 runtime=io.containerd.runc.v2 Mar 17 18:42:30.026819 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount514171827.mount: Deactivated successfully. Mar 17 18:42:30.045553 systemd[1]: Started cri-containerd-b81bbd0c77539ecb7a4c70194f55972fcdf37b35affba6c113003a7e6f6c9528.scope. Mar 17 18:42:30.070514 systemd[1]: run-containerd-runc-k8s.io-771a002c4b23d20217ff23b7d5c5d70e2a974c4b6b2529335b727103d4a59f66-runc.1U3PNJ.mount: Deactivated successfully. Mar 17 18:42:30.089146 systemd[1]: Started cri-containerd-771a002c4b23d20217ff23b7d5c5d70e2a974c4b6b2529335b727103d4a59f66.scope. Mar 17 18:42:30.115575 kernel: kauditd_printk_skb: 242 callbacks suppressed Mar 17 18:42:30.115819 kernel: audit: type=1400 audit(1742236950.106:439): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.131498 kernel: audit: type=1400 audit(1742236950.106:440): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.131644 kernel: audit: type=1400 audit(1742236950.106:441): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.131749 kernel: audit: type=1400 audit(1742236950.106:442): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.151629 kernel: audit: type=1400 audit(1742236950.106:443): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.151870 kernel: audit: type=1400 audit(1742236950.106:444): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.163762 kernel: audit: type=1400 audit(1742236950.106:445): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.176191 kernel: audit: type=1400 audit(1742236950.106:446): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.176362 kernel: audit: type=1400 audit(1742236950.106:447): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.176394 kernel: audit: type=1400 audit(1742236950.113:448): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.113000 audit: BPF prog-id=58 op=LOAD Mar 17 18:42:30.115000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.115000 audit[1524]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1495 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:30.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238316262643063373735333965636237613463373031393466353539 Mar 17 18:42:30.115000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.115000 audit[1524]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1495 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:30.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238316262643063373735333965636237613463373031393466353539 Mar 17 18:42:30.115000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.115000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.115000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.115000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.115000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.115000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.115000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.115000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.115000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.115000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.115000 audit: BPF prog-id=59 op=LOAD Mar 17 18:42:30.115000 audit[1524]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00028a9b0 items=0 ppid=1495 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:30.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238316262643063373735333965636237613463373031393466353539 Mar 17 18:42:30.118000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.118000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.118000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.118000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.118000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.118000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.118000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.118000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.118000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.118000 audit: BPF prog-id=60 op=LOAD Mar 17 18:42:30.118000 audit[1524]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00028a9f8 items=0 ppid=1495 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:30.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238316262643063373735333965636237613463373031393466353539 Mar 17 18:42:30.124000 audit: BPF prog-id=60 op=UNLOAD Mar 17 18:42:30.124000 audit: BPF prog-id=59 op=UNLOAD Mar 17 18:42:30.124000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.124000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.124000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.124000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.124000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.124000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.124000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.124000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.124000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.124000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.124000 audit: BPF prog-id=61 op=LOAD Mar 17 18:42:30.124000 audit[1524]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00028ae08 items=0 ppid=1495 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:30.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238316262643063373735333965636237613463373031393466353539 Mar 17 18:42:30.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.187000 audit: BPF prog-id=62 op=LOAD Mar 17 18:42:30.188000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.188000 audit[1523]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1508 pid=1523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:30.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737316130303263346232336432303231376666323362376435633564 Mar 17 18:42:30.188000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.188000 audit[1523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1508 pid=1523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:30.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737316130303263346232336432303231376666323362376435633564 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit: BPF prog-id=63 op=LOAD Mar 17 18:42:30.189000 audit[1523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00021c370 items=0 ppid=1508 pid=1523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:30.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737316130303263346232336432303231376666323362376435633564 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit: BPF prog-id=64 op=LOAD Mar 17 18:42:30.189000 audit[1523]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00021c3b8 items=0 ppid=1508 pid=1523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:30.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737316130303263346232336432303231376666323362376435633564 Mar 17 18:42:30.189000 audit: BPF prog-id=64 op=UNLOAD Mar 17 18:42:30.189000 audit: BPF prog-id=63 op=UNLOAD Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { perfmon } for pid=1523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit[1523]: AVC avc: denied { bpf } for pid=1523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:30.189000 audit: BPF prog-id=65 op=LOAD Mar 17 18:42:30.189000 audit[1523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00021c7c8 items=0 ppid=1508 pid=1523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:30.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737316130303263346232336432303231376666323362376435633564 Mar 17 18:42:30.200796 env[1187]: time="2025-03-17T18:42:30.194314515Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-p86qz,Uid:ab98fb51-f86a-4cef-ae9c-ff099021999b,Namespace:calico-system,Attempt:0,} returns sandbox id \"b81bbd0c77539ecb7a4c70194f55972fcdf37b35affba6c113003a7e6f6c9528\"" Mar 17 18:42:30.200796 env[1187]: time="2025-03-17T18:42:30.200272444Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Mar 17 18:42:30.201373 kubelet[1437]: E0317 18:42:30.196734 1437 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Mar 17 18:42:30.223830 env[1187]: time="2025-03-17T18:42:30.223669612Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-45tnx,Uid:4e4d1185-e650-4b80-9b12-0f4d010d5420,Namespace:kube-system,Attempt:0,} returns sandbox id \"771a002c4b23d20217ff23b7d5c5d70e2a974c4b6b2529335b727103d4a59f66\"" Mar 17 18:42:30.225859 kubelet[1437]: E0317 18:42:30.225376 1437 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Mar 17 18:42:30.866681 kubelet[1437]: E0317 18:42:30.866599 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:31.112771 kubelet[1437]: E0317 18:42:31.112163 1437 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m4g44" podUID="60254480-f0fc-46e2-9905-22c26f6d2e77" Mar 17 18:42:31.668709 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3838382952.mount: Deactivated successfully. Mar 17 18:42:31.867563 kubelet[1437]: E0317 18:42:31.867482 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:31.920889 env[1187]: time="2025-03-17T18:42:31.920296860Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:31.924465 env[1187]: time="2025-03-17T18:42:31.924390260Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:31.928393 env[1187]: time="2025-03-17T18:42:31.928314536Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:31.933682 env[1187]: time="2025-03-17T18:42:31.933579495Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:31.936152 env[1187]: time="2025-03-17T18:42:31.935180347Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Mar 17 18:42:31.938933 env[1187]: time="2025-03-17T18:42:31.938878774Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.3\"" Mar 17 18:42:31.940747 env[1187]: time="2025-03-17T18:42:31.940659004Z" level=info msg="CreateContainer within sandbox \"b81bbd0c77539ecb7a4c70194f55972fcdf37b35affba6c113003a7e6f6c9528\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Mar 17 18:42:31.965641 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1890918149.mount: Deactivated successfully. Mar 17 18:42:31.975813 env[1187]: time="2025-03-17T18:42:31.975682497Z" level=info msg="CreateContainer within sandbox \"b81bbd0c77539ecb7a4c70194f55972fcdf37b35affba6c113003a7e6f6c9528\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"bed4538fd72b7e2d712739328b7a5fc876e4b7cbbb6a15d7b19a923c17b88185\"" Mar 17 18:42:31.977536 env[1187]: time="2025-03-17T18:42:31.977467311Z" level=info msg="StartContainer for \"bed4538fd72b7e2d712739328b7a5fc876e4b7cbbb6a15d7b19a923c17b88185\"" Mar 17 18:42:32.016267 systemd[1]: Started cri-containerd-bed4538fd72b7e2d712739328b7a5fc876e4b7cbbb6a15d7b19a923c17b88185.scope. Mar 17 18:42:32.045000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.045000 audit[1580]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7ff1784a4cc8 items=0 ppid=1495 pid=1580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:32.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265643435333866643732623765326437313237333933323862376135 Mar 17 18:42:32.045000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.045000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.045000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.045000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.045000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.045000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.045000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.045000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.045000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.045000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.045000 audit: BPF prog-id=66 op=LOAD Mar 17 18:42:32.045000 audit[1580]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002849b8 items=0 ppid=1495 pid=1580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:32.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265643435333866643732623765326437313237333933323862376135 Mar 17 18:42:32.046000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.046000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.046000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.046000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.046000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.046000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.046000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.046000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.046000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.046000 audit: BPF prog-id=67 op=LOAD Mar 17 18:42:32.046000 audit[1580]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000284a08 items=0 ppid=1495 pid=1580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:32.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265643435333866643732623765326437313237333933323862376135 Mar 17 18:42:32.046000 audit: BPF prog-id=67 op=UNLOAD Mar 17 18:42:32.046000 audit: BPF prog-id=66 op=UNLOAD Mar 17 18:42:32.046000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.046000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.046000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.046000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.046000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.046000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.046000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.046000 audit[1580]: AVC avc: denied { perfmon } for pid=1580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.046000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.046000 audit[1580]: AVC avc: denied { bpf } for pid=1580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:32.046000 audit: BPF prog-id=68 op=LOAD Mar 17 18:42:32.046000 audit[1580]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000284a98 items=0 ppid=1495 pid=1580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:32.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265643435333866643732623765326437313237333933323862376135 Mar 17 18:42:32.084650 env[1187]: time="2025-03-17T18:42:32.084514731Z" level=info msg="StartContainer for \"bed4538fd72b7e2d712739328b7a5fc876e4b7cbbb6a15d7b19a923c17b88185\" returns successfully" Mar 17 18:42:32.090597 systemd[1]: cri-containerd-bed4538fd72b7e2d712739328b7a5fc876e4b7cbbb6a15d7b19a923c17b88185.scope: Deactivated successfully. Mar 17 18:42:32.091000 audit: BPF prog-id=68 op=UNLOAD Mar 17 18:42:32.132913 kubelet[1437]: E0317 18:42:32.132852 1437 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Mar 17 18:42:32.154014 env[1187]: time="2025-03-17T18:42:32.153946669Z" level=info msg="shim disconnected" id=bed4538fd72b7e2d712739328b7a5fc876e4b7cbbb6a15d7b19a923c17b88185 Mar 17 18:42:32.154455 env[1187]: time="2025-03-17T18:42:32.154425224Z" level=warning msg="cleaning up after shim disconnected" id=bed4538fd72b7e2d712739328b7a5fc876e4b7cbbb6a15d7b19a923c17b88185 namespace=k8s.io Mar 17 18:42:32.154592 env[1187]: time="2025-03-17T18:42:32.154571458Z" level=info msg="cleaning up dead shim" Mar 17 18:42:32.179898 env[1187]: time="2025-03-17T18:42:32.177816331Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:42:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1619 runtime=io.containerd.runc.v2\n" Mar 17 18:42:32.578520 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-bed4538fd72b7e2d712739328b7a5fc876e4b7cbbb6a15d7b19a923c17b88185-rootfs.mount: Deactivated successfully. Mar 17 18:42:32.868018 kubelet[1437]: E0317 18:42:32.867640 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:33.113154 kubelet[1437]: E0317 18:42:33.113075 1437 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m4g44" podUID="60254480-f0fc-46e2-9905-22c26f6d2e77" Mar 17 18:42:33.137231 kubelet[1437]: E0317 18:42:33.136869 1437 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Mar 17 18:42:33.470649 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1856175368.mount: Deactivated successfully. Mar 17 18:42:33.868220 kubelet[1437]: E0317 18:42:33.868158 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:34.753632 env[1187]: time="2025-03-17T18:42:34.753540173Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:34.758840 env[1187]: time="2025-03-17T18:42:34.758773227Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a1ae78fd2f9d8fc345928378dc947c7f1e95f01c1a552781827071867a95d09c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:34.762897 env[1187]: time="2025-03-17T18:42:34.762796857Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:34.765654 env[1187]: time="2025-03-17T18:42:34.765558520Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.3\" returns image reference \"sha256:a1ae78fd2f9d8fc345928378dc947c7f1e95f01c1a552781827071867a95d09c\"" Mar 17 18:42:34.766150 env[1187]: time="2025-03-17T18:42:34.766007852Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:5015269547a0b7dd2c062758e9a64467b58978ff2502cad4c3f5cdf4aa554ad3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:34.769310 env[1187]: time="2025-03-17T18:42:34.768539608Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Mar 17 18:42:34.771999 env[1187]: time="2025-03-17T18:42:34.771935182Z" level=info msg="CreateContainer within sandbox \"771a002c4b23d20217ff23b7d5c5d70e2a974c4b6b2529335b727103d4a59f66\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Mar 17 18:42:34.798143 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1415773404.mount: Deactivated successfully. Mar 17 18:42:34.810659 env[1187]: time="2025-03-17T18:42:34.810552324Z" level=info msg="CreateContainer within sandbox \"771a002c4b23d20217ff23b7d5c5d70e2a974c4b6b2529335b727103d4a59f66\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"0544b8fea3aa19ec5b9759eb59d7b6b4d75c44a435b5c63007cf2d04268ecf84\"" Mar 17 18:42:34.811882 env[1187]: time="2025-03-17T18:42:34.811827427Z" level=info msg="StartContainer for \"0544b8fea3aa19ec5b9759eb59d7b6b4d75c44a435b5c63007cf2d04268ecf84\"" Mar 17 18:42:34.853012 systemd[1]: Started cri-containerd-0544b8fea3aa19ec5b9759eb59d7b6b4d75c44a435b5c63007cf2d04268ecf84.scope. Mar 17 18:42:34.869037 kubelet[1437]: E0317 18:42:34.868975 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:34.900000 audit[1645]: AVC avc: denied { perfmon } for pid=1645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.900000 audit[1645]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fa96ab059b8 items=0 ppid=1508 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:34.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035343462386665613361613139656335623937353965623539643762 Mar 17 18:42:34.901000 audit[1645]: AVC avc: denied { bpf } for pid=1645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.901000 audit[1645]: AVC avc: denied { bpf } for pid=1645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.901000 audit[1645]: AVC avc: denied { bpf } for pid=1645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.901000 audit[1645]: AVC avc: denied { perfmon } for pid=1645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.901000 audit[1645]: AVC avc: denied { perfmon } for pid=1645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.901000 audit[1645]: AVC avc: denied { perfmon } for pid=1645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.901000 audit[1645]: AVC avc: denied { perfmon } for pid=1645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.901000 audit[1645]: AVC avc: denied { perfmon } for pid=1645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.901000 audit[1645]: AVC avc: denied { bpf } for pid=1645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.901000 audit[1645]: AVC avc: denied { bpf } for pid=1645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.901000 audit: BPF prog-id=69 op=LOAD Mar 17 18:42:34.901000 audit[1645]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002713d8 items=0 ppid=1508 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:34.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035343462386665613361613139656335623937353965623539643762 Mar 17 18:42:34.902000 audit[1645]: AVC avc: denied { bpf } for pid=1645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.902000 audit[1645]: AVC avc: denied { bpf } for pid=1645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.902000 audit[1645]: AVC avc: denied { perfmon } for pid=1645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.902000 audit[1645]: AVC avc: denied { perfmon } for pid=1645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.902000 audit[1645]: AVC avc: denied { perfmon } for pid=1645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.902000 audit[1645]: AVC avc: denied { perfmon } for pid=1645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.902000 audit[1645]: AVC avc: denied { perfmon } for pid=1645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.902000 audit[1645]: AVC avc: denied { bpf } for pid=1645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.902000 audit[1645]: AVC avc: denied { bpf } for pid=1645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.902000 audit: BPF prog-id=70 op=LOAD Mar 17 18:42:34.902000 audit[1645]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000271428 items=0 ppid=1508 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:34.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035343462386665613361613139656335623937353965623539643762 Mar 17 18:42:34.904000 audit: BPF prog-id=70 op=UNLOAD Mar 17 18:42:34.904000 audit: BPF prog-id=69 op=UNLOAD Mar 17 18:42:34.904000 audit[1645]: AVC avc: denied { bpf } for pid=1645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.904000 audit[1645]: AVC avc: denied { bpf } for pid=1645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.904000 audit[1645]: AVC avc: denied { bpf } for pid=1645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.904000 audit[1645]: AVC avc: denied { perfmon } for pid=1645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.904000 audit[1645]: AVC avc: denied { perfmon } for pid=1645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.904000 audit[1645]: AVC avc: denied { perfmon } for pid=1645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.904000 audit[1645]: AVC avc: denied { perfmon } for pid=1645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.904000 audit[1645]: AVC avc: denied { perfmon } for pid=1645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.904000 audit[1645]: AVC avc: denied { bpf } for pid=1645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.904000 audit[1645]: AVC avc: denied { bpf } for pid=1645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:34.904000 audit: BPF prog-id=71 op=LOAD Mar 17 18:42:34.904000 audit[1645]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002714b8 items=0 ppid=1508 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:34.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035343462386665613361613139656335623937353965623539643762 Mar 17 18:42:34.936735 env[1187]: time="2025-03-17T18:42:34.936609148Z" level=info msg="StartContainer for \"0544b8fea3aa19ec5b9759eb59d7b6b4d75c44a435b5c63007cf2d04268ecf84\" returns successfully" Mar 17 18:42:35.111550 kubelet[1437]: E0317 18:42:35.111000 1437 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m4g44" podUID="60254480-f0fc-46e2-9905-22c26f6d2e77" Mar 17 18:42:35.134000 audit[1704]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.137384 kernel: kauditd_printk_skb: 191 callbacks suppressed Mar 17 18:42:35.137553 kernel: audit: type=1325 audit(1742236955.134:488): table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.134000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2e581580 a2=0 a3=7ffc2e58156c items=0 ppid=1655 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.149623 kernel: audit: type=1300 audit(1742236955.134:488): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2e581580 a2=0 a3=7ffc2e58156c items=0 ppid=1655 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Mar 17 18:42:35.155852 kernel: audit: type=1327 audit(1742236955.134:488): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Mar 17 18:42:35.136000 audit[1706]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.161736 kernel: audit: type=1325 audit(1742236955.136:489): table=nat:15 family=2 entries=1 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.136000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9f889030 a2=0 a3=7ffd9f88901c items=0 ppid=1655 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.170824 kernel: audit: type=1300 audit(1742236955.136:489): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9f889030 a2=0 a3=7ffd9f88901c items=0 ppid=1655 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.136000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Mar 17 18:42:35.175774 kernel: audit: type=1327 audit(1742236955.136:489): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Mar 17 18:42:35.176071 kernel: audit: type=1325 audit(1742236955.138:490): table=filter:16 family=2 entries=1 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.138000 audit[1707]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.179333 kubelet[1437]: E0317 18:42:35.178736 1437 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Mar 17 18:42:35.138000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe298b53a0 a2=0 a3=7ffe298b538c items=0 ppid=1655 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.138000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Mar 17 18:42:35.192377 kernel: audit: type=1300 audit(1742236955.138:490): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe298b53a0 a2=0 a3=7ffe298b538c items=0 ppid=1655 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.192723 kernel: audit: type=1327 audit(1742236955.138:490): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Mar 17 18:42:35.192792 kernel: audit: type=1325 audit(1742236955.141:491): table=mangle:17 family=10 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.141000 audit[1708]: NETFILTER_CFG table=mangle:17 family=10 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.141000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9c28f000 a2=0 a3=7ffe9c28efec items=0 ppid=1655 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.141000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Mar 17 18:42:35.143000 audit[1709]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.143000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff33f217b0 a2=0 a3=7fff33f2179c items=0 ppid=1655 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.143000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Mar 17 18:42:35.145000 audit[1710]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.145000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff561df6e0 a2=0 a3=7fff561df6cc items=0 ppid=1655 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.145000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Mar 17 18:42:35.203177 kubelet[1437]: I0317 18:42:35.203017 1437 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-45tnx" podStartSLOduration=3.661306372 podStartE2EDuration="8.202987845s" podCreationTimestamp="2025-03-17 18:42:27 +0000 UTC" firstStartedPulling="2025-03-17 18:42:30.226562927 +0000 UTC m=+4.052171841" lastFinishedPulling="2025-03-17 18:42:34.768244397 +0000 UTC m=+8.593853314" observedRunningTime="2025-03-17 18:42:35.202438668 +0000 UTC m=+9.028047604" watchObservedRunningTime="2025-03-17 18:42:35.202987845 +0000 UTC m=+9.028596788" Mar 17 18:42:35.249000 audit[1711]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.249000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe4cac9790 a2=0 a3=7ffe4cac977c items=0 ppid=1655 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.249000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Mar 17 18:42:35.255000 audit[1713]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.255000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffef1878990 a2=0 a3=7ffef187897c items=0 ppid=1655 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.255000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Mar 17 18:42:35.264000 audit[1716]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.264000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffdd743640 a2=0 a3=7fffdd74362c items=0 ppid=1655 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.264000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Mar 17 18:42:35.266000 audit[1717]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.266000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce9516050 a2=0 a3=7ffce951603c items=0 ppid=1655 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.266000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Mar 17 18:42:35.273000 audit[1719]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.273000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdb5a98e50 a2=0 a3=7ffdb5a98e3c items=0 ppid=1655 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.273000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Mar 17 18:42:35.276000 audit[1720]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.276000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffece9a73f0 a2=0 a3=7ffece9a73dc items=0 ppid=1655 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.276000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Mar 17 18:42:35.281000 audit[1722]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.281000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeb111d470 a2=0 a3=7ffeb111d45c items=0 ppid=1655 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.281000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Mar 17 18:42:35.290000 audit[1725]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.290000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc99649890 a2=0 a3=7ffc9964987c items=0 ppid=1655 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.290000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Mar 17 18:42:35.292000 audit[1726]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.292000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7e514280 a2=0 a3=7ffe7e51426c items=0 ppid=1655 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.292000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Mar 17 18:42:35.298000 audit[1728]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.298000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe4ceaec60 a2=0 a3=7ffe4ceaec4c items=0 ppid=1655 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.298000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Mar 17 18:42:35.300000 audit[1729]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.300000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd3157f9f0 a2=0 a3=7ffd3157f9dc items=0 ppid=1655 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.300000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Mar 17 18:42:35.312000 audit[1731]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.312000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcaaa62410 a2=0 a3=7ffcaaa623fc items=0 ppid=1655 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.312000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 18:42:35.321000 audit[1734]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.321000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe9ec41900 a2=0 a3=7ffe9ec418ec items=0 ppid=1655 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.321000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 18:42:35.328000 audit[1737]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.328000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffef83258b0 a2=0 a3=7ffef832589c items=0 ppid=1655 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.328000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Mar 17 18:42:35.330000 audit[1738]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.330000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc2b527260 a2=0 a3=7ffc2b52724c items=0 ppid=1655 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.330000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Mar 17 18:42:35.336000 audit[1740]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.336000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd67096920 a2=0 a3=7ffd6709690c items=0 ppid=1655 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.336000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:42:35.376000 audit[1744]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.376000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe2054a710 a2=0 a3=7ffe2054a6fc items=0 ppid=1655 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.376000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:42:35.379000 audit[1745]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.379000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc298189c0 a2=0 a3=7ffc298189ac items=0 ppid=1655 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.379000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Mar 17 18:42:35.384000 audit[1747]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:42:35.384000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdeb1122f0 a2=0 a3=7ffdeb1122dc items=0 ppid=1655 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.384000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Mar 17 18:42:35.415000 audit[1753]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:42:35.415000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff0403a180 a2=0 a3=7fff0403a16c items=0 ppid=1655 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.415000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:42:35.453000 audit[1753]: NETFILTER_CFG table=nat:40 family=2 entries=61 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:42:35.453000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=29052 a0=3 a1=7fff0403a180 a2=0 a3=7fff0403a16c items=0 ppid=1655 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.453000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:42:35.472000 audit[1761]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.472000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff2b8cd150 a2=0 a3=7fff2b8cd13c items=0 ppid=1655 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.472000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Mar 17 18:42:35.478000 audit[1763]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.478000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcde33d190 a2=0 a3=7ffcde33d17c items=0 ppid=1655 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.478000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Mar 17 18:42:35.486000 audit[1766]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.486000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffee6557b90 a2=0 a3=7ffee6557b7c items=0 ppid=1655 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.486000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Mar 17 18:42:35.489000 audit[1767]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.489000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff58655ed0 a2=0 a3=7fff58655ebc items=0 ppid=1655 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.489000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Mar 17 18:42:35.494000 audit[1769]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.494000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffef48c9dd0 a2=0 a3=7ffef48c9dbc items=0 ppid=1655 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.494000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Mar 17 18:42:35.497000 audit[1770]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.497000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5e705f00 a2=0 a3=7ffd5e705eec items=0 ppid=1655 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.497000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Mar 17 18:42:35.503000 audit[1772]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.503000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc907052d0 a2=0 a3=7ffc907052bc items=0 ppid=1655 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.503000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Mar 17 18:42:35.512000 audit[1777]: NETFILTER_CFG table=filter:48 family=2 entries=8 op=nft_register_rule pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:42:35.512000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdd8402950 a2=0 a3=7ffdd840293c items=0 ppid=1655 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.512000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:42:35.518000 audit[1776]: NETFILTER_CFG table=filter:49 family=10 entries=2 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.518000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff21df46d0 a2=0 a3=7fff21df46bc items=0 ppid=1655 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.518000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Mar 17 18:42:35.519000 audit[1777]: NETFILTER_CFG table=nat:50 family=2 entries=34 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:42:35.519000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffdd8402950 a2=0 a3=7ffdd840293c items=0 ppid=1655 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.519000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:42:35.524000 audit[1779]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.524000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc25c0a1c0 a2=0 a3=7ffc25c0a1ac items=0 ppid=1655 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.524000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Mar 17 18:42:35.529000 audit[1781]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.529000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe2f4a1e50 a2=0 a3=7ffe2f4a1e3c items=0 ppid=1655 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.529000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Mar 17 18:42:35.531000 audit[1782]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.531000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe693e39d0 a2=0 a3=7ffe693e39bc items=0 ppid=1655 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.531000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Mar 17 18:42:35.536000 audit[1784]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.536000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdafc51550 a2=0 a3=7ffdafc5153c items=0 ppid=1655 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.536000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 18:42:35.544000 audit[1787]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=1787 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.544000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe96116260 a2=0 a3=7ffe9611624c items=0 ppid=1655 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Mar 17 18:42:35.553000 audit[1790]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.553000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc310d8880 a2=0 a3=7ffc310d886c items=0 ppid=1655 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.553000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Mar 17 18:42:35.557000 audit[1791]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.557000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc0417b3d0 a2=0 a3=7ffc0417b3bc items=0 ppid=1655 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.557000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Mar 17 18:42:35.562000 audit[1793]: NETFILTER_CFG table=nat:58 family=10 entries=2 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.562000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe7675d650 a2=0 a3=7ffe7675d63c items=0 ppid=1655 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.562000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:42:35.569000 audit[1796]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.569000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc152a70b0 a2=0 a3=7ffc152a709c items=0 ppid=1655 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.569000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:42:35.572000 audit[1797]: NETFILTER_CFG table=nat:60 family=10 entries=1 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.572000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd80bc490 a2=0 a3=7ffcd80bc47c items=0 ppid=1655 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.572000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Mar 17 18:42:35.579000 audit[1799]: NETFILTER_CFG table=nat:61 family=10 entries=2 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.579000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff1f065cc0 a2=0 a3=7fff1f065cac items=0 ppid=1655 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.579000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Mar 17 18:42:35.582000 audit[1800]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.582000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1f3c5f90 a2=0 a3=7ffd1f3c5f7c items=0 ppid=1655 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.582000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Mar 17 18:42:35.587000 audit[1802]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_rule pid=1802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.587000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffc543b540 a2=0 a3=7fffc543b52c items=0 ppid=1655 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.587000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:42:35.594000 audit[1805]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=1805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:42:35.594000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd3deea3f0 a2=0 a3=7ffd3deea3dc items=0 ppid=1655 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.594000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:42:35.600000 audit[1807]: NETFILTER_CFG table=filter:65 family=10 entries=3 op=nft_register_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Mar 17 18:42:35.600000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffcd89b00f0 a2=0 a3=7ffcd89b00dc items=0 ppid=1655 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.600000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:42:35.602000 audit[1807]: NETFILTER_CFG table=nat:66 family=10 entries=7 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Mar 17 18:42:35.602000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffcd89b00f0 a2=0 a3=7ffcd89b00dc items=0 ppid=1655 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:35.602000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:42:35.869955 kubelet[1437]: E0317 18:42:35.869862 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:36.180836 kubelet[1437]: E0317 18:42:36.180660 1437 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Mar 17 18:42:36.870427 kubelet[1437]: E0317 18:42:36.870357 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:37.113094 kubelet[1437]: E0317 18:42:37.113027 1437 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m4g44" podUID="60254480-f0fc-46e2-9905-22c26f6d2e77" Mar 17 18:42:37.870566 kubelet[1437]: E0317 18:42:37.870476 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:38.871341 kubelet[1437]: E0317 18:42:38.871282 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:39.114180 kubelet[1437]: E0317 18:42:39.114116 1437 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m4g44" podUID="60254480-f0fc-46e2-9905-22c26f6d2e77" Mar 17 18:42:39.872958 kubelet[1437]: E0317 18:42:39.872874 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:40.873774 kubelet[1437]: E0317 18:42:40.873707 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:41.113311 kubelet[1437]: E0317 18:42:41.113241 1437 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m4g44" podUID="60254480-f0fc-46e2-9905-22c26f6d2e77" Mar 17 18:42:41.180891 env[1187]: time="2025-03-17T18:42:41.180680816Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:41.184729 env[1187]: time="2025-03-17T18:42:41.184524102Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:41.188223 env[1187]: time="2025-03-17T18:42:41.188167795Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:41.192506 env[1187]: time="2025-03-17T18:42:41.192414618Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Mar 17 18:42:41.193664 env[1187]: time="2025-03-17T18:42:41.191224498Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:41.197931 env[1187]: time="2025-03-17T18:42:41.197848366Z" level=info msg="CreateContainer within sandbox \"b81bbd0c77539ecb7a4c70194f55972fcdf37b35affba6c113003a7e6f6c9528\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Mar 17 18:42:41.222323 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1641396231.mount: Deactivated successfully. Mar 17 18:42:41.227367 env[1187]: time="2025-03-17T18:42:41.227247160Z" level=info msg="CreateContainer within sandbox \"b81bbd0c77539ecb7a4c70194f55972fcdf37b35affba6c113003a7e6f6c9528\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"9ac9834182c218d3cc46087cf25bac393dd5f2d7ac2f1ce54614b306316f63a2\"" Mar 17 18:42:41.228992 env[1187]: time="2025-03-17T18:42:41.228936163Z" level=info msg="StartContainer for \"9ac9834182c218d3cc46087cf25bac393dd5f2d7ac2f1ce54614b306316f63a2\"" Mar 17 18:42:41.277533 systemd[1]: Started cri-containerd-9ac9834182c218d3cc46087cf25bac393dd5f2d7ac2f1ce54614b306316f63a2.scope. Mar 17 18:42:41.331241 kernel: kauditd_printk_skb: 149 callbacks suppressed Mar 17 18:42:41.331462 kernel: audit: type=1400 audit(1742236961.322:541): avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.322000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.322000 audit[1816]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f37623c9c28 items=0 ppid=1495 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:41.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961633938333431383263323138643363633436303837636632356261 Mar 17 18:42:41.347102 kernel: audit: type=1300 audit(1742236961.322:541): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f37623c9c28 items=0 ppid=1495 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:41.347275 kernel: audit: type=1327 audit(1742236961.322:541): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961633938333431383263323138643363633436303837636632356261 Mar 17 18:42:41.325000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.325000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.358976 kernel: audit: type=1400 audit(1742236961.325:542): avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.359199 kernel: audit: type=1400 audit(1742236961.325:542): avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.325000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.325000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.372286 kernel: audit: type=1400 audit(1742236961.325:542): avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.372471 kernel: audit: type=1400 audit(1742236961.325:542): avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.325000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.378035 kernel: audit: type=1400 audit(1742236961.325:542): avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.383845 kernel: audit: type=1400 audit(1742236961.325:542): avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.325000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.325000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.390170 kernel: audit: type=1400 audit(1742236961.325:542): avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.325000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.325000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.325000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.325000 audit: BPF prog-id=72 op=LOAD Mar 17 18:42:41.325000 audit[1816]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001bf958 items=0 ppid=1495 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:41.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961633938333431383263323138643363633436303837636632356261 Mar 17 18:42:41.330000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.330000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.330000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.330000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.330000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.330000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.330000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.330000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.330000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.330000 audit: BPF prog-id=73 op=LOAD Mar 17 18:42:41.330000 audit[1816]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001bf9a8 items=0 ppid=1495 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:41.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961633938333431383263323138643363633436303837636632356261 Mar 17 18:42:41.330000 audit: BPF prog-id=73 op=UNLOAD Mar 17 18:42:41.330000 audit: BPF prog-id=72 op=UNLOAD Mar 17 18:42:41.330000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.330000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.330000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.330000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.330000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.330000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.330000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.330000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.330000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.330000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:41.330000 audit: BPF prog-id=74 op=LOAD Mar 17 18:42:41.330000 audit[1816]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001bfa38 items=0 ppid=1495 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:41.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961633938333431383263323138643363633436303837636632356261 Mar 17 18:42:41.397544 env[1187]: time="2025-03-17T18:42:41.397481348Z" level=info msg="StartContainer for \"9ac9834182c218d3cc46087cf25bac393dd5f2d7ac2f1ce54614b306316f63a2\" returns successfully" Mar 17 18:42:41.874840 kubelet[1437]: E0317 18:42:41.874769 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:42.191559 env[1187]: time="2025-03-17T18:42:42.191411808Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Mar 17 18:42:42.195958 kubelet[1437]: E0317 18:42:42.195914 1437 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Mar 17 18:42:42.197836 systemd[1]: cri-containerd-9ac9834182c218d3cc46087cf25bac393dd5f2d7ac2f1ce54614b306316f63a2.scope: Deactivated successfully. Mar 17 18:42:42.205000 audit: BPF prog-id=74 op=UNLOAD Mar 17 18:42:42.214944 systemd[1]: run-containerd-runc-k8s.io-9ac9834182c218d3cc46087cf25bac393dd5f2d7ac2f1ce54614b306316f63a2-runc.lXDVgW.mount: Deactivated successfully. Mar 17 18:42:42.220840 kubelet[1437]: I0317 18:42:42.220807 1437 kubelet_node_status.go:502] "Fast updating node status as it just became ready" Mar 17 18:42:42.246654 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9ac9834182c218d3cc46087cf25bac393dd5f2d7ac2f1ce54614b306316f63a2-rootfs.mount: Deactivated successfully. Mar 17 18:42:42.301782 env[1187]: time="2025-03-17T18:42:42.301661002Z" level=info msg="shim disconnected" id=9ac9834182c218d3cc46087cf25bac393dd5f2d7ac2f1ce54614b306316f63a2 Mar 17 18:42:42.301782 env[1187]: time="2025-03-17T18:42:42.301777815Z" level=warning msg="cleaning up after shim disconnected" id=9ac9834182c218d3cc46087cf25bac393dd5f2d7ac2f1ce54614b306316f63a2 namespace=k8s.io Mar 17 18:42:42.301782 env[1187]: time="2025-03-17T18:42:42.301796178Z" level=info msg="cleaning up dead shim" Mar 17 18:42:42.315677 env[1187]: time="2025-03-17T18:42:42.315602465Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:42:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1856 runtime=io.containerd.runc.v2\n" Mar 17 18:42:42.875975 kubelet[1437]: E0317 18:42:42.875902 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:43.119079 systemd[1]: Created slice kubepods-besteffort-pod60254480_f0fc_46e2_9905_22c26f6d2e77.slice. Mar 17 18:42:43.122897 env[1187]: time="2025-03-17T18:42:43.122668012Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m4g44,Uid:60254480-f0fc-46e2-9905-22c26f6d2e77,Namespace:calico-system,Attempt:0,}" Mar 17 18:42:43.201322 kubelet[1437]: E0317 18:42:43.201173 1437 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Mar 17 18:42:43.204449 env[1187]: time="2025-03-17T18:42:43.204385147Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Mar 17 18:42:43.242273 env[1187]: time="2025-03-17T18:42:43.242108496Z" level=error msg="Failed to destroy network for sandbox \"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:42:43.246970 env[1187]: time="2025-03-17T18:42:43.245820935Z" level=error msg="encountered an error cleaning up failed sandbox \"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:42:43.246970 env[1187]: time="2025-03-17T18:42:43.245935140Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m4g44,Uid:60254480-f0fc-46e2-9905-22c26f6d2e77,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:42:43.247124 kubelet[1437]: E0317 18:42:43.246218 1437 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:42:43.247124 kubelet[1437]: E0317 18:42:43.246294 1437 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-m4g44" Mar 17 18:42:43.247124 kubelet[1437]: E0317 18:42:43.246326 1437 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-m4g44" Mar 17 18:42:43.245114 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f-shm.mount: Deactivated successfully. Mar 17 18:42:43.247409 kubelet[1437]: E0317 18:42:43.246391 1437 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-m4g44_calico-system(60254480-f0fc-46e2-9905-22c26f6d2e77)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-m4g44_calico-system(60254480-f0fc-46e2-9905-22c26f6d2e77)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-m4g44" podUID="60254480-f0fc-46e2-9905-22c26f6d2e77" Mar 17 18:42:43.877173 kubelet[1437]: E0317 18:42:43.877079 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:44.205017 kubelet[1437]: I0317 18:42:44.204522 1437 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Mar 17 18:42:44.205748 env[1187]: time="2025-03-17T18:42:44.205675134Z" level=info msg="StopPodSandbox for \"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\"" Mar 17 18:42:44.249148 env[1187]: time="2025-03-17T18:42:44.249029216Z" level=error msg="StopPodSandbox for \"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\" failed" error="failed to destroy network for sandbox \"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:42:44.249617 kubelet[1437]: E0317 18:42:44.249557 1437 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Mar 17 18:42:44.249825 kubelet[1437]: E0317 18:42:44.249638 1437 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f"} Mar 17 18:42:44.249825 kubelet[1437]: E0317 18:42:44.249720 1437 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"60254480-f0fc-46e2-9905-22c26f6d2e77\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:42:44.249825 kubelet[1437]: E0317 18:42:44.249753 1437 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"60254480-f0fc-46e2-9905-22c26f6d2e77\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-m4g44" podUID="60254480-f0fc-46e2-9905-22c26f6d2e77" Mar 17 18:42:44.878053 kubelet[1437]: E0317 18:42:44.877943 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:44.976646 systemd[1]: Created slice kubepods-besteffort-pod5ebca062_0eb4_41ce_93c6_2c383bd66f54.slice. Mar 17 18:42:45.052160 kubelet[1437]: I0317 18:42:45.051999 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f9qtw\" (UniqueName: \"kubernetes.io/projected/5ebca062-0eb4-41ce-93c6-2c383bd66f54-kube-api-access-f9qtw\") pod \"nginx-deployment-7fcdb87857-gn8ff\" (UID: \"5ebca062-0eb4-41ce-93c6-2c383bd66f54\") " pod="default/nginx-deployment-7fcdb87857-gn8ff" Mar 17 18:42:45.282935 env[1187]: time="2025-03-17T18:42:45.282860391Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-gn8ff,Uid:5ebca062-0eb4-41ce-93c6-2c383bd66f54,Namespace:default,Attempt:0,}" Mar 17 18:42:45.489634 env[1187]: time="2025-03-17T18:42:45.489547090Z" level=error msg="Failed to destroy network for sandbox \"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:42:45.493005 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51-shm.mount: Deactivated successfully. Mar 17 18:42:45.493744 env[1187]: time="2025-03-17T18:42:45.493617451Z" level=error msg="encountered an error cleaning up failed sandbox \"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:42:45.494004 env[1187]: time="2025-03-17T18:42:45.493953603Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-gn8ff,Uid:5ebca062-0eb4-41ce-93c6-2c383bd66f54,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:42:45.495011 kubelet[1437]: E0317 18:42:45.494944 1437 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:42:45.495167 kubelet[1437]: E0317 18:42:45.495035 1437 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-gn8ff" Mar 17 18:42:45.495167 kubelet[1437]: E0317 18:42:45.495073 1437 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-gn8ff" Mar 17 18:42:45.495167 kubelet[1437]: E0317 18:42:45.495136 1437 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-gn8ff_default(5ebca062-0eb4-41ce-93c6-2c383bd66f54)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-gn8ff_default(5ebca062-0eb4-41ce-93c6-2c383bd66f54)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-gn8ff" podUID="5ebca062-0eb4-41ce-93c6-2c383bd66f54" Mar 17 18:42:45.878789 kubelet[1437]: E0317 18:42:45.878713 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:46.210923 kubelet[1437]: I0317 18:42:46.209741 1437 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Mar 17 18:42:46.211093 env[1187]: time="2025-03-17T18:42:46.210713965Z" level=info msg="StopPodSandbox for \"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\"" Mar 17 18:42:46.271526 env[1187]: time="2025-03-17T18:42:46.271420132Z" level=error msg="StopPodSandbox for \"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\" failed" error="failed to destroy network for sandbox \"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:42:46.272412 kubelet[1437]: E0317 18:42:46.272151 1437 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Mar 17 18:42:46.272412 kubelet[1437]: E0317 18:42:46.272230 1437 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51"} Mar 17 18:42:46.272412 kubelet[1437]: E0317 18:42:46.272298 1437 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5ebca062-0eb4-41ce-93c6-2c383bd66f54\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:42:46.272412 kubelet[1437]: E0317 18:42:46.272360 1437 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5ebca062-0eb4-41ce-93c6-2c383bd66f54\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-gn8ff" podUID="5ebca062-0eb4-41ce-93c6-2c383bd66f54" Mar 17 18:42:46.857089 kubelet[1437]: E0317 18:42:46.857008 1437 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:46.879198 kubelet[1437]: E0317 18:42:46.879097 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:47.880040 kubelet[1437]: E0317 18:42:47.879921 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:48.880557 kubelet[1437]: E0317 18:42:48.880462 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:49.881347 kubelet[1437]: E0317 18:42:49.881243 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:50.882327 kubelet[1437]: E0317 18:42:50.882231 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:51.883030 kubelet[1437]: E0317 18:42:51.882909 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:52.537086 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3926021024.mount: Deactivated successfully. Mar 17 18:42:52.599857 env[1187]: time="2025-03-17T18:42:52.599634037Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:52.604716 env[1187]: time="2025-03-17T18:42:52.604618148Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:52.608288 env[1187]: time="2025-03-17T18:42:52.608185444Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:52.611062 env[1187]: time="2025-03-17T18:42:52.610993097Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:42:52.612237 env[1187]: time="2025-03-17T18:42:52.612179849Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Mar 17 18:42:52.643901 env[1187]: time="2025-03-17T18:42:52.643711737Z" level=info msg="CreateContainer within sandbox \"b81bbd0c77539ecb7a4c70194f55972fcdf37b35affba6c113003a7e6f6c9528\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Mar 17 18:42:52.669631 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1843967037.mount: Deactivated successfully. Mar 17 18:42:52.676727 env[1187]: time="2025-03-17T18:42:52.676566009Z" level=info msg="CreateContainer within sandbox \"b81bbd0c77539ecb7a4c70194f55972fcdf37b35affba6c113003a7e6f6c9528\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"86c9bfa563831831b8820d950a0e1f4cebcc0237a661a0562c3e511b348cc508\"" Mar 17 18:42:52.678006 env[1187]: time="2025-03-17T18:42:52.677942468Z" level=info msg="StartContainer for \"86c9bfa563831831b8820d950a0e1f4cebcc0237a661a0562c3e511b348cc508\"" Mar 17 18:42:52.708567 systemd[1]: Started cri-containerd-86c9bfa563831831b8820d950a0e1f4cebcc0237a661a0562c3e511b348cc508.scope. Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.746383 kernel: kauditd_printk_skb: 34 callbacks suppressed Mar 17 18:42:52.746643 kernel: audit: type=1400 audit(1742236972.743:548): avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3490058018 items=0 ppid=1495 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:52.759876 kernel: audit: type=1300 audit(1742236972.743:548): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3490058018 items=0 ppid=1495 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:52.760091 kernel: audit: type=1327 audit(1742236972.743:548): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836633962666135363338333138333162383832306439353061306531 Mar 17 18:42:52.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836633962666135363338333138333162383832306439353061306531 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.778130 kernel: audit: type=1400 audit(1742236972.743:549): avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.778343 kernel: audit: type=1400 audit(1742236972.743:549): avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.778413 kernel: audit: type=1400 audit(1742236972.743:549): avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.795922 kernel: audit: type=1400 audit(1742236972.743:549): avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.807975 kernel: audit: type=1400 audit(1742236972.743:549): avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.808247 kernel: audit: type=1400 audit(1742236972.743:549): avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.808362 kernel: audit: type=1400 audit(1742236972.743:549): avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit: BPF prog-id=75 op=LOAD Mar 17 18:42:52.743000 audit[1982]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001fbaf8 items=0 ppid=1495 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:52.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836633962666135363338333138333162383832306439353061306531 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit: BPF prog-id=76 op=LOAD Mar 17 18:42:52.743000 audit[1982]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001fbb48 items=0 ppid=1495 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:52.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836633962666135363338333138333162383832306439353061306531 Mar 17 18:42:52.743000 audit: BPF prog-id=76 op=UNLOAD Mar 17 18:42:52.743000 audit: BPF prog-id=75 op=UNLOAD Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { perfmon } for pid=1982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit[1982]: AVC avc: denied { bpf } for pid=1982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:52.743000 audit: BPF prog-id=77 op=LOAD Mar 17 18:42:52.743000 audit[1982]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001fbbd8 items=0 ppid=1495 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:52.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836633962666135363338333138333162383832306439353061306531 Mar 17 18:42:52.821360 env[1187]: time="2025-03-17T18:42:52.821281683Z" level=info msg="StartContainer for \"86c9bfa563831831b8820d950a0e1f4cebcc0237a661a0562c3e511b348cc508\" returns successfully" Mar 17 18:42:52.884750 kubelet[1437]: E0317 18:42:52.884646 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:52.960356 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Mar 17 18:42:52.960813 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Mar 17 18:42:53.248671 kubelet[1437]: E0317 18:42:53.248516 1437 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Mar 17 18:42:53.475669 systemd[1]: Started sshd@7-64.23.131.98:22-218.92.0.133:20554.service. Mar 17 18:42:53.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-64.23.131.98:22-218.92.0.133:20554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:42:53.884921 kubelet[1437]: E0317 18:42:53.884816 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:54.250226 kubelet[1437]: I0317 18:42:54.250070 1437 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 18:42:54.251380 kubelet[1437]: E0317 18:42:54.251337 1437 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Mar 17 18:42:54.432615 systemd[1]: run-containerd-runc-k8s.io-86c9bfa563831831b8820d950a0e1f4cebcc0237a661a0562c3e511b348cc508-runc.2wGsS3.mount: Deactivated successfully. Mar 17 18:42:54.555288 systemd[1]: run-containerd-runc-k8s.io-86c9bfa563831831b8820d950a0e1f4cebcc0237a661a0562c3e511b348cc508-runc.SK3Bay.mount: Deactivated successfully. Mar 17 18:42:54.639000 audit[2136]: AVC avc: denied { write } for pid=2136 comm="tee" name="fd" dev="proc" ino=19360 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:42:54.648000 audit[2119]: AVC avc: denied { write } for pid=2119 comm="tee" name="fd" dev="proc" ino=19938 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:42:54.648000 audit[2119]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff3f1e9a1a a2=241 a3=1b6 items=1 ppid=2077 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:54.648000 audit: CWD cwd="/etc/service/enabled/bird/log" Mar 17 18:42:54.648000 audit: PATH item=0 name="/dev/fd/63" inode=19921 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:54.648000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:42:54.639000 audit[2136]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff0c471a0a a2=241 a3=1b6 items=1 ppid=2088 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:54.639000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Mar 17 18:42:54.639000 audit: PATH item=0 name="/dev/fd/63" inode=19356 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:54.639000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:42:54.657000 audit[2122]: AVC avc: denied { write } for pid=2122 comm="tee" name="fd" dev="proc" ino=19941 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:42:54.657000 audit[2122]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe8a463a19 a2=241 a3=1b6 items=1 ppid=2074 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:54.657000 audit[2130]: AVC avc: denied { write } for pid=2130 comm="tee" name="fd" dev="proc" ino=19945 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:42:54.657000 audit[2130]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd27783a19 a2=241 a3=1b6 items=1 ppid=2082 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:54.657000 audit: CWD cwd="/etc/service/enabled/felix/log" Mar 17 18:42:54.657000 audit: PATH item=0 name="/dev/fd/63" inode=19924 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:54.657000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:42:54.657000 audit: CWD cwd="/etc/service/enabled/confd/log" Mar 17 18:42:54.657000 audit: PATH item=0 name="/dev/fd/63" inode=19353 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:54.657000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:42:54.668000 audit[2153]: AVC avc: denied { write } for pid=2153 comm="tee" name="fd" dev="proc" ino=19950 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:42:54.668000 audit[2153]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe1fc2ea09 a2=241 a3=1b6 items=1 ppid=2092 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:54.668000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Mar 17 18:42:54.668000 audit: PATH item=0 name="/dev/fd/63" inode=19934 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:54.670000 audit[2140]: AVC avc: denied { write } for pid=2140 comm="tee" name="fd" dev="proc" ino=19953 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:42:54.670000 audit[2140]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcdb4b2a1b a2=241 a3=1b6 items=1 ppid=2080 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:54.670000 audit: CWD cwd="/etc/service/enabled/cni/log" Mar 17 18:42:54.670000 audit: PATH item=0 name="/dev/fd/63" inode=19357 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:54.671000 audit[2150]: AVC avc: denied { write } for pid=2150 comm="tee" name="fd" dev="proc" ino=19957 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:42:54.671000 audit[2150]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb44b3a19 a2=241 a3=1b6 items=1 ppid=2091 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:54.671000 audit: CWD cwd="/etc/service/enabled/bird6/log" Mar 17 18:42:54.671000 audit: PATH item=0 name="/dev/fd/63" inode=19933 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:42:54.670000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:42:54.671000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:42:54.668000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:42:54.886218 kubelet[1437]: E0317 18:42:54.886007 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:55.013000 audit[2029]: USER_AUTH pid=2029 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.133 addr=218.92.0.133 terminal=ssh res=failed' Mar 17 18:42:55.013631 sshd[2029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133 user=root Mar 17 18:42:55.056000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.056000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.056000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.056000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.056000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.056000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.056000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.056000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.056000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.056000 audit: BPF prog-id=78 op=LOAD Mar 17 18:42:55.056000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc3f028e00 a2=98 a3=3 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.056000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.057000 audit: BPF prog-id=78 op=UNLOAD Mar 17 18:42:55.058000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.058000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.058000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.058000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.058000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.058000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.058000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.058000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.058000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.058000 audit: BPF prog-id=79 op=LOAD Mar 17 18:42:55.058000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc3f028be0 a2=74 a3=540051 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.059000 audit: BPF prog-id=79 op=UNLOAD Mar 17 18:42:55.059000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.059000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.059000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.059000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.059000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.059000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.059000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.059000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.059000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.059000 audit: BPF prog-id=80 op=LOAD Mar 17 18:42:55.059000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc3f028c10 a2=94 a3=2 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.059000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.060000 audit: BPF prog-id=80 op=UNLOAD Mar 17 18:42:55.248000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.248000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.248000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.248000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.248000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.248000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.248000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.248000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.248000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.248000 audit: BPF prog-id=81 op=LOAD Mar 17 18:42:55.248000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc3f028ad0 a2=40 a3=1 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.248000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.248000 audit: BPF prog-id=81 op=UNLOAD Mar 17 18:42:55.248000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.248000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc3f028ba0 a2=50 a3=7ffc3f028c80 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.248000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.255575 kubelet[1437]: E0317 18:42:55.254977 1437 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Mar 17 18:42:55.269000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.269000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3f028ae0 a2=28 a3=0 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.269000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.269000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.269000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3f028b10 a2=28 a3=0 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.269000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.269000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.269000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3f028a20 a2=28 a3=0 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.269000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.269000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.269000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3f028b30 a2=28 a3=0 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.269000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3f028b10 a2=28 a3=0 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3f028b00 a2=28 a3=0 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3f028b30 a2=28 a3=0 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3f028b10 a2=28 a3=0 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3f028b30 a2=28 a3=0 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3f028b00 a2=28 a3=0 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3f028b70 a2=28 a3=0 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc3f028920 a2=50 a3=1 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit: BPF prog-id=82 op=LOAD Mar 17 18:42:55.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc3f028920 a2=94 a3=5 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.270000 audit: BPF prog-id=82 op=UNLOAD Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc3f0289d0 a2=50 a3=1 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc3f028af0 a2=4 a3=38 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.270000 audit[2200]: AVC avc: denied { confidentiality } for pid=2200 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:42:55.270000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc3f028b40 a2=94 a3=6 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.270000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { confidentiality } for pid=2200 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:42:55.271000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc3f0282f0 a2=94 a3=83 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.271000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { perfmon } for pid=2200 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { bpf } for pid=2200 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.271000 audit[2200]: AVC avc: denied { confidentiality } for pid=2200 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:42:55.271000 audit[2200]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc3f0282f0 a2=94 a3=83 items=0 ppid=2075 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.271000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:42:55.292203 systemd[1]: run-containerd-runc-k8s.io-86c9bfa563831831b8820d950a0e1f4cebcc0237a661a0562c3e511b348cc508-runc.9bMlvN.mount: Deactivated successfully. Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit: BPF prog-id=83 op=LOAD Mar 17 18:42:55.300000 audit[2212]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcfab11c60 a2=98 a3=1999999999999999 items=0 ppid=2075 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.300000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:42:55.300000 audit: BPF prog-id=83 op=UNLOAD Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit: BPF prog-id=84 op=LOAD Mar 17 18:42:55.300000 audit[2212]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcfab11b40 a2=74 a3=ffff items=0 ppid=2075 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.300000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:42:55.300000 audit: BPF prog-id=84 op=UNLOAD Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.300000 audit: BPF prog-id=85 op=LOAD Mar 17 18:42:55.300000 audit[2212]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcfab11b80 a2=40 a3=7ffcfab11d60 items=0 ppid=2075 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.300000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:42:55.301000 audit: BPF prog-id=85 op=UNLOAD Mar 17 18:42:55.466680 systemd-networkd[1002]: vxlan.calico: Link UP Mar 17 18:42:55.467416 systemd-networkd[1002]: vxlan.calico: Gained carrier Mar 17 18:42:55.505000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.505000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.505000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.505000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.505000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.505000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.505000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.505000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.505000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.505000 audit: BPF prog-id=86 op=LOAD Mar 17 18:42:55.505000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff08d0b200 a2=98 a3=ffffffff items=0 ppid=2075 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.505000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:42:55.506000 audit: BPF prog-id=86 op=UNLOAD Mar 17 18:42:55.506000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.506000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.506000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.506000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.506000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.506000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.506000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.506000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.506000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.506000 audit: BPF prog-id=87 op=LOAD Mar 17 18:42:55.506000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff08d0b010 a2=74 a3=540051 items=0 ppid=2075 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.506000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:42:55.507000 audit: BPF prog-id=87 op=UNLOAD Mar 17 18:42:55.507000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.507000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.507000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.507000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.507000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.507000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.507000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.507000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.507000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.507000 audit: BPF prog-id=88 op=LOAD Mar 17 18:42:55.507000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff08d0b040 a2=94 a3=2 items=0 ppid=2075 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:42:55.507000 audit: BPF prog-id=88 op=UNLOAD Mar 17 18:42:55.507000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.507000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff08d0af10 a2=28 a3=0 items=0 ppid=2075 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:42:55.507000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.507000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff08d0af40 a2=28 a3=0 items=0 ppid=2075 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:42:55.507000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.507000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff08d0ae50 a2=28 a3=0 items=0 ppid=2075 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:42:55.507000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.507000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff08d0af60 a2=28 a3=0 items=0 ppid=2075 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:42:55.507000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.507000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff08d0af40 a2=28 a3=0 items=0 ppid=2075 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:42:55.507000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.507000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff08d0af30 a2=28 a3=0 items=0 ppid=2075 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:42:55.512000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.512000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff08d0af60 a2=28 a3=0 items=0 ppid=2075 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.512000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:42:55.512000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.512000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff08d0af40 a2=28 a3=0 items=0 ppid=2075 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.512000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:42:55.512000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.512000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff08d0af60 a2=28 a3=0 items=0 ppid=2075 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.512000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:42:55.512000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.512000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff08d0af30 a2=28 a3=0 items=0 ppid=2075 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.512000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:42:55.512000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.512000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff08d0afa0 a2=28 a3=0 items=0 ppid=2075 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.512000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:42:55.512000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.512000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.512000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.512000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.512000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.512000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.512000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.512000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.512000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.512000 audit: BPF prog-id=89 op=LOAD Mar 17 18:42:55.512000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff08d0ae10 a2=40 a3=0 items=0 ppid=2075 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.512000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:42:55.512000 audit: BPF prog-id=89 op=UNLOAD Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff08d0ae00 a2=50 a3=2800 items=0 ppid=2075 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.515000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff08d0ae00 a2=50 a3=2800 items=0 ppid=2075 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.515000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit: BPF prog-id=90 op=LOAD Mar 17 18:42:55.515000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff08d0a620 a2=94 a3=2 items=0 ppid=2075 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.515000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:42:55.515000 audit: BPF prog-id=90 op=UNLOAD Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.515000 audit: BPF prog-id=91 op=LOAD Mar 17 18:42:55.515000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff08d0a720 a2=94 a3=2d items=0 ppid=2075 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.515000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:42:55.523000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.523000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.523000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.523000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.523000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.523000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.523000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.523000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.523000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.523000 audit: BPF prog-id=92 op=LOAD Mar 17 18:42:55.523000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe61244d40 a2=98 a3=0 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.523000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.523000 audit: BPF prog-id=92 op=UNLOAD Mar 17 18:42:55.524000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.524000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.524000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.524000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.524000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.524000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.524000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.524000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.524000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.524000 audit: BPF prog-id=93 op=LOAD Mar 17 18:42:55.524000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe61244b20 a2=74 a3=540051 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.524000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.524000 audit: BPF prog-id=93 op=UNLOAD Mar 17 18:42:55.524000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.524000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.524000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.524000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.524000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.524000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.524000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.524000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.524000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.524000 audit: BPF prog-id=94 op=LOAD Mar 17 18:42:55.524000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe61244b50 a2=94 a3=2 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.524000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.524000 audit: BPF prog-id=94 op=UNLOAD Mar 17 18:42:55.713000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.713000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.713000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.713000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.713000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.713000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.713000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.713000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.713000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.713000 audit: BPF prog-id=95 op=LOAD Mar 17 18:42:55.713000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe61244a10 a2=40 a3=1 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.713000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.713000 audit: BPF prog-id=95 op=UNLOAD Mar 17 18:42:55.713000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.713000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe61244ae0 a2=50 a3=7ffe61244bc0 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.713000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.730000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.730000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe61244a20 a2=28 a3=0 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.730000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.730000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.730000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe61244a50 a2=28 a3=0 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.730000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.730000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.730000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe61244960 a2=28 a3=0 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.730000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.730000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.730000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe61244a70 a2=28 a3=0 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.730000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.730000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.730000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe61244a50 a2=28 a3=0 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.730000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.730000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.730000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe61244a40 a2=28 a3=0 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.730000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.730000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.730000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe61244a70 a2=28 a3=0 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.730000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.730000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.730000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe61244a50 a2=28 a3=0 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.730000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.730000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.730000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe61244a70 a2=28 a3=0 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.730000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.730000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.730000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe61244a40 a2=28 a3=0 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.730000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.730000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.730000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe61244ab0 a2=28 a3=0 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.730000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.731000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.731000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe61244860 a2=50 a3=1 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.731000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.731000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.731000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.731000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.731000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.731000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.731000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.731000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.731000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.731000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.731000 audit: BPF prog-id=96 op=LOAD Mar 17 18:42:55.731000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe61244860 a2=94 a3=5 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.731000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.731000 audit: BPF prog-id=96 op=UNLOAD Mar 17 18:42:55.731000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.731000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe61244910 a2=50 a3=1 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.731000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.731000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.731000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe61244a30 a2=4 a3=38 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.731000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.731000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.731000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.731000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.731000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe61244a80 a2=94 a3=6 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.731000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { confidentiality } for pid=2255 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:42:55.732000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe61244230 a2=94 a3=83 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.732000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.732000 audit[2255]: AVC avc: denied { confidentiality } for pid=2255 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:42:55.732000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe61244230 a2=94 a3=83 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.732000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.733000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.733000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe61245c70 a2=10 a3=f1f00800 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.733000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.733000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.733000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe61245b10 a2=10 a3=3 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.733000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.733000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.733000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe61245ab0 a2=10 a3=3 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.733000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.733000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:55.733000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe61245ab0 a2=10 a3=7 items=0 ppid=2075 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.733000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:42:55.742000 audit: BPF prog-id=91 op=UNLOAD Mar 17 18:42:55.850000 audit[2282]: NETFILTER_CFG table=mangle:67 family=2 entries=16 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:42:55.850000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe09270b80 a2=0 a3=7ffe09270b6c items=0 ppid=2075 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.850000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:42:55.867000 audit[2281]: NETFILTER_CFG table=nat:68 family=2 entries=15 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:42:55.867000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffeb6ccffc0 a2=0 a3=7ffeb6ccffac items=0 ppid=2075 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.867000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:42:55.869000 audit[2283]: NETFILTER_CFG table=filter:69 family=2 entries=39 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:42:55.869000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc14724600 a2=0 a3=7ffc147245ec items=0 ppid=2075 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.869000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:42:55.877000 audit[2280]: NETFILTER_CFG table=raw:70 family=2 entries=21 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:42:55.877000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffda076fcd0 a2=0 a3=7ffda076fcbc items=0 ppid=2075 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:55.877000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:42:55.887074 kubelet[1437]: E0317 18:42:55.886581 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:56.112876 env[1187]: time="2025-03-17T18:42:56.112576891Z" level=info msg="StopPodSandbox for \"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\"" Mar 17 18:42:56.239458 kubelet[1437]: I0317 18:42:56.239076 1437 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-p86qz" podStartSLOduration=6.822801438 podStartE2EDuration="29.239053207s" podCreationTimestamp="2025-03-17 18:42:27 +0000 UTC" firstStartedPulling="2025-03-17 18:42:30.197989599 +0000 UTC m=+4.023598517" lastFinishedPulling="2025-03-17 18:42:52.614241368 +0000 UTC m=+26.439850286" observedRunningTime="2025-03-17 18:42:53.283623123 +0000 UTC m=+27.109232058" watchObservedRunningTime="2025-03-17 18:42:56.239053207 +0000 UTC m=+30.064662145" Mar 17 18:42:56.356931 env[1187]: 2025-03-17 18:42:56.239 [INFO][2306] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Mar 17 18:42:56.356931 env[1187]: 2025-03-17 18:42:56.241 [INFO][2306] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" iface="eth0" netns="/var/run/netns/cni-27f19604-e59b-5d1a-a4bf-a175cee30954" Mar 17 18:42:56.356931 env[1187]: 2025-03-17 18:42:56.242 [INFO][2306] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" iface="eth0" netns="/var/run/netns/cni-27f19604-e59b-5d1a-a4bf-a175cee30954" Mar 17 18:42:56.356931 env[1187]: 2025-03-17 18:42:56.244 [INFO][2306] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" iface="eth0" netns="/var/run/netns/cni-27f19604-e59b-5d1a-a4bf-a175cee30954" Mar 17 18:42:56.356931 env[1187]: 2025-03-17 18:42:56.244 [INFO][2306] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Mar 17 18:42:56.356931 env[1187]: 2025-03-17 18:42:56.245 [INFO][2306] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Mar 17 18:42:56.356931 env[1187]: 2025-03-17 18:42:56.326 [INFO][2312] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" HandleID="k8s-pod-network.bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Workload="64.23.131.98-k8s-csi--node--driver--m4g44-eth0" Mar 17 18:42:56.356931 env[1187]: 2025-03-17 18:42:56.326 [INFO][2312] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:42:56.356931 env[1187]: 2025-03-17 18:42:56.326 [INFO][2312] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:42:56.356931 env[1187]: 2025-03-17 18:42:56.340 [WARNING][2312] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" HandleID="k8s-pod-network.bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Workload="64.23.131.98-k8s-csi--node--driver--m4g44-eth0" Mar 17 18:42:56.356931 env[1187]: 2025-03-17 18:42:56.340 [INFO][2312] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" HandleID="k8s-pod-network.bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Workload="64.23.131.98-k8s-csi--node--driver--m4g44-eth0" Mar 17 18:42:56.356931 env[1187]: 2025-03-17 18:42:56.348 [INFO][2312] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:42:56.356931 env[1187]: 2025-03-17 18:42:56.351 [INFO][2306] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Mar 17 18:42:56.361631 systemd[1]: run-netns-cni\x2d27f19604\x2de59b\x2d5d1a\x2da4bf\x2da175cee30954.mount: Deactivated successfully. Mar 17 18:42:56.362738 env[1187]: time="2025-03-17T18:42:56.362648552Z" level=info msg="TearDown network for sandbox \"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\" successfully" Mar 17 18:42:56.363835 env[1187]: time="2025-03-17T18:42:56.362983554Z" level=info msg="StopPodSandbox for \"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\" returns successfully" Mar 17 18:42:56.365500 env[1187]: time="2025-03-17T18:42:56.365439588Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m4g44,Uid:60254480-f0fc-46e2-9905-22c26f6d2e77,Namespace:calico-system,Attempt:1,}" Mar 17 18:42:56.711723 sshd[2029]: Failed password for root from 218.92.0.133 port 20554 ssh2 Mar 17 18:42:56.735652 systemd-networkd[1002]: cali071df183d50: Link UP Mar 17 18:42:56.741001 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:42:56.741207 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali071df183d50: link becomes ready Mar 17 18:42:56.741448 systemd-networkd[1002]: cali071df183d50: Gained carrier Mar 17 18:42:56.772437 env[1187]: 2025-03-17 18:42:56.470 [INFO][2318] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {64.23.131.98-k8s-csi--node--driver--m4g44-eth0 csi-node-driver- calico-system 60254480-f0fc-46e2-9905-22c26f6d2e77 1115 0 2025-03-17 18:42:27 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:84cddb44f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 64.23.131.98 csi-node-driver-m4g44 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali071df183d50 [] []}} ContainerID="355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe" Namespace="calico-system" Pod="csi-node-driver-m4g44" WorkloadEndpoint="64.23.131.98-k8s-csi--node--driver--m4g44-" Mar 17 18:42:56.772437 env[1187]: 2025-03-17 18:42:56.470 [INFO][2318] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe" Namespace="calico-system" Pod="csi-node-driver-m4g44" WorkloadEndpoint="64.23.131.98-k8s-csi--node--driver--m4g44-eth0" Mar 17 18:42:56.772437 env[1187]: 2025-03-17 18:42:56.537 [INFO][2329] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe" HandleID="k8s-pod-network.355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe" Workload="64.23.131.98-k8s-csi--node--driver--m4g44-eth0" Mar 17 18:42:56.772437 env[1187]: 2025-03-17 18:42:56.652 [INFO][2329] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe" HandleID="k8s-pod-network.355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe" Workload="64.23.131.98-k8s-csi--node--driver--m4g44-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dfb40), Attrs:map[string]string{"namespace":"calico-system", "node":"64.23.131.98", "pod":"csi-node-driver-m4g44", "timestamp":"2025-03-17 18:42:56.537146769 +0000 UTC"}, Hostname:"64.23.131.98", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:42:56.772437 env[1187]: 2025-03-17 18:42:56.652 [INFO][2329] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:42:56.772437 env[1187]: 2025-03-17 18:42:56.652 [INFO][2329] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:42:56.772437 env[1187]: 2025-03-17 18:42:56.652 [INFO][2329] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '64.23.131.98' Mar 17 18:42:56.772437 env[1187]: 2025-03-17 18:42:56.658 [INFO][2329] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe" host="64.23.131.98" Mar 17 18:42:56.772437 env[1187]: 2025-03-17 18:42:56.677 [INFO][2329] ipam/ipam.go 372: Looking up existing affinities for host host="64.23.131.98" Mar 17 18:42:56.772437 env[1187]: 2025-03-17 18:42:56.687 [INFO][2329] ipam/ipam.go 489: Trying affinity for 192.168.59.128/26 host="64.23.131.98" Mar 17 18:42:56.772437 env[1187]: 2025-03-17 18:42:56.692 [INFO][2329] ipam/ipam.go 155: Attempting to load block cidr=192.168.59.128/26 host="64.23.131.98" Mar 17 18:42:56.772437 env[1187]: 2025-03-17 18:42:56.699 [INFO][2329] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.59.128/26 host="64.23.131.98" Mar 17 18:42:56.772437 env[1187]: 2025-03-17 18:42:56.699 [INFO][2329] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.59.128/26 handle="k8s-pod-network.355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe" host="64.23.131.98" Mar 17 18:42:56.772437 env[1187]: 2025-03-17 18:42:56.704 [INFO][2329] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe Mar 17 18:42:56.772437 env[1187]: 2025-03-17 18:42:56.713 [INFO][2329] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.59.128/26 handle="k8s-pod-network.355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe" host="64.23.131.98" Mar 17 18:42:56.772437 env[1187]: 2025-03-17 18:42:56.724 [INFO][2329] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.59.129/26] block=192.168.59.128/26 handle="k8s-pod-network.355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe" host="64.23.131.98" Mar 17 18:42:56.772437 env[1187]: 2025-03-17 18:42:56.724 [INFO][2329] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.59.129/26] handle="k8s-pod-network.355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe" host="64.23.131.98" Mar 17 18:42:56.772437 env[1187]: 2025-03-17 18:42:56.724 [INFO][2329] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:42:56.772437 env[1187]: 2025-03-17 18:42:56.724 [INFO][2329] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.59.129/26] IPv6=[] ContainerID="355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe" HandleID="k8s-pod-network.355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe" Workload="64.23.131.98-k8s-csi--node--driver--m4g44-eth0" Mar 17 18:42:56.774093 env[1187]: 2025-03-17 18:42:56.727 [INFO][2318] cni-plugin/k8s.go 386: Populated endpoint ContainerID="355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe" Namespace="calico-system" Pod="csi-node-driver-m4g44" WorkloadEndpoint="64.23.131.98-k8s-csi--node--driver--m4g44-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.131.98-k8s-csi--node--driver--m4g44-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"60254480-f0fc-46e2-9905-22c26f6d2e77", ResourceVersion:"1115", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 42, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"84cddb44f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.131.98", ContainerID:"", Pod:"csi-node-driver-m4g44", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.59.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali071df183d50", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:42:56.774093 env[1187]: 2025-03-17 18:42:56.728 [INFO][2318] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.59.129/32] ContainerID="355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe" Namespace="calico-system" Pod="csi-node-driver-m4g44" WorkloadEndpoint="64.23.131.98-k8s-csi--node--driver--m4g44-eth0" Mar 17 18:42:56.774093 env[1187]: 2025-03-17 18:42:56.728 [INFO][2318] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali071df183d50 ContainerID="355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe" Namespace="calico-system" Pod="csi-node-driver-m4g44" WorkloadEndpoint="64.23.131.98-k8s-csi--node--driver--m4g44-eth0" Mar 17 18:42:56.774093 env[1187]: 2025-03-17 18:42:56.745 [INFO][2318] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe" Namespace="calico-system" Pod="csi-node-driver-m4g44" WorkloadEndpoint="64.23.131.98-k8s-csi--node--driver--m4g44-eth0" Mar 17 18:42:56.774093 env[1187]: 2025-03-17 18:42:56.746 [INFO][2318] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe" Namespace="calico-system" Pod="csi-node-driver-m4g44" WorkloadEndpoint="64.23.131.98-k8s-csi--node--driver--m4g44-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.131.98-k8s-csi--node--driver--m4g44-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"60254480-f0fc-46e2-9905-22c26f6d2e77", ResourceVersion:"1115", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 42, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"84cddb44f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.131.98", ContainerID:"355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe", Pod:"csi-node-driver-m4g44", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.59.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali071df183d50", MAC:"2a:f5:bc:8b:70:2c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:42:56.774093 env[1187]: 2025-03-17 18:42:56.764 [INFO][2318] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe" Namespace="calico-system" Pod="csi-node-driver-m4g44" WorkloadEndpoint="64.23.131.98-k8s-csi--node--driver--m4g44-eth0" Mar 17 18:42:56.790000 audit[2354]: NETFILTER_CFG table=filter:71 family=2 entries=34 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:42:56.790000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffecdf031e0 a2=0 a3=7ffecdf031cc items=0 ppid=2075 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:56.790000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:42:56.794616 env[1187]: time="2025-03-17T18:42:56.794242360Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:42:56.794616 env[1187]: time="2025-03-17T18:42:56.794344689Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:42:56.794616 env[1187]: time="2025-03-17T18:42:56.794364869Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:42:56.795234 env[1187]: time="2025-03-17T18:42:56.795174554Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe pid=2357 runtime=io.containerd.runc.v2 Mar 17 18:42:56.829549 systemd[1]: Started cri-containerd-355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe.scope. Mar 17 18:42:56.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.857000 audit: BPF prog-id=97 op=LOAD Mar 17 18:42:56.859000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.859000 audit[2367]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2357 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:56.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335356232353533356332346130656638623534376263656530316432 Mar 17 18:42:56.859000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.859000 audit[2367]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2357 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:56.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335356232353533356332346130656638623534376263656530316432 Mar 17 18:42:56.859000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.859000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.859000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.859000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.859000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.859000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.859000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.859000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.859000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.859000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.859000 audit: BPF prog-id=98 op=LOAD Mar 17 18:42:56.859000 audit[2367]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000282af0 items=0 ppid=2357 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:56.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335356232353533356332346130656638623534376263656530316432 Mar 17 18:42:56.859000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.859000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.859000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.859000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.859000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.859000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.859000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.859000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.859000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.859000 audit: BPF prog-id=99 op=LOAD Mar 17 18:42:56.859000 audit[2367]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000282b38 items=0 ppid=2357 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:56.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335356232353533356332346130656638623534376263656530316432 Mar 17 18:42:56.859000 audit: BPF prog-id=99 op=UNLOAD Mar 17 18:42:56.859000 audit: BPF prog-id=98 op=UNLOAD Mar 17 18:42:56.860000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.860000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.860000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.860000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.860000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.860000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.860000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.860000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.860000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.860000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:42:56.860000 audit: BPF prog-id=100 op=LOAD Mar 17 18:42:56.860000 audit[2367]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000282f48 items=0 ppid=2357 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:42:56.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335356232353533356332346130656638623534376263656530316432 Mar 17 18:42:56.884240 env[1187]: time="2025-03-17T18:42:56.884154756Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m4g44,Uid:60254480-f0fc-46e2-9905-22c26f6d2e77,Namespace:calico-system,Attempt:1,} returns sandbox id \"355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe\"" Mar 17 18:42:56.886933 kubelet[1437]: E0317 18:42:56.886898 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:56.887561 env[1187]: time="2025-03-17T18:42:56.887504546Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Mar 17 18:42:56.924004 systemd-networkd[1002]: vxlan.calico: Gained IPv6LL Mar 17 18:42:57.290000 audit[2029]: USER_AUTH pid=2029 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.133 addr=218.92.0.133 terminal=ssh res=failed' Mar 17 18:42:57.361907 systemd[1]: run-containerd-runc-k8s.io-355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe-runc.oRvA4W.mount: Deactivated successfully. Mar 17 18:42:57.887799 kubelet[1437]: E0317 18:42:57.887733 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:58.596800 sshd[2029]: Failed password for root from 218.92.0.133 port 20554 ssh2 Mar 17 18:42:58.651112 systemd-networkd[1002]: cali071df183d50: Gained IPv6LL Mar 17 18:42:58.888552 kubelet[1437]: E0317 18:42:58.888349 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:42:59.575000 audit[2029]: USER_AUTH pid=2029 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.133 addr=218.92.0.133 terminal=ssh res=failed' Mar 17 18:42:59.577816 kernel: kauditd_printk_skb: 627 callbacks suppressed Mar 17 18:42:59.577951 kernel: audit: type=1100 audit(1742236979.575:678): pid=2029 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.133 addr=218.92.0.133 terminal=ssh res=failed' Mar 17 18:42:59.601412 update_engine[1181]: I0317 18:42:59.601323 1181 update_attempter.cc:509] Updating boot flags... Mar 17 18:42:59.889398 kubelet[1437]: E0317 18:42:59.888792 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:00.112872 env[1187]: time="2025-03-17T18:43:00.112793576Z" level=info msg="StopPodSandbox for \"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\"" Mar 17 18:43:00.280286 env[1187]: 2025-03-17 18:43:00.198 [INFO][2421] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Mar 17 18:43:00.280286 env[1187]: 2025-03-17 18:43:00.199 [INFO][2421] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" iface="eth0" netns="/var/run/netns/cni-2a1f5150-4911-85cf-d50e-d1707d83e9e1" Mar 17 18:43:00.280286 env[1187]: 2025-03-17 18:43:00.199 [INFO][2421] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" iface="eth0" netns="/var/run/netns/cni-2a1f5150-4911-85cf-d50e-d1707d83e9e1" Mar 17 18:43:00.280286 env[1187]: 2025-03-17 18:43:00.199 [INFO][2421] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" iface="eth0" netns="/var/run/netns/cni-2a1f5150-4911-85cf-d50e-d1707d83e9e1" Mar 17 18:43:00.280286 env[1187]: 2025-03-17 18:43:00.199 [INFO][2421] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Mar 17 18:43:00.280286 env[1187]: 2025-03-17 18:43:00.199 [INFO][2421] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Mar 17 18:43:00.280286 env[1187]: 2025-03-17 18:43:00.253 [INFO][2427] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" HandleID="k8s-pod-network.16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Workload="64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0" Mar 17 18:43:00.280286 env[1187]: 2025-03-17 18:43:00.253 [INFO][2427] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:43:00.280286 env[1187]: 2025-03-17 18:43:00.253 [INFO][2427] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:43:00.280286 env[1187]: 2025-03-17 18:43:00.271 [WARNING][2427] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" HandleID="k8s-pod-network.16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Workload="64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0" Mar 17 18:43:00.280286 env[1187]: 2025-03-17 18:43:00.271 [INFO][2427] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" HandleID="k8s-pod-network.16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Workload="64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0" Mar 17 18:43:00.280286 env[1187]: 2025-03-17 18:43:00.275 [INFO][2427] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:43:00.280286 env[1187]: 2025-03-17 18:43:00.278 [INFO][2421] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Mar 17 18:43:00.285116 systemd[1]: run-netns-cni\x2d2a1f5150\x2d4911\x2d85cf\x2dd50e\x2dd1707d83e9e1.mount: Deactivated successfully. Mar 17 18:43:00.286864 env[1187]: time="2025-03-17T18:43:00.286788304Z" level=info msg="TearDown network for sandbox \"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\" successfully" Mar 17 18:43:00.287187 env[1187]: time="2025-03-17T18:43:00.287091715Z" level=info msg="StopPodSandbox for \"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\" returns successfully" Mar 17 18:43:00.288614 env[1187]: time="2025-03-17T18:43:00.288476038Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-gn8ff,Uid:5ebca062-0eb4-41ce-93c6-2c383bd66f54,Namespace:default,Attempt:1,}" Mar 17 18:43:00.615415 systemd-networkd[1002]: calif3b082a58ad: Link UP Mar 17 18:43:00.622641 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:43:00.623056 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif3b082a58ad: link becomes ready Mar 17 18:43:00.623473 systemd-networkd[1002]: calif3b082a58ad: Gained carrier Mar 17 18:43:00.680163 env[1187]: time="2025-03-17T18:43:00.680102341Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:00.687531 env[1187]: 2025-03-17 18:43:00.408 [INFO][2434] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0 nginx-deployment-7fcdb87857- default 5ebca062-0eb4-41ce-93c6-2c383bd66f54 1131 0 2025-03-17 18:42:44 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 64.23.131.98 nginx-deployment-7fcdb87857-gn8ff eth0 default [] [] [kns.default ksa.default.default] calif3b082a58ad [] []}} ContainerID="fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441" Namespace="default" Pod="nginx-deployment-7fcdb87857-gn8ff" WorkloadEndpoint="64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-" Mar 17 18:43:00.687531 env[1187]: 2025-03-17 18:43:00.408 [INFO][2434] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441" Namespace="default" Pod="nginx-deployment-7fcdb87857-gn8ff" WorkloadEndpoint="64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0" Mar 17 18:43:00.687531 env[1187]: 2025-03-17 18:43:00.472 [INFO][2446] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441" HandleID="k8s-pod-network.fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441" Workload="64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0" Mar 17 18:43:00.687531 env[1187]: 2025-03-17 18:43:00.492 [INFO][2446] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441" HandleID="k8s-pod-network.fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441" Workload="64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003acdd0), Attrs:map[string]string{"namespace":"default", "node":"64.23.131.98", "pod":"nginx-deployment-7fcdb87857-gn8ff", "timestamp":"2025-03-17 18:43:00.472526776 +0000 UTC"}, Hostname:"64.23.131.98", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:43:00.687531 env[1187]: 2025-03-17 18:43:00.492 [INFO][2446] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:43:00.687531 env[1187]: 2025-03-17 18:43:00.492 [INFO][2446] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:43:00.687531 env[1187]: 2025-03-17 18:43:00.493 [INFO][2446] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '64.23.131.98' Mar 17 18:43:00.687531 env[1187]: 2025-03-17 18:43:00.498 [INFO][2446] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441" host="64.23.131.98" Mar 17 18:43:00.687531 env[1187]: 2025-03-17 18:43:00.514 [INFO][2446] ipam/ipam.go 372: Looking up existing affinities for host host="64.23.131.98" Mar 17 18:43:00.687531 env[1187]: 2025-03-17 18:43:00.528 [INFO][2446] ipam/ipam.go 489: Trying affinity for 192.168.59.128/26 host="64.23.131.98" Mar 17 18:43:00.687531 env[1187]: 2025-03-17 18:43:00.533 [INFO][2446] ipam/ipam.go 155: Attempting to load block cidr=192.168.59.128/26 host="64.23.131.98" Mar 17 18:43:00.687531 env[1187]: 2025-03-17 18:43:00.547 [INFO][2446] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.59.128/26 host="64.23.131.98" Mar 17 18:43:00.687531 env[1187]: 2025-03-17 18:43:00.548 [INFO][2446] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.59.128/26 handle="k8s-pod-network.fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441" host="64.23.131.98" Mar 17 18:43:00.687531 env[1187]: 2025-03-17 18:43:00.555 [INFO][2446] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441 Mar 17 18:43:00.687531 env[1187]: 2025-03-17 18:43:00.574 [INFO][2446] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.59.128/26 handle="k8s-pod-network.fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441" host="64.23.131.98" Mar 17 18:43:00.687531 env[1187]: 2025-03-17 18:43:00.593 [INFO][2446] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.59.130/26] block=192.168.59.128/26 handle="k8s-pod-network.fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441" host="64.23.131.98" Mar 17 18:43:00.687531 env[1187]: 2025-03-17 18:43:00.593 [INFO][2446] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.59.130/26] handle="k8s-pod-network.fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441" host="64.23.131.98" Mar 17 18:43:00.687531 env[1187]: 2025-03-17 18:43:00.593 [INFO][2446] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:43:00.687531 env[1187]: 2025-03-17 18:43:00.594 [INFO][2446] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.59.130/26] IPv6=[] ContainerID="fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441" HandleID="k8s-pod-network.fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441" Workload="64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0" Mar 17 18:43:00.689028 env[1187]: 2025-03-17 18:43:00.596 [INFO][2434] cni-plugin/k8s.go 386: Populated endpoint ContainerID="fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441" Namespace="default" Pod="nginx-deployment-7fcdb87857-gn8ff" WorkloadEndpoint="64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"5ebca062-0eb4-41ce-93c6-2c383bd66f54", ResourceVersion:"1131", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 42, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.131.98", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-gn8ff", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.59.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif3b082a58ad", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:43:00.689028 env[1187]: 2025-03-17 18:43:00.597 [INFO][2434] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.59.130/32] ContainerID="fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441" Namespace="default" Pod="nginx-deployment-7fcdb87857-gn8ff" WorkloadEndpoint="64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0" Mar 17 18:43:00.689028 env[1187]: 2025-03-17 18:43:00.597 [INFO][2434] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif3b082a58ad ContainerID="fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441" Namespace="default" Pod="nginx-deployment-7fcdb87857-gn8ff" WorkloadEndpoint="64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0" Mar 17 18:43:00.689028 env[1187]: 2025-03-17 18:43:00.625 [INFO][2434] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441" Namespace="default" Pod="nginx-deployment-7fcdb87857-gn8ff" WorkloadEndpoint="64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0" Mar 17 18:43:00.689028 env[1187]: 2025-03-17 18:43:00.626 [INFO][2434] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441" Namespace="default" Pod="nginx-deployment-7fcdb87857-gn8ff" WorkloadEndpoint="64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"5ebca062-0eb4-41ce-93c6-2c383bd66f54", ResourceVersion:"1131", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 42, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.131.98", ContainerID:"fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441", Pod:"nginx-deployment-7fcdb87857-gn8ff", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.59.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif3b082a58ad", MAC:"0a:92:93:f2:f6:35", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:43:00.689028 env[1187]: 2025-03-17 18:43:00.682 [INFO][2434] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441" Namespace="default" Pod="nginx-deployment-7fcdb87857-gn8ff" WorkloadEndpoint="64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0" Mar 17 18:43:00.694367 env[1187]: time="2025-03-17T18:43:00.694298443Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:00.701296 env[1187]: time="2025-03-17T18:43:00.701230208Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:00.707117 env[1187]: time="2025-03-17T18:43:00.707053887Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:00.707919 env[1187]: time="2025-03-17T18:43:00.707859748Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Mar 17 18:43:00.728827 kernel: audit: type=1325 audit(1742236980.715:679): table=filter:72 family=2 entries=38 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:43:00.729006 kernel: audit: type=1300 audit(1742236980.715:679): arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffe464af520 a2=0 a3=7ffe464af50c items=0 ppid=2075 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:00.715000 audit[2472]: NETFILTER_CFG table=filter:72 family=2 entries=38 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:43:00.715000 audit[2472]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffe464af520 a2=0 a3=7ffe464af50c items=0 ppid=2075 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:00.729536 env[1187]: time="2025-03-17T18:43:00.726059368Z" level=info msg="CreateContainer within sandbox \"355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Mar 17 18:43:00.715000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:43:00.735837 kernel: audit: type=1327 audit(1742236980.715:679): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:43:00.771497 env[1187]: time="2025-03-17T18:43:00.744066554Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:43:00.771497 env[1187]: time="2025-03-17T18:43:00.744173543Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:43:00.771497 env[1187]: time="2025-03-17T18:43:00.744197694Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:43:00.771497 env[1187]: time="2025-03-17T18:43:00.744564887Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441 pid=2475 runtime=io.containerd.runc.v2 Mar 17 18:43:00.778318 systemd[1]: Started cri-containerd-fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441.scope. Mar 17 18:43:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.807818 env[1187]: time="2025-03-17T18:43:00.801377058Z" level=info msg="CreateContainer within sandbox \"355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"30e240f66d1462211f7855896b0f497bdd169b5226786e96ec28c9c729006a60\"" Mar 17 18:43:00.812256 kernel: audit: type=1400 audit(1742236980.801:680): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.812382 kernel: audit: type=1400 audit(1742236980.801:681): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.812863 env[1187]: time="2025-03-17T18:43:00.812572910Z" level=info msg="StartContainer for \"30e240f66d1462211f7855896b0f497bdd169b5226786e96ec28c9c729006a60\"" Mar 17 18:43:00.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.836722 kernel: audit: type=1400 audit(1742236980.802:682): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.847736 kernel: audit: type=1400 audit(1742236980.802:683): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.859028 kernel: audit: type=1400 audit(1742236980.802:684): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.859227 kernel: audit: type=1400 audit(1742236980.802:685): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.811000 audit: BPF prog-id=101 op=LOAD Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2475 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:00.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663653164326133626134313361666132656334353838663465306435 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2475 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:00.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663653164326133626134313361666132656334353838663465306435 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit: BPF prog-id=102 op=LOAD Mar 17 18:43:00.813000 audit[2483]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000024580 items=0 ppid=2475 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:00.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663653164326133626134313361666132656334353838663465306435 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit: BPF prog-id=103 op=LOAD Mar 17 18:43:00.813000 audit[2483]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0000245c8 items=0 ppid=2475 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:00.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663653164326133626134313361666132656334353838663465306435 Mar 17 18:43:00.813000 audit: BPF prog-id=103 op=UNLOAD Mar 17 18:43:00.813000 audit: BPF prog-id=102 op=UNLOAD Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { perfmon } for pid=2483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit[2483]: AVC avc: denied { bpf } for pid=2483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.813000 audit: BPF prog-id=104 op=LOAD Mar 17 18:43:00.813000 audit[2483]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0000249d8 items=0 ppid=2475 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:00.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663653164326133626134313361666132656334353838663465306435 Mar 17 18:43:00.872873 systemd[1]: Started cri-containerd-30e240f66d1462211f7855896b0f497bdd169b5226786e96ec28c9c729006a60.scope. Mar 17 18:43:00.889573 kubelet[1437]: E0317 18:43:00.889507 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f52f81ed988 items=0 ppid=2357 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:00.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330653234306636366431343632323131663738353538393662306634 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit: BPF prog-id=105 op=LOAD Mar 17 18:43:00.928000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00010a708 items=0 ppid=2357 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:00.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330653234306636366431343632323131663738353538393662306634 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit: BPF prog-id=106 op=LOAD Mar 17 18:43:00.928000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00010a758 items=0 ppid=2357 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:00.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330653234306636366431343632323131663738353538393662306634 Mar 17 18:43:00.928000 audit: BPF prog-id=106 op=UNLOAD Mar 17 18:43:00.928000 audit: BPF prog-id=105 op=UNLOAD Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:00.928000 audit: BPF prog-id=107 op=LOAD Mar 17 18:43:00.928000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00010a7e8 items=0 ppid=2357 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:00.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330653234306636366431343632323131663738353538393662306634 Mar 17 18:43:00.936779 env[1187]: time="2025-03-17T18:43:00.936669544Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-gn8ff,Uid:5ebca062-0eb4-41ce-93c6-2c383bd66f54,Namespace:default,Attempt:1,} returns sandbox id \"fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441\"" Mar 17 18:43:00.943215 env[1187]: time="2025-03-17T18:43:00.943157957Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Mar 17 18:43:00.967228 env[1187]: time="2025-03-17T18:43:00.967039974Z" level=info msg="StartContainer for \"30e240f66d1462211f7855896b0f497bdd169b5226786e96ec28c9c729006a60\" returns successfully" Mar 17 18:43:01.723168 systemd-networkd[1002]: calif3b082a58ad: Gained IPv6LL Mar 17 18:43:01.826199 sshd[2029]: Failed password for root from 218.92.0.133 port 20554 ssh2 Mar 17 18:43:01.890466 kubelet[1437]: E0317 18:43:01.890374 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:02.891116 kubelet[1437]: E0317 18:43:02.891047 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:03.892068 kubelet[1437]: E0317 18:43:03.891991 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:03.972063 sshd[2029]: Received disconnect from 218.92.0.133 port 20554:11: [preauth] Mar 17 18:43:03.972063 sshd[2029]: Disconnected from authenticating user root 218.92.0.133 port 20554 [preauth] Mar 17 18:43:03.972868 sshd[2029]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133 user=root Mar 17 18:43:03.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-64.23.131.98:22-218.92.0.133:20554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:43:03.974503 systemd[1]: sshd@7-64.23.131.98:22-218.92.0.133:20554.service: Deactivated successfully. Mar 17 18:43:04.548942 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1947592612.mount: Deactivated successfully. Mar 17 18:43:04.892371 kubelet[1437]: E0317 18:43:04.892202 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:05.893420 kubelet[1437]: E0317 18:43:05.893326 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:06.856658 kubelet[1437]: E0317 18:43:06.856596 1437 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:06.894245 kubelet[1437]: E0317 18:43:06.894189 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:07.316446 env[1187]: time="2025-03-17T18:43:07.316378139Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:07.320473 env[1187]: time="2025-03-17T18:43:07.320404313Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d25119ebd2aadc346788ac84ae0c5b1b018c687dcfd3167bb27e341f8b5caeee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:07.324800 env[1187]: time="2025-03-17T18:43:07.324742302Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:07.328189 env[1187]: time="2025-03-17T18:43:07.328131713Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:b927c62cc716b99bce51774b46a63feb63f5414c6f985fb80cacd1933bbd0e06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:07.330329 env[1187]: time="2025-03-17T18:43:07.330273758Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d25119ebd2aadc346788ac84ae0c5b1b018c687dcfd3167bb27e341f8b5caeee\"" Mar 17 18:43:07.337875 env[1187]: time="2025-03-17T18:43:07.337763848Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Mar 17 18:43:07.340018 env[1187]: time="2025-03-17T18:43:07.339943429Z" level=info msg="CreateContainer within sandbox \"fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Mar 17 18:43:07.362343 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3388427926.mount: Deactivated successfully. Mar 17 18:43:07.375889 env[1187]: time="2025-03-17T18:43:07.375787188Z" level=info msg="CreateContainer within sandbox \"fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"875a12c86c722bac8e203cb5b1e4a56a5d4bb43cf842d4351c5915f57d4a85ea\"" Mar 17 18:43:07.377304 env[1187]: time="2025-03-17T18:43:07.377252483Z" level=info msg="StartContainer for \"875a12c86c722bac8e203cb5b1e4a56a5d4bb43cf842d4351c5915f57d4a85ea\"" Mar 17 18:43:07.421097 systemd[1]: Started cri-containerd-875a12c86c722bac8e203cb5b1e4a56a5d4bb43cf842d4351c5915f57d4a85ea.scope. Mar 17 18:43:07.448018 kernel: kauditd_printk_skb: 95 callbacks suppressed Mar 17 18:43:07.448191 kernel: audit: type=1400 audit(1742236987.442:705): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.462765 kernel: audit: type=1400 audit(1742236987.442:706): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.462979 kernel: audit: type=1400 audit(1742236987.442:707): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.463029 kernel: audit: type=1400 audit(1742236987.442:708): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.467846 kernel: audit: type=1400 audit(1742236987.442:709): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.472122 kernel: audit: type=1400 audit(1742236987.442:710): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.476797 kernel: audit: type=1400 audit(1742236987.442:711): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.483762 kernel: audit: type=1400 audit(1742236987.442:712): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.496823 kernel: audit: type=1400 audit(1742236987.442:713): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.502785 kernel: audit: type=1400 audit(1742236987.442:714): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.442000 audit: BPF prog-id=108 op=LOAD Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=2475 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:07.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837356131326338366337323262616338653230336362356231653461 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=2475 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:07.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837356131326338366337323262616338653230336362356231653461 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit: BPF prog-id=109 op=LOAD Mar 17 18:43:07.450000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c0002ab190 items=0 ppid=2475 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:07.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837356131326338366337323262616338653230336362356231653461 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit: BPF prog-id=110 op=LOAD Mar 17 18:43:07.450000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c0002ab1d8 items=0 ppid=2475 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:07.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837356131326338366337323262616338653230336362356231653461 Mar 17 18:43:07.450000 audit: BPF prog-id=110 op=UNLOAD Mar 17 18:43:07.450000 audit: BPF prog-id=109 op=UNLOAD Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:07.450000 audit: BPF prog-id=111 op=LOAD Mar 17 18:43:07.450000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c0002ab5e8 items=0 ppid=2475 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:07.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837356131326338366337323262616338653230336362356231653461 Mar 17 18:43:07.521166 env[1187]: time="2025-03-17T18:43:07.521104247Z" level=info msg="StartContainer for \"875a12c86c722bac8e203cb5b1e4a56a5d4bb43cf842d4351c5915f57d4a85ea\" returns successfully" Mar 17 18:43:07.895232 kubelet[1437]: E0317 18:43:07.895176 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:08.896299 kubelet[1437]: E0317 18:43:08.896222 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:09.527778 env[1187]: time="2025-03-17T18:43:09.527679435Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:09.532397 env[1187]: time="2025-03-17T18:43:09.532295380Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:09.536325 env[1187]: time="2025-03-17T18:43:09.536260792Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:09.539232 env[1187]: time="2025-03-17T18:43:09.539161656Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:09.540086 env[1187]: time="2025-03-17T18:43:09.539992114Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Mar 17 18:43:09.550940 env[1187]: time="2025-03-17T18:43:09.550886178Z" level=info msg="CreateContainer within sandbox \"355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Mar 17 18:43:09.576072 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4231671600.mount: Deactivated successfully. Mar 17 18:43:09.586711 env[1187]: time="2025-03-17T18:43:09.586596644Z" level=info msg="CreateContainer within sandbox \"355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"4cb96dc815eece1089e8d8bcb416070bb02f7fe16545817cf7624ea1a7e37bfa\"" Mar 17 18:43:09.588112 env[1187]: time="2025-03-17T18:43:09.588061314Z" level=info msg="StartContainer for \"4cb96dc815eece1089e8d8bcb416070bb02f7fe16545817cf7624ea1a7e37bfa\"" Mar 17 18:43:09.635199 systemd[1]: run-containerd-runc-k8s.io-4cb96dc815eece1089e8d8bcb416070bb02f7fe16545817cf7624ea1a7e37bfa-runc.YPalrm.mount: Deactivated successfully. Mar 17 18:43:09.647369 systemd[1]: Started cri-containerd-4cb96dc815eece1089e8d8bcb416070bb02f7fe16545817cf7624ea1a7e37bfa.scope. Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7f176f29ccb8 items=0 ppid=2357 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:09.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463623936646338313565656365313038396538643862636234313630 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit: BPF prog-id=112 op=LOAD Mar 17 18:43:09.672000 audit[2623]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c0001bc838 items=0 ppid=2357 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:09.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463623936646338313565656365313038396538643862636234313630 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit: BPF prog-id=113 op=LOAD Mar 17 18:43:09.672000 audit[2623]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c0001bc888 items=0 ppid=2357 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:09.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463623936646338313565656365313038396538643862636234313630 Mar 17 18:43:09.672000 audit: BPF prog-id=113 op=UNLOAD Mar 17 18:43:09.672000 audit: BPF prog-id=112 op=UNLOAD Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:09.672000 audit: BPF prog-id=114 op=LOAD Mar 17 18:43:09.672000 audit[2623]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c0001bc918 items=0 ppid=2357 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:09.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463623936646338313565656365313038396538643862636234313630 Mar 17 18:43:09.700823 env[1187]: time="2025-03-17T18:43:09.700740328Z" level=info msg="StartContainer for \"4cb96dc815eece1089e8d8bcb416070bb02f7fe16545817cf7624ea1a7e37bfa\" returns successfully" Mar 17 18:43:09.898022 kubelet[1437]: E0317 18:43:09.897154 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:10.070407 kubelet[1437]: I0317 18:43:10.070362 1437 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Mar 17 18:43:10.070644 kubelet[1437]: I0317 18:43:10.070425 1437 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Mar 17 18:43:10.335108 kubelet[1437]: I0317 18:43:10.335010 1437 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-m4g44" podStartSLOduration=30.679322485 podStartE2EDuration="43.334963086s" podCreationTimestamp="2025-03-17 18:42:27 +0000 UTC" firstStartedPulling="2025-03-17 18:42:56.88640107 +0000 UTC m=+30.712009985" lastFinishedPulling="2025-03-17 18:43:09.542041645 +0000 UTC m=+43.367650586" observedRunningTime="2025-03-17 18:43:10.333822863 +0000 UTC m=+44.159431806" watchObservedRunningTime="2025-03-17 18:43:10.334963086 +0000 UTC m=+44.160572028" Mar 17 18:43:10.335844 kubelet[1437]: I0317 18:43:10.335779 1437 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-gn8ff" podStartSLOduration=19.944178598 podStartE2EDuration="26.335747293s" podCreationTimestamp="2025-03-17 18:42:44 +0000 UTC" firstStartedPulling="2025-03-17 18:43:00.941456258 +0000 UTC m=+34.767065180" lastFinishedPulling="2025-03-17 18:43:07.333024959 +0000 UTC m=+41.158633875" observedRunningTime="2025-03-17 18:43:08.32218527 +0000 UTC m=+42.147794209" watchObservedRunningTime="2025-03-17 18:43:10.335747293 +0000 UTC m=+44.161356229" Mar 17 18:43:10.898425 kubelet[1437]: E0317 18:43:10.898361 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:11.899374 kubelet[1437]: E0317 18:43:11.899309 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:12.899515 kubelet[1437]: E0317 18:43:12.899456 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:13.901365 kubelet[1437]: E0317 18:43:13.901306 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:14.052000 audit[2656]: NETFILTER_CFG table=filter:73 family=2 entries=20 op=nft_register_rule pid=2656 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:14.055382 kernel: kauditd_printk_skb: 90 callbacks suppressed Mar 17 18:43:14.055580 kernel: audit: type=1325 audit(1742236994.052:729): table=filter:73 family=2 entries=20 op=nft_register_rule pid=2656 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:14.052000 audit[2656]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe74882260 a2=0 a3=7ffe7488224c items=0 ppid=1655 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:14.067448 kernel: audit: type=1300 audit(1742236994.052:729): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe74882260 a2=0 a3=7ffe7488224c items=0 ppid=1655 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:14.067665 kernel: audit: type=1327 audit(1742236994.052:729): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:14.052000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:14.068000 audit[2656]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2656 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:14.075970 kernel: audit: type=1325 audit(1742236994.068:730): table=nat:74 family=2 entries=22 op=nft_register_rule pid=2656 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:14.068000 audit[2656]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe74882260 a2=0 a3=0 items=0 ppid=1655 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:14.086973 kernel: audit: type=1300 audit(1742236994.068:730): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe74882260 a2=0 a3=0 items=0 ppid=1655 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:14.068000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:14.093744 kernel: audit: type=1327 audit(1742236994.068:730): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:14.098000 audit[2660]: NETFILTER_CFG table=filter:75 family=2 entries=32 op=nft_register_rule pid=2660 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:14.098000 audit[2660]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff55c536e0 a2=0 a3=7fff55c536cc items=0 ppid=1655 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:14.112428 kernel: audit: type=1325 audit(1742236994.098:731): table=filter:75 family=2 entries=32 op=nft_register_rule pid=2660 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:14.112708 kernel: audit: type=1300 audit(1742236994.098:731): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff55c536e0 a2=0 a3=7fff55c536cc items=0 ppid=1655 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:14.098000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:14.112000 audit[2660]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=2660 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:14.120779 kernel: audit: type=1327 audit(1742236994.098:731): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:14.120990 kernel: audit: type=1325 audit(1742236994.112:732): table=nat:76 family=2 entries=22 op=nft_register_rule pid=2660 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:14.112000 audit[2660]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff55c536e0 a2=0 a3=0 items=0 ppid=1655 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:14.112000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:14.195267 systemd[1]: Created slice kubepods-besteffort-pod2f782466_b300_4af5_b401_ba960347b9da.slice. Mar 17 18:43:14.278114 kubelet[1437]: I0317 18:43:14.278035 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vtctl\" (UniqueName: \"kubernetes.io/projected/2f782466-b300-4af5-b401-ba960347b9da-kube-api-access-vtctl\") pod \"nfs-server-provisioner-0\" (UID: \"2f782466-b300-4af5-b401-ba960347b9da\") " pod="default/nfs-server-provisioner-0" Mar 17 18:43:14.278664 kubelet[1437]: I0317 18:43:14.278626 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/2f782466-b300-4af5-b401-ba960347b9da-data\") pod \"nfs-server-provisioner-0\" (UID: \"2f782466-b300-4af5-b401-ba960347b9da\") " pod="default/nfs-server-provisioner-0" Mar 17 18:43:14.502190 env[1187]: time="2025-03-17T18:43:14.501402858Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:2f782466-b300-4af5-b401-ba960347b9da,Namespace:default,Attempt:0,}" Mar 17 18:43:14.825732 systemd-networkd[1002]: cali60e51b789ff: Link UP Mar 17 18:43:14.828897 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Mar 17 18:43:14.829946 systemd-networkd[1002]: cali60e51b789ff: Gained carrier Mar 17 18:43:14.854067 env[1187]: 2025-03-17 18:43:14.596 [INFO][2662] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {64.23.131.98-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 2f782466-b300-4af5-b401-ba960347b9da 1198 0 2025-03-17 18:43:14 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 64.23.131.98 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.23.131.98-k8s-nfs--server--provisioner--0-" Mar 17 18:43:14.854067 env[1187]: 2025-03-17 18:43:14.596 [INFO][2662] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.23.131.98-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:43:14.854067 env[1187]: 2025-03-17 18:43:14.659 [INFO][2674] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe" HandleID="k8s-pod-network.60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe" Workload="64.23.131.98-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:43:14.854067 env[1187]: 2025-03-17 18:43:14.680 [INFO][2674] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe" HandleID="k8s-pod-network.60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe" Workload="64.23.131.98-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003cfc90), Attrs:map[string]string{"namespace":"default", "node":"64.23.131.98", "pod":"nfs-server-provisioner-0", "timestamp":"2025-03-17 18:43:14.659399375 +0000 UTC"}, Hostname:"64.23.131.98", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:43:14.854067 env[1187]: 2025-03-17 18:43:14.680 [INFO][2674] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:43:14.854067 env[1187]: 2025-03-17 18:43:14.680 [INFO][2674] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:43:14.854067 env[1187]: 2025-03-17 18:43:14.680 [INFO][2674] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '64.23.131.98' Mar 17 18:43:14.854067 env[1187]: 2025-03-17 18:43:14.700 [INFO][2674] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe" host="64.23.131.98" Mar 17 18:43:14.854067 env[1187]: 2025-03-17 18:43:14.740 [INFO][2674] ipam/ipam.go 372: Looking up existing affinities for host host="64.23.131.98" Mar 17 18:43:14.854067 env[1187]: 2025-03-17 18:43:14.758 [INFO][2674] ipam/ipam.go 489: Trying affinity for 192.168.59.128/26 host="64.23.131.98" Mar 17 18:43:14.854067 env[1187]: 2025-03-17 18:43:14.764 [INFO][2674] ipam/ipam.go 155: Attempting to load block cidr=192.168.59.128/26 host="64.23.131.98" Mar 17 18:43:14.854067 env[1187]: 2025-03-17 18:43:14.774 [INFO][2674] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.59.128/26 host="64.23.131.98" Mar 17 18:43:14.854067 env[1187]: 2025-03-17 18:43:14.774 [INFO][2674] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.59.128/26 handle="k8s-pod-network.60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe" host="64.23.131.98" Mar 17 18:43:14.854067 env[1187]: 2025-03-17 18:43:14.783 [INFO][2674] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe Mar 17 18:43:14.854067 env[1187]: 2025-03-17 18:43:14.797 [INFO][2674] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.59.128/26 handle="k8s-pod-network.60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe" host="64.23.131.98" Mar 17 18:43:14.854067 env[1187]: 2025-03-17 18:43:14.817 [INFO][2674] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.59.131/26] block=192.168.59.128/26 handle="k8s-pod-network.60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe" host="64.23.131.98" Mar 17 18:43:14.854067 env[1187]: 2025-03-17 18:43:14.817 [INFO][2674] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.59.131/26] handle="k8s-pod-network.60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe" host="64.23.131.98" Mar 17 18:43:14.854067 env[1187]: 2025-03-17 18:43:14.817 [INFO][2674] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:43:14.854067 env[1187]: 2025-03-17 18:43:14.817 [INFO][2674] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.59.131/26] IPv6=[] ContainerID="60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe" HandleID="k8s-pod-network.60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe" Workload="64.23.131.98-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:43:14.855281 env[1187]: 2025-03-17 18:43:14.820 [INFO][2662] cni-plugin/k8s.go 386: Populated endpoint ContainerID="60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.23.131.98-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.131.98-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"2f782466-b300-4af5-b401-ba960347b9da", ResourceVersion:"1198", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.131.98", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.59.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:43:14.855281 env[1187]: 2025-03-17 18:43:14.820 [INFO][2662] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.59.131/32] ContainerID="60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.23.131.98-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:43:14.855281 env[1187]: 2025-03-17 18:43:14.820 [INFO][2662] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.23.131.98-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:43:14.855281 env[1187]: 2025-03-17 18:43:14.825 [INFO][2662] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.23.131.98-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:43:14.855599 env[1187]: 2025-03-17 18:43:14.825 [INFO][2662] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.23.131.98-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.131.98-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"2f782466-b300-4af5-b401-ba960347b9da", ResourceVersion:"1198", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.131.98", ContainerID:"60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.59.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"62:43:68:af:e5:95", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:43:14.855599 env[1187]: 2025-03-17 18:43:14.850 [INFO][2662] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.23.131.98-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:43:14.882086 env[1187]: time="2025-03-17T18:43:14.881942293Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:43:14.882086 env[1187]: time="2025-03-17T18:43:14.882012380Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:43:14.882086 env[1187]: time="2025-03-17T18:43:14.882035838Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:43:14.883333 env[1187]: time="2025-03-17T18:43:14.883115918Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe pid=2701 runtime=io.containerd.runc.v2 Mar 17 18:43:14.902366 kubelet[1437]: E0317 18:43:14.902271 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:14.915000 audit[2711]: NETFILTER_CFG table=filter:77 family=2 entries=38 op=nft_register_chain pid=2711 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:43:14.915000 audit[2711]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffc93c1ee20 a2=0 a3=7ffc93c1ee0c items=0 ppid=2075 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:14.915000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:43:14.923966 systemd[1]: Started cri-containerd-60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe.scope. Mar 17 18:43:14.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.941000 audit: BPF prog-id=115 op=LOAD Mar 17 18:43:14.942000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.942000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2701 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:14.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630643238393538363231383034333433643738643861316337343363 Mar 17 18:43:14.942000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.942000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2701 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:14.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630643238393538363231383034333433643738643861316337343363 Mar 17 18:43:14.942000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.942000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.942000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.942000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.942000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.942000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.942000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.942000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.942000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.942000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.942000 audit: BPF prog-id=116 op=LOAD Mar 17 18:43:14.942000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003c3260 items=0 ppid=2701 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:14.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630643238393538363231383034333433643738643861316337343363 Mar 17 18:43:14.942000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.942000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.942000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.942000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.942000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.942000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.942000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.942000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.942000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.942000 audit: BPF prog-id=117 op=LOAD Mar 17 18:43:14.942000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003c32a8 items=0 ppid=2701 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:14.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630643238393538363231383034333433643738643861316337343363 Mar 17 18:43:14.943000 audit: BPF prog-id=117 op=UNLOAD Mar 17 18:43:14.943000 audit: BPF prog-id=116 op=UNLOAD Mar 17 18:43:14.943000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.943000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.943000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.943000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.943000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.943000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.943000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.943000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.943000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.943000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:14.943000 audit: BPF prog-id=118 op=LOAD Mar 17 18:43:14.943000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c36b8 items=0 ppid=2701 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:14.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630643238393538363231383034333433643738643861316337343363 Mar 17 18:43:14.993943 env[1187]: time="2025-03-17T18:43:14.993861629Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:2f782466-b300-4af5-b401-ba960347b9da,Namespace:default,Attempt:0,} returns sandbox id \"60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe\"" Mar 17 18:43:14.997569 env[1187]: time="2025-03-17T18:43:14.997489426Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Mar 17 18:43:15.868456 systemd-networkd[1002]: cali60e51b789ff: Gained IPv6LL Mar 17 18:43:15.904015 kubelet[1437]: E0317 18:43:15.903877 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:16.904769 kubelet[1437]: E0317 18:43:16.904627 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:17.905330 kubelet[1437]: E0317 18:43:17.905042 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:18.893583 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1451426281.mount: Deactivated successfully. Mar 17 18:43:18.908659 kubelet[1437]: E0317 18:43:18.908584 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:19.918544 kubelet[1437]: E0317 18:43:19.918473 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:20.926356 kubelet[1437]: E0317 18:43:20.920262 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:21.927406 kubelet[1437]: E0317 18:43:21.927339 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:22.615224 env[1187]: time="2025-03-17T18:43:22.615108458Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:22.619100 env[1187]: time="2025-03-17T18:43:22.619023176Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:22.623007 env[1187]: time="2025-03-17T18:43:22.622932648Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:22.626263 env[1187]: time="2025-03-17T18:43:22.626183980Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:22.628262 env[1187]: time="2025-03-17T18:43:22.628190115Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Mar 17 18:43:22.635021 env[1187]: time="2025-03-17T18:43:22.634949156Z" level=info msg="CreateContainer within sandbox \"60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Mar 17 18:43:22.658312 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount540941046.mount: Deactivated successfully. Mar 17 18:43:22.675314 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2340116759.mount: Deactivated successfully. Mar 17 18:43:22.676065 env[1187]: time="2025-03-17T18:43:22.676009858Z" level=info msg="CreateContainer within sandbox \"60d28958621804343d78d8a1c743cb6e45be1c054badaa74a24b49be8c51acfe\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"0bf7f5d98604ca58124f7f8a439ad91d4dd8547cd5cae3cabea6116795339853\"" Mar 17 18:43:22.677316 env[1187]: time="2025-03-17T18:43:22.677273496Z" level=info msg="StartContainer for \"0bf7f5d98604ca58124f7f8a439ad91d4dd8547cd5cae3cabea6116795339853\"" Mar 17 18:43:22.717225 systemd[1]: Started cri-containerd-0bf7f5d98604ca58124f7f8a439ad91d4dd8547cd5cae3cabea6116795339853.scope. Mar 17 18:43:22.752757 kernel: kauditd_printk_skb: 62 callbacks suppressed Mar 17 18:43:22.752981 kernel: audit: type=1400 audit(1742237002.746:752): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.753045 kernel: audit: type=1400 audit(1742237002.746:753): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.767680 kernel: audit: type=1400 audit(1742237002.746:754): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.767910 kernel: audit: type=1400 audit(1742237002.746:755): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.768013 kernel: audit: type=1400 audit(1742237002.746:756): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.773110 kernel: audit: type=1400 audit(1742237002.746:757): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.779180 kernel: audit: type=1400 audit(1742237002.746:758): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.785310 kernel: audit: type=1400 audit(1742237002.746:759): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.796734 kernel: audit: type=1400 audit(1742237002.746:760): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.803725 kernel: audit: type=1400 audit(1742237002.752:761): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.752000 audit: BPF prog-id=119 op=LOAD Mar 17 18:43:22.756000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.756000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2701 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062663766356439383630346361353831323466376638613433396164 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2701 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062663766356439383630346361353831323466376638613433396164 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit: BPF prog-id=120 op=LOAD Mar 17 18:43:22.757000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000221a10 items=0 ppid=2701 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062663766356439383630346361353831323466376638613433396164 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit: BPF prog-id=121 op=LOAD Mar 17 18:43:22.757000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000221a58 items=0 ppid=2701 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062663766356439383630346361353831323466376638613433396164 Mar 17 18:43:22.757000 audit: BPF prog-id=121 op=UNLOAD Mar 17 18:43:22.757000 audit: BPF prog-id=120 op=UNLOAD Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { perfmon } for pid=2754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit[2754]: AVC avc: denied { bpf } for pid=2754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:22.757000 audit: BPF prog-id=122 op=LOAD Mar 17 18:43:22.757000 audit[2754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000221e68 items=0 ppid=2701 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:22.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062663766356439383630346361353831323466376638613433396164 Mar 17 18:43:22.828243 env[1187]: time="2025-03-17T18:43:22.828164552Z" level=info msg="StartContainer for \"0bf7f5d98604ca58124f7f8a439ad91d4dd8547cd5cae3cabea6116795339853\" returns successfully" Mar 17 18:43:22.909000 audit[2783]: AVC avc: denied { search } for pid=2783 comm="rpcbind" name="crypto" dev="proc" ino=23275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c422 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Mar 17 18:43:22.909000 audit[2783]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7eff756280c0 a2=0 a3=0 items=0 ppid=2765 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c422 key=(null) Mar 17 18:43:22.909000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Mar 17 18:43:22.932941 kubelet[1437]: E0317 18:43:22.932864 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:22.979000 audit[2788]: AVC avc: denied { search } for pid=2788 comm="dbus-daemon" name="crypto" dev="proc" ino=23275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c422 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Mar 17 18:43:22.979000 audit[2788]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f50723c30c0 a2=0 a3=0 items=0 ppid=2765 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c422 key=(null) Mar 17 18:43:22.979000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Mar 17 18:43:22.984000 audit[2789]: AVC avc: denied { watch } for pid=2789 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538732 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c422 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c248,c422 tclass=dir permissive=0 Mar 17 18:43:22.984000 audit[2789]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55d07fca76b0 a2=2c8 a3=7ffea084ca8c items=0 ppid=2765 pid=2789 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c422 key=(null) Mar 17 18:43:22.984000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Mar 17 18:43:22.990000 audit[2790]: AVC avc: denied { read } for pid=2790 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23358 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c422 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Mar 17 18:43:22.990000 audit[2790]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f0829b18320 a1=80000 a2=d a3=7ffffbeffc60 items=0 ppid=2765 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c422 key=(null) Mar 17 18:43:22.990000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Mar 17 18:43:22.992000 audit[2790]: AVC avc: denied { search } for pid=2790 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c422 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Mar 17 18:43:22.992000 audit[2790]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f082906c0c0 a2=0 a3=0 items=0 ppid=2765 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c422 key=(null) Mar 17 18:43:22.992000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Mar 17 18:43:23.483000 audit[2809]: NETFILTER_CFG table=filter:78 family=2 entries=20 op=nft_register_rule pid=2809 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:23.483000 audit[2809]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffef9e5eb30 a2=0 a3=7ffef9e5eb1c items=0 ppid=1655 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:23.483000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:23.491000 audit[2809]: NETFILTER_CFG table=nat:79 family=2 entries=106 op=nft_register_chain pid=2809 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:43:23.491000 audit[2809]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffef9e5eb30 a2=0 a3=7ffef9e5eb1c items=0 ppid=1655 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:23.491000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:43:23.933827 kubelet[1437]: E0317 18:43:23.933778 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:24.935093 kubelet[1437]: E0317 18:43:24.935034 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:25.305945 systemd[1]: run-containerd-runc-k8s.io-86c9bfa563831831b8820d950a0e1f4cebcc0237a661a0562c3e511b348cc508-runc.95o2KV.mount: Deactivated successfully. Mar 17 18:43:25.400274 kubelet[1437]: E0317 18:43:25.400205 1437 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Mar 17 18:43:25.464738 kubelet[1437]: I0317 18:43:25.464642 1437 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=3.8302438370000003 podStartE2EDuration="11.464589402s" podCreationTimestamp="2025-03-17 18:43:14 +0000 UTC" firstStartedPulling="2025-03-17 18:43:14.996565373 +0000 UTC m=+48.822174286" lastFinishedPulling="2025-03-17 18:43:22.630910933 +0000 UTC m=+56.456519851" observedRunningTime="2025-03-17 18:43:23.447446444 +0000 UTC m=+57.273055380" watchObservedRunningTime="2025-03-17 18:43:25.464589402 +0000 UTC m=+59.290198340" Mar 17 18:43:25.936514 kubelet[1437]: E0317 18:43:25.936448 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:26.856857 kubelet[1437]: E0317 18:43:26.856802 1437 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:26.898079 env[1187]: time="2025-03-17T18:43:26.897993469Z" level=info msg="StopPodSandbox for \"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\"" Mar 17 18:43:26.937369 kubelet[1437]: E0317 18:43:26.937269 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:27.023680 env[1187]: 2025-03-17 18:43:26.955 [WARNING][2847] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"5ebca062-0eb4-41ce-93c6-2c383bd66f54", ResourceVersion:"1160", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 42, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.131.98", ContainerID:"fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441", Pod:"nginx-deployment-7fcdb87857-gn8ff", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.59.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif3b082a58ad", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:43:27.023680 env[1187]: 2025-03-17 18:43:26.955 [INFO][2847] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Mar 17 18:43:27.023680 env[1187]: 2025-03-17 18:43:26.955 [INFO][2847] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" iface="eth0" netns="" Mar 17 18:43:27.023680 env[1187]: 2025-03-17 18:43:26.955 [INFO][2847] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Mar 17 18:43:27.023680 env[1187]: 2025-03-17 18:43:26.955 [INFO][2847] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Mar 17 18:43:27.023680 env[1187]: 2025-03-17 18:43:27.001 [INFO][2854] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" HandleID="k8s-pod-network.16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Workload="64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0" Mar 17 18:43:27.023680 env[1187]: 2025-03-17 18:43:27.001 [INFO][2854] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:43:27.023680 env[1187]: 2025-03-17 18:43:27.001 [INFO][2854] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:43:27.023680 env[1187]: 2025-03-17 18:43:27.014 [WARNING][2854] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" HandleID="k8s-pod-network.16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Workload="64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0" Mar 17 18:43:27.023680 env[1187]: 2025-03-17 18:43:27.014 [INFO][2854] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" HandleID="k8s-pod-network.16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Workload="64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0" Mar 17 18:43:27.023680 env[1187]: 2025-03-17 18:43:27.019 [INFO][2854] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:43:27.023680 env[1187]: 2025-03-17 18:43:27.021 [INFO][2847] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Mar 17 18:43:27.024921 env[1187]: time="2025-03-17T18:43:27.023680383Z" level=info msg="TearDown network for sandbox \"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\" successfully" Mar 17 18:43:27.024921 env[1187]: time="2025-03-17T18:43:27.023773743Z" level=info msg="StopPodSandbox for \"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\" returns successfully" Mar 17 18:43:27.024921 env[1187]: time="2025-03-17T18:43:27.024681981Z" level=info msg="RemovePodSandbox for \"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\"" Mar 17 18:43:27.024921 env[1187]: time="2025-03-17T18:43:27.024763233Z" level=info msg="Forcibly stopping sandbox \"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\"" Mar 17 18:43:27.175849 env[1187]: 2025-03-17 18:43:27.095 [WARNING][2873] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"5ebca062-0eb4-41ce-93c6-2c383bd66f54", ResourceVersion:"1160", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 42, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.131.98", ContainerID:"fce1d2a3ba413afa2ec4588f4e0d56342806b09fbea5c150b19b05a4b1ba7441", Pod:"nginx-deployment-7fcdb87857-gn8ff", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.59.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif3b082a58ad", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:43:27.175849 env[1187]: 2025-03-17 18:43:27.095 [INFO][2873] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Mar 17 18:43:27.175849 env[1187]: 2025-03-17 18:43:27.095 [INFO][2873] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" iface="eth0" netns="" Mar 17 18:43:27.175849 env[1187]: 2025-03-17 18:43:27.095 [INFO][2873] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Mar 17 18:43:27.175849 env[1187]: 2025-03-17 18:43:27.095 [INFO][2873] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Mar 17 18:43:27.175849 env[1187]: 2025-03-17 18:43:27.155 [INFO][2879] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" HandleID="k8s-pod-network.16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Workload="64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0" Mar 17 18:43:27.175849 env[1187]: 2025-03-17 18:43:27.156 [INFO][2879] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:43:27.175849 env[1187]: 2025-03-17 18:43:27.156 [INFO][2879] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:43:27.175849 env[1187]: 2025-03-17 18:43:27.166 [WARNING][2879] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" HandleID="k8s-pod-network.16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Workload="64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0" Mar 17 18:43:27.175849 env[1187]: 2025-03-17 18:43:27.167 [INFO][2879] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" HandleID="k8s-pod-network.16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Workload="64.23.131.98-k8s-nginx--deployment--7fcdb87857--gn8ff-eth0" Mar 17 18:43:27.175849 env[1187]: 2025-03-17 18:43:27.170 [INFO][2879] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:43:27.175849 env[1187]: 2025-03-17 18:43:27.172 [INFO][2873] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51" Mar 17 18:43:27.175849 env[1187]: time="2025-03-17T18:43:27.175800688Z" level=info msg="TearDown network for sandbox \"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\" successfully" Mar 17 18:43:27.192129 env[1187]: time="2025-03-17T18:43:27.192020575Z" level=info msg="RemovePodSandbox \"16ef9703f19a0b9153bc666e93df38fddf5d48bbe6928de2615fa677e883bc51\" returns successfully" Mar 17 18:43:27.193130 env[1187]: time="2025-03-17T18:43:27.193091144Z" level=info msg="StopPodSandbox for \"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\"" Mar 17 18:43:27.316516 env[1187]: 2025-03-17 18:43:27.247 [WARNING][2900] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.131.98-k8s-csi--node--driver--m4g44-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"60254480-f0fc-46e2-9905-22c26f6d2e77", ResourceVersion:"1171", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 42, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"84cddb44f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.131.98", ContainerID:"355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe", Pod:"csi-node-driver-m4g44", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.59.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali071df183d50", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:43:27.316516 env[1187]: 2025-03-17 18:43:27.248 [INFO][2900] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Mar 17 18:43:27.316516 env[1187]: 2025-03-17 18:43:27.248 [INFO][2900] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" iface="eth0" netns="" Mar 17 18:43:27.316516 env[1187]: 2025-03-17 18:43:27.248 [INFO][2900] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Mar 17 18:43:27.316516 env[1187]: 2025-03-17 18:43:27.248 [INFO][2900] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Mar 17 18:43:27.316516 env[1187]: 2025-03-17 18:43:27.288 [INFO][2907] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" HandleID="k8s-pod-network.bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Workload="64.23.131.98-k8s-csi--node--driver--m4g44-eth0" Mar 17 18:43:27.316516 env[1187]: 2025-03-17 18:43:27.288 [INFO][2907] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:43:27.316516 env[1187]: 2025-03-17 18:43:27.288 [INFO][2907] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:43:27.316516 env[1187]: 2025-03-17 18:43:27.299 [WARNING][2907] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" HandleID="k8s-pod-network.bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Workload="64.23.131.98-k8s-csi--node--driver--m4g44-eth0" Mar 17 18:43:27.316516 env[1187]: 2025-03-17 18:43:27.299 [INFO][2907] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" HandleID="k8s-pod-network.bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Workload="64.23.131.98-k8s-csi--node--driver--m4g44-eth0" Mar 17 18:43:27.316516 env[1187]: 2025-03-17 18:43:27.313 [INFO][2907] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:43:27.316516 env[1187]: 2025-03-17 18:43:27.314 [INFO][2900] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Mar 17 18:43:27.317891 env[1187]: time="2025-03-17T18:43:27.317818753Z" level=info msg="TearDown network for sandbox \"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\" successfully" Mar 17 18:43:27.317891 env[1187]: time="2025-03-17T18:43:27.317883066Z" level=info msg="StopPodSandbox for \"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\" returns successfully" Mar 17 18:43:27.318835 env[1187]: time="2025-03-17T18:43:27.318788122Z" level=info msg="RemovePodSandbox for \"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\"" Mar 17 18:43:27.318977 env[1187]: time="2025-03-17T18:43:27.318856847Z" level=info msg="Forcibly stopping sandbox \"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\"" Mar 17 18:43:27.435037 env[1187]: 2025-03-17 18:43:27.380 [WARNING][2928] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.131.98-k8s-csi--node--driver--m4g44-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"60254480-f0fc-46e2-9905-22c26f6d2e77", ResourceVersion:"1171", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 42, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"84cddb44f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.131.98", ContainerID:"355b25535c24a0ef8b547bcee01d2fc162bf8fba787b1a1059099cf4f6f69bfe", Pod:"csi-node-driver-m4g44", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.59.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali071df183d50", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:43:27.435037 env[1187]: 2025-03-17 18:43:27.381 [INFO][2928] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Mar 17 18:43:27.435037 env[1187]: 2025-03-17 18:43:27.381 [INFO][2928] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" iface="eth0" netns="" Mar 17 18:43:27.435037 env[1187]: 2025-03-17 18:43:27.381 [INFO][2928] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Mar 17 18:43:27.435037 env[1187]: 2025-03-17 18:43:27.381 [INFO][2928] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Mar 17 18:43:27.435037 env[1187]: 2025-03-17 18:43:27.413 [INFO][2934] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" HandleID="k8s-pod-network.bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Workload="64.23.131.98-k8s-csi--node--driver--m4g44-eth0" Mar 17 18:43:27.435037 env[1187]: 2025-03-17 18:43:27.413 [INFO][2934] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:43:27.435037 env[1187]: 2025-03-17 18:43:27.413 [INFO][2934] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:43:27.435037 env[1187]: 2025-03-17 18:43:27.425 [WARNING][2934] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" HandleID="k8s-pod-network.bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Workload="64.23.131.98-k8s-csi--node--driver--m4g44-eth0" Mar 17 18:43:27.435037 env[1187]: 2025-03-17 18:43:27.425 [INFO][2934] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" HandleID="k8s-pod-network.bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Workload="64.23.131.98-k8s-csi--node--driver--m4g44-eth0" Mar 17 18:43:27.435037 env[1187]: 2025-03-17 18:43:27.429 [INFO][2934] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:43:27.435037 env[1187]: 2025-03-17 18:43:27.430 [INFO][2928] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f" Mar 17 18:43:27.435037 env[1187]: time="2025-03-17T18:43:27.433800621Z" level=info msg="TearDown network for sandbox \"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\" successfully" Mar 17 18:43:27.438187 env[1187]: time="2025-03-17T18:43:27.438049629Z" level=info msg="RemovePodSandbox \"bb2f8e64e1a5f3ed9ae353855f510410b03bc5a39ed22683059b52f31049a59f\" returns successfully" Mar 17 18:43:27.937737 kubelet[1437]: E0317 18:43:27.937666 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:28.938784 kubelet[1437]: E0317 18:43:28.938676 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:29.939227 kubelet[1437]: E0317 18:43:29.939171 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:30.940453 kubelet[1437]: E0317 18:43:30.940376 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:31.941138 kubelet[1437]: E0317 18:43:31.941069 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:32.941962 kubelet[1437]: E0317 18:43:32.941878 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:33.145739 systemd[1]: Created slice kubepods-besteffort-pod2aed2391_4362_4693_8357_c385483d8531.slice. Mar 17 18:43:33.248714 kubelet[1437]: I0317 18:43:33.248010 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-e334307a-3726-402e-8292-aafa31b903cf\" (UniqueName: \"kubernetes.io/nfs/2aed2391-4362-4693-8357-c385483d8531-pvc-e334307a-3726-402e-8292-aafa31b903cf\") pod \"test-pod-1\" (UID: \"2aed2391-4362-4693-8357-c385483d8531\") " pod="default/test-pod-1" Mar 17 18:43:33.249165 kubelet[1437]: I0317 18:43:33.249135 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sqgnv\" (UniqueName: \"kubernetes.io/projected/2aed2391-4362-4693-8357-c385483d8531-kube-api-access-sqgnv\") pod \"test-pod-1\" (UID: \"2aed2391-4362-4693-8357-c385483d8531\") " pod="default/test-pod-1" Mar 17 18:43:33.399911 kernel: Failed to create system directory netfs Mar 17 18:43:33.400194 kernel: kauditd_printk_skb: 68 callbacks suppressed Mar 17 18:43:33.400233 kernel: audit: type=1400 audit(1742237013.387:777): avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.400291 kernel: Failed to create system directory netfs Mar 17 18:43:33.400322 kernel: audit: type=1400 audit(1742237013.387:777): avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.400350 kernel: Failed to create system directory netfs Mar 17 18:43:33.387000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.387000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.406762 kernel: audit: type=1400 audit(1742237013.387:777): avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.406917 kernel: Failed to create system directory netfs Mar 17 18:43:33.387000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.419204 kernel: audit: type=1400 audit(1742237013.387:777): avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.387000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.387000 audit[2945]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e3637d35e0 a1=153bc a2=55e32a2572b0 a3=5 items=0 ppid=2537 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:33.436279 kernel: audit: type=1300 audit(1742237013.387:777): arch=c000003e syscall=175 success=yes exit=0 a0=55e3637d35e0 a1=153bc a2=55e32a2572b0 a3=5 items=0 ppid=2537 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:33.436467 kernel: Failed to create system directory fscache Mar 17 18:43:33.436509 kernel: audit: type=1327 audit(1742237013.387:777): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:43:33.436538 kernel: Failed to create system directory fscache Mar 17 18:43:33.387000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:43:33.443389 kernel: audit: type=1400 audit(1742237013.427:778): avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.443583 kernel: Failed to create system directory fscache Mar 17 18:43:33.427000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.450489 kernel: audit: type=1400 audit(1742237013.427:778): avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.450668 kernel: Failed to create system directory fscache Mar 17 18:43:33.427000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.457631 kernel: audit: type=1400 audit(1742237013.427:778): avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.457830 kernel: Failed to create system directory fscache Mar 17 18:43:33.427000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.464801 kernel: audit: type=1400 audit(1742237013.427:778): avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.464984 kernel: Failed to create system directory fscache Mar 17 18:43:33.427000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.427000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.427000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.427000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.467537 kernel: Failed to create system directory fscache Mar 17 18:43:33.467632 kernel: Failed to create system directory fscache Mar 17 18:43:33.427000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.469006 kernel: Failed to create system directory fscache Mar 17 18:43:33.427000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.427000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.471711 kernel: Failed to create system directory fscache Mar 17 18:43:33.427000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.427000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.474793 kernel: Failed to create system directory fscache Mar 17 18:43:33.474940 kernel: Failed to create system directory fscache Mar 17 18:43:33.474990 kernel: Failed to create system directory fscache Mar 17 18:43:33.427000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.427000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.477556 kernel: Failed to create system directory fscache Mar 17 18:43:33.427000 audit[2945]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e3639e89c0 a1=4c0fc a2=55e32a2572b0 a3=5 items=0 ppid=2537 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:33.427000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:43:33.480728 kernel: FS-Cache: Loaded Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.530879 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.531037 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.531213 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.533607 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.533746 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.536431 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.536570 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.537682 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.540290 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.540410 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.541581 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.544207 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.544371 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.546898 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.547022 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.548194 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.550756 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.550878 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.552017 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.553315 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.554620 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.557006 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.557112 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.558363 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.559642 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.560796 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.562087 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.563276 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.564551 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.565888 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.567307 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.568467 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.569795 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.571029 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.572473 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.573596 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.576376 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.576512 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.578955 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.579053 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.582492 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.595750 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.595895 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.598664 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.598818 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.599866 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.602762 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.602888 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.605557 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.605679 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.608330 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.608458 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.611101 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.611186 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.612536 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.615229 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.615352 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.616421 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.617761 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.620532 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.620624 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.623305 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.623415 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.624596 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.625975 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.627431 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.630130 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.630221 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.633184 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.633308 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.635853 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.635981 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.637099 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.638446 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.639551 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.640885 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.643533 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.643677 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.646084 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.646216 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.647462 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.650009 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.650137 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.652649 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.652761 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.653865 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.654984 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.656374 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.657614 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.658953 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.661535 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.661641 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.662842 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.665543 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.665673 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.666910 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.669563 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.669717 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.670718 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.671880 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.673006 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.674165 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.675568 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.678212 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.678309 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.679528 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.680978 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.682296 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.685421 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.685546 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.688043 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.688223 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.689250 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.690713 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.693218 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.693346 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.694471 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.695717 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.696999 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.698321 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.699594 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.702216 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.702327 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.703460 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.704669 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.705961 kernel: Failed to create system directory sunrpc Mar 17 18:43:33.509000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.719115 kernel: RPC: Registered named UNIX socket transport module. Mar 17 18:43:33.719303 kernel: RPC: Registered udp transport module. Mar 17 18:43:33.719356 kernel: RPC: Registered tcp transport module. Mar 17 18:43:33.720391 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Mar 17 18:43:33.509000 audit[2945]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e363a34ad0 a1=1a810c a2=55e32a2572b0 a3=5 items=6 ppid=2537 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:33.509000 audit: CWD cwd="/" Mar 17 18:43:33.509000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:43:33.509000 audit: PATH item=1 name=(null) inode=22507 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:43:33.509000 audit: PATH item=2 name=(null) inode=22507 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:43:33.509000 audit: PATH item=3 name=(null) inode=22508 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:43:33.509000 audit: PATH item=4 name=(null) inode=22507 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:43:33.509000 audit: PATH item=5 name=(null) inode=22509 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:43:33.509000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.786369 kernel: Failed to create system directory nfs Mar 17 18:43:33.786510 kernel: Failed to create system directory nfs Mar 17 18:43:33.786567 kernel: Failed to create system directory nfs Mar 17 18:43:33.786598 kernel: Failed to create system directory nfs Mar 17 18:43:33.786639 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.787784 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.790601 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.793903 kernel: Failed to create system directory nfs Mar 17 18:43:33.794022 kernel: Failed to create system directory nfs Mar 17 18:43:33.794063 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.796679 kernel: Failed to create system directory nfs Mar 17 18:43:33.796869 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.799207 kernel: Failed to create system directory nfs Mar 17 18:43:33.799357 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.801753 kernel: Failed to create system directory nfs Mar 17 18:43:33.801943 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.802841 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.805512 kernel: Failed to create system directory nfs Mar 17 18:43:33.805662 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.806830 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.809112 kernel: Failed to create system directory nfs Mar 17 18:43:33.809259 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.810186 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.811339 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.812571 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.815138 kernel: Failed to create system directory nfs Mar 17 18:43:33.815259 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.816417 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.817482 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.818626 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.819843 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.821096 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.822479 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.823849 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.826172 kernel: Failed to create system directory nfs Mar 17 18:43:33.826276 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.828577 kernel: Failed to create system directory nfs Mar 17 18:43:33.828720 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.829780 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.830771 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.832180 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.834581 kernel: Failed to create system directory nfs Mar 17 18:43:33.834666 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.837171 kernel: Failed to create system directory nfs Mar 17 18:43:33.837263 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.839480 kernel: Failed to create system directory nfs Mar 17 18:43:33.839604 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.840771 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.841832 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.844138 kernel: Failed to create system directory nfs Mar 17 18:43:33.844230 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.845196 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.846470 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.847594 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.848730 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.851006 kernel: Failed to create system directory nfs Mar 17 18:43:33.851096 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.851972 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.853335 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.854294 kernel: Failed to create system directory nfs Mar 17 18:43:33.766000 audit[2945]: AVC avc: denied { confidentiality } for pid=2945 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.878078 kernel: FS-Cache: Netfs 'nfs' registered for caching Mar 17 18:43:33.766000 audit[2945]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e363c559b0 a1=16ea84 a2=55e32a2572b0 a3=5 items=0 ppid=2537 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:33.766000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.942468 kubelet[1437]: E0317 18:43:33.942362 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:33.943155 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.943232 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.943279 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.944418 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.945746 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.947147 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.948556 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.949853 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.951200 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.952465 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.953881 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.956632 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.956748 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.957739 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.959121 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.961563 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.961649 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.962859 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.965607 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.965763 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.968413 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.968542 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.970783 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.970873 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.972154 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.973653 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.976460 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.976568 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.977470 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.978720 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.994083 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.994293 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.997057 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.997404 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.999591 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.999813 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.000639 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.001958 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.004383 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.004500 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.005654 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.008257 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.008363 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.011313 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.011407 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.013979 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.014133 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.016574 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.016704 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.017786 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.019225 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.021748 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.021867 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.024312 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.024416 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.026744 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.026849 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.029224 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.029360 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.031776 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.031893 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.033009 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.034338 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.035470 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.045035 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.045204 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.045245 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.045272 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.045301 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.045344 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.047556 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.050401 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.050546 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.050587 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.051796 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.054302 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.054439 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.056845 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.056946 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.058047 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.059174 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.060385 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.061647 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.062752 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.063916 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.065141 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.066517 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.067794 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.070433 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.070539 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.071655 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.074382 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.074492 kernel: Failed to create system directory nfs4 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:33.919000 audit[2950]: AVC avc: denied { confidentiality } for pid=2950 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.077012 kernel: Failed to create system directory nfs4 Mar 17 18:43:34.219771 kernel: NFS: Registering the id_resolver key type Mar 17 18:43:34.219929 kernel: Key type id_resolver registered Mar 17 18:43:34.219996 kernel: Key type id_legacy registered Mar 17 18:43:33.919000 audit[2950]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7faf4eccd010 a1=208d7c a2=564b8c4c82b0 a3=5 items=0 ppid=2537 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:33.919000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.242346 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.242474 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.242513 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.243823 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.246631 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.246801 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.249232 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.249387 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.252110 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.252298 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.253241 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.254331 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.255648 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.257247 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.260020 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.260152 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.261229 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.262597 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.264066 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.265502 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.266637 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.269356 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.269443 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.272864 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.273203 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.234000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:43:34.275766 kernel: Failed to create system directory rpcgss Mar 17 18:43:34.234000 audit[2951]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f4b3277b010 a1=70b4c a2=55de2a7172b0 a3=5 items=0 ppid=2537 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:34.234000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Mar 17 18:43:34.942608 kubelet[1437]: E0317 18:43:34.942560 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:35.943765 kubelet[1437]: E0317 18:43:35.943671 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:36.945031 kubelet[1437]: E0317 18:43:36.944950 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:37.946311 kubelet[1437]: E0317 18:43:37.946187 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:38.946800 kubelet[1437]: E0317 18:43:38.946725 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:39.947043 kubelet[1437]: E0317 18:43:39.946955 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:40.448106 nfsidmap[2959]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.7-c-f6a0b63c70' Mar 17 18:43:40.947559 kubelet[1437]: E0317 18:43:40.947380 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:41.111636 kubelet[1437]: E0317 18:43:41.111584 1437 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Mar 17 18:43:41.948577 kubelet[1437]: E0317 18:43:41.948488 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:42.949178 kubelet[1437]: E0317 18:43:42.949120 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:43.950160 kubelet[1437]: E0317 18:43:43.950111 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:44.951377 kubelet[1437]: E0317 18:43:44.951292 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:45.952252 kubelet[1437]: E0317 18:43:45.951976 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:46.588961 nfsidmap[2970]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.7-c-f6a0b63c70' Mar 17 18:43:46.610000 audit[1258]: AVC avc: denied { watch_reads } for pid=1258 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2607 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:43:46.613114 kernel: kauditd_printk_skb: 333 callbacks suppressed Mar 17 18:43:46.613246 kernel: audit: type=1400 audit(1742237026.610:783): avc: denied { watch_reads } for pid=1258 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2607 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:43:46.610000 audit[1258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5636baa41060 a2=10 a3=e35eb7451800d881 items=0 ppid=1 pid=1258 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:46.626922 kernel: audit: type=1300 audit(1742237026.610:783): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5636baa41060 a2=10 a3=e35eb7451800d881 items=0 ppid=1 pid=1258 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:46.627122 kernel: audit: type=1327 audit(1742237026.610:783): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Mar 17 18:43:46.610000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Mar 17 18:43:46.610000 audit[1258]: AVC avc: denied { watch_reads } for pid=1258 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2607 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:43:46.635419 kernel: audit: type=1400 audit(1742237026.610:784): avc: denied { watch_reads } for pid=1258 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2607 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:43:46.635571 kernel: audit: type=1300 audit(1742237026.610:784): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5636baa41060 a2=10 a3=e35eb7451800d881 items=0 ppid=1 pid=1258 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:46.610000 audit[1258]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5636baa41060 a2=10 a3=e35eb7451800d881 items=0 ppid=1 pid=1258 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:46.610000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Mar 17 18:43:46.645653 kernel: audit: type=1327 audit(1742237026.610:784): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Mar 17 18:43:46.645864 kernel: audit: type=1400 audit(1742237026.613:785): avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2607 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:43:46.613000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2607 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:43:46.651481 env[1187]: time="2025-03-17T18:43:46.651398736Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:2aed2391-4362-4693-8357-c385483d8531,Namespace:default,Attempt:0,}" Mar 17 18:43:46.652151 kernel: audit: type=1400 audit(1742237026.613:786): avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2607 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:43:46.613000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2607 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:43:46.613000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2607 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:43:46.665796 kernel: audit: type=1400 audit(1742237026.613:787): avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2607 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:43:46.857909 kubelet[1437]: E0317 18:43:46.856589 1437 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:46.906642 systemd-networkd[1002]: cali5ec59c6bf6e: Link UP Mar 17 18:43:46.913315 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:43:46.914380 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Mar 17 18:43:46.914317 systemd-networkd[1002]: cali5ec59c6bf6e: Gained carrier Mar 17 18:43:46.941203 env[1187]: 2025-03-17 18:43:46.749 [INFO][2987] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {64.23.131.98-k8s-test--pod--1-eth0 default 2aed2391-4362-4693-8357-c385483d8531 1277 0 2025-03-17 18:43:14 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 64.23.131.98 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.23.131.98-k8s-test--pod--1-" Mar 17 18:43:46.941203 env[1187]: 2025-03-17 18:43:46.750 [INFO][2987] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.23.131.98-k8s-test--pod--1-eth0" Mar 17 18:43:46.941203 env[1187]: 2025-03-17 18:43:46.804 [INFO][2998] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61" HandleID="k8s-pod-network.217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61" Workload="64.23.131.98-k8s-test--pod--1-eth0" Mar 17 18:43:46.941203 env[1187]: 2025-03-17 18:43:46.823 [INFO][2998] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61" HandleID="k8s-pod-network.217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61" Workload="64.23.131.98-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004e0b40), Attrs:map[string]string{"namespace":"default", "node":"64.23.131.98", "pod":"test-pod-1", "timestamp":"2025-03-17 18:43:46.804316057 +0000 UTC"}, Hostname:"64.23.131.98", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:43:46.941203 env[1187]: 2025-03-17 18:43:46.823 [INFO][2998] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:43:46.941203 env[1187]: 2025-03-17 18:43:46.823 [INFO][2998] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:43:46.941203 env[1187]: 2025-03-17 18:43:46.823 [INFO][2998] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '64.23.131.98' Mar 17 18:43:46.941203 env[1187]: 2025-03-17 18:43:46.835 [INFO][2998] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61" host="64.23.131.98" Mar 17 18:43:46.941203 env[1187]: 2025-03-17 18:43:46.845 [INFO][2998] ipam/ipam.go 372: Looking up existing affinities for host host="64.23.131.98" Mar 17 18:43:46.941203 env[1187]: 2025-03-17 18:43:46.858 [INFO][2998] ipam/ipam.go 489: Trying affinity for 192.168.59.128/26 host="64.23.131.98" Mar 17 18:43:46.941203 env[1187]: 2025-03-17 18:43:46.862 [INFO][2998] ipam/ipam.go 155: Attempting to load block cidr=192.168.59.128/26 host="64.23.131.98" Mar 17 18:43:46.941203 env[1187]: 2025-03-17 18:43:46.868 [INFO][2998] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.59.128/26 host="64.23.131.98" Mar 17 18:43:46.941203 env[1187]: 2025-03-17 18:43:46.869 [INFO][2998] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.59.128/26 handle="k8s-pod-network.217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61" host="64.23.131.98" Mar 17 18:43:46.941203 env[1187]: 2025-03-17 18:43:46.875 [INFO][2998] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61 Mar 17 18:43:46.941203 env[1187]: 2025-03-17 18:43:46.886 [INFO][2998] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.59.128/26 handle="k8s-pod-network.217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61" host="64.23.131.98" Mar 17 18:43:46.941203 env[1187]: 2025-03-17 18:43:46.897 [INFO][2998] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.59.132/26] block=192.168.59.128/26 handle="k8s-pod-network.217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61" host="64.23.131.98" Mar 17 18:43:46.941203 env[1187]: 2025-03-17 18:43:46.898 [INFO][2998] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.59.132/26] handle="k8s-pod-network.217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61" host="64.23.131.98" Mar 17 18:43:46.941203 env[1187]: 2025-03-17 18:43:46.898 [INFO][2998] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:43:46.941203 env[1187]: 2025-03-17 18:43:46.898 [INFO][2998] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.59.132/26] IPv6=[] ContainerID="217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61" HandleID="k8s-pod-network.217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61" Workload="64.23.131.98-k8s-test--pod--1-eth0" Mar 17 18:43:46.941203 env[1187]: 2025-03-17 18:43:46.901 [INFO][2987] cni-plugin/k8s.go 386: Populated endpoint ContainerID="217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.23.131.98-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.131.98-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"2aed2391-4362-4693-8357-c385483d8531", ResourceVersion:"1277", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.131.98", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.59.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:43:46.942802 env[1187]: 2025-03-17 18:43:46.901 [INFO][2987] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.59.132/32] ContainerID="217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.23.131.98-k8s-test--pod--1-eth0" Mar 17 18:43:46.942802 env[1187]: 2025-03-17 18:43:46.901 [INFO][2987] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.23.131.98-k8s-test--pod--1-eth0" Mar 17 18:43:46.942802 env[1187]: 2025-03-17 18:43:46.917 [INFO][2987] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.23.131.98-k8s-test--pod--1-eth0" Mar 17 18:43:46.942802 env[1187]: 2025-03-17 18:43:46.919 [INFO][2987] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.23.131.98-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.131.98-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"2aed2391-4362-4693-8357-c385483d8531", ResourceVersion:"1277", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 43, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.131.98", ContainerID:"217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.59.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"a6:f6:80:40:0e:5f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:43:46.942802 env[1187]: 2025-03-17 18:43:46.933 [INFO][2987] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.23.131.98-k8s-test--pod--1-eth0" Mar 17 18:43:46.953233 kubelet[1437]: E0317 18:43:46.953176 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:46.963857 env[1187]: time="2025-03-17T18:43:46.960540103Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:43:46.963857 env[1187]: time="2025-03-17T18:43:46.960600706Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:43:46.963857 env[1187]: time="2025-03-17T18:43:46.960617969Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:43:46.963857 env[1187]: time="2025-03-17T18:43:46.960856493Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61 pid=3027 runtime=io.containerd.runc.v2 Mar 17 18:43:46.961000 audit[3028]: NETFILTER_CFG table=filter:80 family=2 entries=38 op=nft_register_chain pid=3028 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:43:46.974954 kernel: audit: type=1325 audit(1742237026.961:788): table=filter:80 family=2 entries=38 op=nft_register_chain pid=3028 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:43:46.961000 audit[3028]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7fffe0454d40 a2=0 a3=7fffe0454d2c items=0 ppid=2075 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:46.961000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:43:47.001914 systemd[1]: Started cri-containerd-217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61.scope. Mar 17 18:43:47.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.026000 audit: BPF prog-id=123 op=LOAD Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3027 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:47.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376664616232326565626630613563646364303538346663313535 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3027 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:47.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376664616232326565626630613563646364303538346663313535 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit: BPF prog-id=124 op=LOAD Mar 17 18:43:47.027000 audit[3035]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002935d0 items=0 ppid=3027 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:47.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376664616232326565626630613563646364303538346663313535 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit: BPF prog-id=125 op=LOAD Mar 17 18:43:47.027000 audit[3035]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000293618 items=0 ppid=3027 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:47.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376664616232326565626630613563646364303538346663313535 Mar 17 18:43:47.027000 audit: BPF prog-id=125 op=UNLOAD Mar 17 18:43:47.027000 audit: BPF prog-id=124 op=UNLOAD Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { perfmon } for pid=3035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit[3035]: AVC avc: denied { bpf } for pid=3035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.027000 audit: BPF prog-id=126 op=LOAD Mar 17 18:43:47.027000 audit[3035]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000293a28 items=0 ppid=3027 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:47.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376664616232326565626630613563646364303538346663313535 Mar 17 18:43:47.073487 env[1187]: time="2025-03-17T18:43:47.073412336Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:2aed2391-4362-4693-8357-c385483d8531,Namespace:default,Attempt:0,} returns sandbox id \"217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61\"" Mar 17 18:43:47.075849 env[1187]: time="2025-03-17T18:43:47.075785489Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Mar 17 18:43:47.489906 env[1187]: time="2025-03-17T18:43:47.489812661Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:47.492645 env[1187]: time="2025-03-17T18:43:47.492572653Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:d25119ebd2aadc346788ac84ae0c5b1b018c687dcfd3167bb27e341f8b5caeee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:47.496467 env[1187]: time="2025-03-17T18:43:47.496395667Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:47.500450 env[1187]: time="2025-03-17T18:43:47.500385191Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:b927c62cc716b99bce51774b46a63feb63f5414c6f985fb80cacd1933bbd0e06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:43:47.502610 env[1187]: time="2025-03-17T18:43:47.502507742Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d25119ebd2aadc346788ac84ae0c5b1b018c687dcfd3167bb27e341f8b5caeee\"" Mar 17 18:43:47.507560 env[1187]: time="2025-03-17T18:43:47.507452721Z" level=info msg="CreateContainer within sandbox \"217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61\" for container &ContainerMetadata{Name:test,Attempt:0,}" Mar 17 18:43:47.536828 env[1187]: time="2025-03-17T18:43:47.536735888Z" level=info msg="CreateContainer within sandbox \"217fdab22eebf0a5cdcd0584fc155b5d0f623ed5b747be1de349a491c10d8e61\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"c5ab20659808412a2c50293c3ca45a89122f35bd782383e13336e989a95eb187\"" Mar 17 18:43:47.538174 env[1187]: time="2025-03-17T18:43:47.538122302Z" level=info msg="StartContainer for \"c5ab20659808412a2c50293c3ca45a89122f35bd782383e13336e989a95eb187\"" Mar 17 18:43:47.563618 systemd[1]: Started cri-containerd-c5ab20659808412a2c50293c3ca45a89122f35bd782383e13336e989a95eb187.scope. Mar 17 18:43:47.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.592000 audit: BPF prog-id=127 op=LOAD Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3027 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:47.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616232303635393830383431326132633530323933633363613435 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3027 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:47.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616232303635393830383431326132633530323933633363613435 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit: BPF prog-id=128 op=LOAD Mar 17 18:43:47.593000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00027e150 items=0 ppid=3027 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:47.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616232303635393830383431326132633530323933633363613435 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit: BPF prog-id=129 op=LOAD Mar 17 18:43:47.593000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00027e198 items=0 ppid=3027 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:47.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616232303635393830383431326132633530323933633363613435 Mar 17 18:43:47.593000 audit: BPF prog-id=129 op=UNLOAD Mar 17 18:43:47.593000 audit: BPF prog-id=128 op=UNLOAD Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:43:47.593000 audit: BPF prog-id=130 op=LOAD Mar 17 18:43:47.593000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00027e5a8 items=0 ppid=3027 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:43:47.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616232303635393830383431326132633530323933633363613435 Mar 17 18:43:47.627927 env[1187]: time="2025-03-17T18:43:47.627850662Z" level=info msg="StartContainer for \"c5ab20659808412a2c50293c3ca45a89122f35bd782383e13336e989a95eb187\" returns successfully" Mar 17 18:43:47.954375 kubelet[1437]: E0317 18:43:47.954253 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:48.443046 systemd-networkd[1002]: cali5ec59c6bf6e: Gained IPv6LL Mar 17 18:43:48.548714 kubelet[1437]: I0317 18:43:48.548589 1437 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=34.118332236 podStartE2EDuration="34.54855805s" podCreationTimestamp="2025-03-17 18:43:14 +0000 UTC" firstStartedPulling="2025-03-17 18:43:47.075105307 +0000 UTC m=+80.900714234" lastFinishedPulling="2025-03-17 18:43:47.505331111 +0000 UTC m=+81.330940048" observedRunningTime="2025-03-17 18:43:48.548021333 +0000 UTC m=+82.373630500" watchObservedRunningTime="2025-03-17 18:43:48.54855805 +0000 UTC m=+82.374166986" Mar 17 18:43:48.955143 kubelet[1437]: E0317 18:43:48.955083 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:49.956256 kubelet[1437]: E0317 18:43:49.956164 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:50.957444 kubelet[1437]: E0317 18:43:50.957382 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:51.958840 kubelet[1437]: E0317 18:43:51.958777 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:52.960487 kubelet[1437]: E0317 18:43:52.960403 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:53.960947 kubelet[1437]: E0317 18:43:53.960878 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:54.961946 kubelet[1437]: E0317 18:43:54.961841 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:55.286705 systemd[1]: run-containerd-runc-k8s.io-86c9bfa563831831b8820d950a0e1f4cebcc0237a661a0562c3e511b348cc508-runc.ibbOEz.mount: Deactivated successfully. Mar 17 18:43:55.962575 kubelet[1437]: E0317 18:43:55.962478 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:43:56.963535 kubelet[1437]: E0317 18:43:56.963444 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"